Node Security: Root, Networking & Network Security

Before running a validator node, ensure you have secure the root account, setup a firewall, forwarded the correct port to the correct machine(s) from your router for both the Execution layer client and Consensus layer client. There are designated ports for each client. See the table below:

Execution Client
Default Port

Reth

30303 TCP/UDP

Erigon

30303 TCP/UDP

Geth

30303 TCP/UDP

Nethermind

30303 TCP/UDP

Besu

30303 TCP/UDP

Consensus Client
Default Port

Nimbus

9000 TCP/UDP

Lighthouse

9000 TCP/UDP

Teku

9000 TCP/UDP

Prysm

13000 TCP, 12000 UDP

Learn more about port and ports in networking here

Network architecture

There are 2 ways to prepare your home network for your validator node.

ISPs in some countries combine both modem and routers into a single device.

It is entirely possible and also sufficiently safe to connect your validator node directly to your existing home router if you do not plan to have un-trusted guests over at your home often.

  • Secure your node router properly by setting strong passwords on the WIFI and device level. Do not expose these passwords or let anyone else connect to the WIFI network or log in to the device level of your node router.

If you need to be away from home for long periods, port forwarding will need to be configured on both your Home Modem and your Home Router (i.e. Modem->Home Router->Node Router) to allow incoming connections from outside of your home network.

  • This is so that you can access your validator node for troubleshooting and maintenance even if you are not at home.

  • Turn off port forwarding on your Home Modem when you are no longer away from home

Check out the Port Forwarding section under the Advanced Networking Page below after you are done setting up your validator node.

Advanced networking

Network security model

  1. Your validator node will be secured with an SSH key so that only users who have this SSH key can access it

  2. Any home devices that become compromised will not be able to access your validator node which sits in a separate subnet

  3. If you think your SSH keys could be leaked, turn off any port forwarding settings and change the SSH key pair in your Validator Node

Last updated