Whmcs Firewall installation

  • August 21, 2024
  • 0 Comments


WHMCS  v8.x  and higher

This installation process assumes you have an active order and have received a license token, either via email or on the ordered product page in your client area. We may have also provided a web address, along with login credentials, to access the firewall dashboard where you can manage its features. 


IMPORTANT: After installing the plugin, you must activate the firewall from the dashboard using the 1-click setup button in the settings section.

This is the Client addon plugin installation tutorial. For Server addon plugin dedicated to resellers, please visit the related reseller help page.

Download the WHMCS firewall plugin zip file gpfirewall.zip to your computer or mobile. 

  • Extract the contents of the plugin ZIP file on your computer.
  • Connect to your WHMCS installation directory on your server using an FTP client or file manager provided by your hosting provider.
  • Upload the extracted plugin directory to /modules/addons/ within your WHMCS installation.
  • Access the administration area of your WHMCS installation by logging in with your administrator credentials.
  • Go to "System Settings" → "Addon Modules" under the section "Apps & Integrations".
  • Click on the "Activate" button of GP Firewall addon.
  • Once the addon is activated, click on the "Configure" button next to it to access settings.
  • Fill the "License Token" field with your GP Firewall license token, then click the "Save Changes" button.



Depending on the configuration of your firewall from the dashboard and from the GP whmcs addon, you should visit a front-office page or a NEW back-office page to simulate access to your site. Visit your dashboard iptables and check if the plugin has added your ip to the records.

The Website Firewall will notify you when a new version is released. Keeping your plugins up to date is important for security and compatibility.

Important: Safeguard your script's vital data now! Explore our imperative guide on fortifying backoffice security with authorized admin IPs. Your script's safety is non-negotiable—take command now!


How helpful was this article to you?

Posting has been disabled.