• Dear Pleskians! The Plesk Forum will be undergoing scheduled maintenance on Monday, 7th of July, at 9:00 AM UTC. The expected maintenance window is 2 hours.
    Thank you in advance for your patience and understanding on the matter.

Port forward 8880 to 8443

E

EdwardDekker

Guest
Hello,

I have installed a SSL certificate for my Plesk panel. How could i forward Plesk port 8880 to 8443 to be get secured.
Or otherwise disable port 8880 for unsecured connections.

Regards,
Edward
 
Hello Igor

If i go to line 15 of /etc/sw-cp-server/applications.d/plesk.conf

Old:
include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8880"

New:
include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8880 ssl"

Reboot Pesk
Code:
 /etc/init.d/sw-cp-server restart

Than i have resolved my question.

Regards
Edward
 
Last edited by a moderator:
Update: Secure port 8880

Hello everybody,

As today i see a updated file into /etc/sw-cp-server/applications.d/plesk.conf at Plesk 10.3.
Maybe will it be better to update this post and help the other ones at this forum that having the same issue.

Also will i advise to build a function into Plesk 10 itself. (Hopefuly that Parallels reads this post)
e.g. into the server-wide configuration to secure port 8880 once and for all.

Kind of regards,
Edward

Code:
server.modules += ("mod_expire", "mod_fastcgi", "mod_rewrite", "mod_accesslog", "mod_alias", "mod_compress")

compress.filetype = ("text/plain", "text/html", "text/javascript", "text/css", "text/xml")
$HTTP["url"] !~ "\.php3?$" {
    expire.url = ( "" => "access 1 months")
}
url.rewrite-once = (
    "/skins/branding/.*\.php.*" => "/",
    "/sitebuilder/skins/branding/.*\.php.*" => "/"
)

server.tag = "sw-cp-server"

include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8443 ssl"
include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8880 ssl"
include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8443 ipv6 ssl"
include_shell "/etc/sw-cp-server/applications.d/plesk.socket.sh 8880 ipv6 ssl"
 
Last edited by a moderator:
Back
Top