Node Security: Root, Networking & Network Security
Last updated
Last updated
Before running a validator node, ensure you have secure the root account, setup a firewall, forwarded the correct port to the correct machine(s) from your router for both the Execution layer client and Consensus layer client. There are designated ports for each client. See the table below:
Reth
30303 TCP/UDP
Erigon
30303 TCP/UDP
Geth
30303 TCP/UDP
Nethermind
30303 TCP/UDP
Besu
30303 TCP/UDP
Nimbus
9000 TCP/UDP
Lighthouse
9000 TCP/UDP
Teku
9000 TCP/UDP
Prysm
13000 TCP, 12000 UDP
There are 2 ways to prepare your home network for your validator node.
Check out the Port Forwarding section under the Advanced Networking Page below after you are done setting up your validator node.
Your validator node will be secured with an SSH key so that only users who have this SSH key can access it
Any home devices that become compromised will not be able to access your validator node which sits in a separate subnet
If you think your SSH keys could be leaked, turn off any port forwarding settings and change the SSH key pair in your Validator Node