# How to use the Plesk Plan

We make this plan as easy to use as possible since it's dedicated to Plesk. You only need our dashboard to install the tunnel config file, other than that, your main focus is installing Plesk on your computer/server and installing WireGuard.

{% stepper %}
{% step %}

### Install Plesk

{% embed url="<https://docs.plesk.com/en-US/obsidian/deployment-guide/quick-start.76607/>" %}

**If you are a beginner or just want default configuration, use this instead:**

* Installation instructions for Plesk for Linux: [Installing Plesk for Linux in One Click](https://docs.plesk.com/en-US/obsidian/deployment-guide/plesk-installation-and-upgrade-on-single-server/1click-plesk-installation/installing-plesk-for-linux-in-one-click.76444/).
* Installation instructions for Plesk for Windows: [Installing Plesk for Windows in One Click](https://docs.plesk.com/en-US/obsidian/deployment-guide/plesk-installation-and-upgrade-on-single-server/1click-plesk-installation/installing-plesk-for-windows-in-one-click.76448/).
  {% endstep %}

{% step %}

### Set up WireGuard

[install-wireguard](https://qubitvpn.gitbook.io/qubitvpn-docs/how-to-use/install-wireguard "mention")
{% endstep %}

{% step %}

### Sign into the [dashboard](https://dashboard.qubitvpn.com/)

After your VPN Server is created, we will email you letting you know that your VPN Server is ready. Go to the [dashboard](https://dashboard.qubitvpn.com/) and log in using the same contact email you purchased with.

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2F84Lusnm2hUoz3pQX2a8a%2Fimage.png?alt=media&#x26;token=574bb8a3-b115-4e93-a6c2-b80a5b804f10" alt="" width="373"><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Verify Email

You will receive an email from **Cloudflare** with the Subject **"Cloudflare Access login code for dashboard.qubitvpn.com"** with a verification code, please enter that code in the dashboard.

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FH6r0lggl3VVntqpP5tkg%2Fimage.png?alt=media&#x26;token=99218849-039a-4cf5-b1c9-8bba20a079d4" alt="" width="363"><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### You're in the portal!

You can use this portal to access your WireGuard client profiles/tunnels (using "Client Access").

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FnRYMr3vx6sht1UOvjZZ1%2Fimage.png?alt=media&#x26;token=e30ef5e3-975e-424a-a684-e2b609b85f9c" alt=""><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Sign into your Client Access panel

In the email that was sent notifying you that your server is ready, you will have temporary login credentials, please use those credentials to log in here. This is your contact email and a temporary password.

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FMtUrf6dB06qYahaCUoWP%2Fimage.png?alt=media&#x26;token=9485f0a9-c14c-4c3a-9d06-6926643295da" alt="" width="563"><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Multi-Factor Authentication

Scan the QR Code on your phone (if you are logging in from your phone, click the link instead).

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FugBsavBpZSRUC05MtbHc%2Fimage.png?alt=media&#x26;token=2f791214-0a27-4cec-832e-2f8b63e3ebf2" alt=""><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Connect to VPN Profile/Tunnel

Press Connect <i class="fa-turn-down">:turn-down:</i>

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FXefju90OnVTOVapu1lxN%2Fimage.png?alt=media&#x26;token=f8437e8a-6a20-48d7-8ac9-4baecc3bd859" alt=""><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Download

Click Download to import it into your computer/server's WireGuard App. If you don't know how to import it for your operating system, ask [ChatGPT](https://chat.openai.com/?q=Please%20provide%20short%20and%20easy%20to%20follow%20instructions%20on%20how%20to%20import%20a%20wireguard%20tunnel%20configuration%20file.%20First,%20ask%20for%20the%20operating%20system%20that%20plesk%20is%20running%20on%20and%20give%20steps%20for%20wireguard%20on%20that%20operating%20system.) (AI).

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FBV0xJAs1d5Uk7A45wFNy%2Fimage.png?alt=media&#x26;token=3910e935-0760-4096-a74e-430cf799cbc5" alt=""><figcaption></figcaption></figure></div>

{% endstep %}

{% step %}

### Allow the [Plesk ports](https://docs.plesk.com/en-US/obsidian/administrator-guide/plesk-administration/ports-used-by-plesk.64950/) on your [computer/server](https://qubitvpn.gitbook.io/qubitvpn-docs/how-to-use/allow-incoming-port-connection)

{% endstep %}

{% step %}

### Reconfigure Plesk

Reconfigure Plesk to use the WireGuard IP

{% tabs %}
{% tab title="Linux" %}

```bash
plesk repair all -y
```

{% endtab %}

{% tab title="Windows" %}
Run Plesk Repair Utility (usually in C:\Program Files (x86)\Plesk\admin\bin)

Run CMD and then:

```batch
cd C:\Program Files (x86)\Plesk\admin\bin
plesk repair all -y
```

{% endtab %}
{% endtabs %}
{% endstep %}

{% step %}

### Log into Plesk

1. <https://your-ip-here:8443>
2. Use your SSH username and password

   <div data-gb-custom-block data-tag="hint" data-style="info" class="hint hint-info"><p><strong>You may also log-in with a one-time link with this command:</strong> <code>plesk login</code></p></div>

{% endstep %}

{% step %}

### Enter your Email and create a Password

<div align="left" data-full-width="false"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FZ3vynFjQviqGaX3IgUWU%2Fimage.png?alt=media&#x26;token=df524b21-ab34-47a8-b7f2-71a2258cc24f" alt="" width="300"><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Enter License Key

Select "Proceed with a paid license" and enter the license key that was sent to your email after server provisioning. If the email doesn't contain a key, please contact us by email[^1] or by live chat (on our [website](https://qubitvpn.com/)), to claim your key.

<div align="left"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2F5OaHrJawQCQxXqddkqN3%2Fimage.png?alt=media&#x26;token=100851fb-eb95-4a99-ad24-c07cdf22fced" alt=""><figcaption></figcaption></figure></div>
{% endstep %}

{% step %}

### Add VPN IP as a Trusted IP (to avoid issues later on)

<mark style="color:blue;">Go to <https://your-ip:8443/admin/server-protection/trusted-list> (change "your-ip" with your actual IP).</mark>

<mark style="color:blue;">If this doesn't work, follow the steps below, if it does, skip to step 3.</mark>

1. Go to Tools & Settings > IP Address Banning (Fail2Ban)

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2Fm5pA6N5bqMDloRhWG0zY%2Fimage.png?alt=media&#x26;token=cd4b01a7-3b16-40ac-8776-48f7197c119f" alt=""><figcaption></figcaption></figure>

2. Click on "Trusted IP Addresses" on top

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FxsmFFknlDDGUdlqmoEzQ%2Fimage.png?alt=media&#x26;token=bfd2ef31-4546-4bb5-b3dc-739decb258be" alt=""><figcaption></figcaption></figure>

3. Click on "Add Trusted IP" and add your WireGuard VPN Server IP (usually 10.253.0.1) and click "OK" when you're done.

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2Fy13vCLPyyROJA9GomjPX%2Fimage.png?alt=media&#x26;token=b7970f0c-f55a-4f41-9e28-3019b797e5f2" alt=""><figcaption></figcaption></figure>

4. Click on "Add Trusted IP" again and add your Tunnel Config IP (e.g. 10.253.0.7) and click "OK" when you're done.

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FYrPOSYaxA8pWqlVvvHVC%2Fimage.png?alt=media&#x26;token=c6082e06-e5a1-4b2b-83f7-f75d0ede1b51" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### IP Tracking and Security

{% tabs fullWidth="false" %}
{% tab title="How to choose" %}
There are 2 ways to track real IPs.

You may use *X-Forwarded-For* or *CF-Connecting-IP* (Cloudflare) within the website. This only works on some websites and may require a plugin. You can accomplish this on WordPress using a plugin like Solid Security.

Or:

You may do it for the whole website through settings. This will work on most if not all website types and does not require a plugin in most cases.

Please choose the tab that fits with your preferred method.
{% endtab %}

{% tab title="Using X-Forwarded-For or CF-Connecting-IP" %}
For website security (like a WordPress security plugin), use X-Forwarded-For (XFF) or CF-Connecting-IP. *Do **NOT** use X-Real-IP, X-Client-IP, Client-IP, or X-Cluster-Client-IP.*

*Our personal favorite security plugin for WordPress is Solid Security. (We are not in any way affiliated or sponsored by Solid Security)*

How to set this up in [Solid Security](https://wordpress.org/plugins/better-wp-security/):

1. Install [Solid Security](https://wordpress.org/plugins/better-wp-security/)
2. Go to Solid Security > Settings > Global Settings
3. Scroll Down to "IP Detection"
4. Select CF-Connecting-IP if using Cloudflare, if not, select X-Forwarded-For

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FV8QkriOw51BcexjjKoK5%2Fimage.png?alt=media&#x26;token=c6675f51-957b-472c-a099-36e464024e3e" alt=""><figcaption></figcaption></figure>

5. Click "Check IP" and make sure that is your own IP (the IP you're accessing the website from). This should be the IPv6 or IPv4 from [here](https://whatismyipaddress.com/). If this shows "10.253.0.1" or something similar, you did something wrong. Please go back through the steps to see where you made an error.

{% hint style="success" %}
If this shows your personal/work or VPN (if using one) IP, then you are now successfully tracking real IPs.
{% endhint %}
{% endtab %}

{% tab title="Whole Website (Recommended)" %}
{% stepper %}
{% step %}

### Go to your website > Hosting & DNS > Apache & nginx

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FfqQp6njc66v6pOodtK1Y%2Fimage.png?alt=media&#x26;token=e907d438-12ec-4eee-8e14-eeabc7a36a68" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Add these:

In the "Additional directives for HTTP" and "Additional directives for HTTPS" boxes, enter:

```
SetEnvIf X-Forwarded-For ".*" forwarded
CustomLog /var/log/apache2/access.log combined env=!forwarded
```

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FCzDJF0GPfYiZgpj2RjWX%2Fimage.png?alt=media&#x26;token=38987701-1f32-43b7-ab61-0b578b99149a" alt=""><figcaption></figcaption></figure>

In the "Additional nginx directives" box, enter:

```
set_real_ip_from 0.0.0.0/0;
real_ip_header X-Forwarded-For;
```

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FWDf48W6Mm71xgBh598iq%2Fimage.png?alt=media&#x26;token=18a4a285-8e58-4d73-ae5b-183d1165d15c" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Success!

{% hint style="success" %}
Your personal/work or VPN (if using one) IP should now be tracked instead of the VPN Server IP.
{% endhint %}
{% endstep %}
{% endstepper %}
{% endtab %}
{% endtabs %}
{% endstep %}

{% step %}

### Declutter with Power User View (Optional)

Best for developers and web agencies. If you aren't planning to resell and want to declutter all the menu options, follow the steps below:

1. Click on "Change View" at the bottom of the your left hand menu

<div align="center"><figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FiilCCth0j1GGv6O0AOQw%2Fimage.png?alt=media&#x26;token=dffe3543-0981-4ea0-9343-b45b57125311" alt="" width="144"><figcaption></figcaption></figure></div>

2. Click "Switch to Power User view"

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2FuUpqZpWG4ub7LXGOH3PC%2Fimage.png?alt=media&#x26;token=730da96f-cecd-4845-851d-3e4e45a5bd88" alt=""><figcaption></figcaption></figure>

3. Now you have a much simpler, decluttered menu!

<figure><img src="https://1665844291-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fh2w9Up9seZJlW6lHfRCt%2Fuploads%2F7MWMaMWnUDkLG3tm9ycw%2Fimage.png?alt=media&#x26;token=7a870d27-c5ea-4f50-9130-deccf32a7ef9" alt="" width="139"><figcaption></figcaption></figure>
{% endstep %}
{% endstepper %}

<br>

[^1]: <support@qubitvpn.com>
