Networking & network security
Last updated
Last updated
There are 2 ways to prepare your home network for your validator node.
Check out the Port Forwarding page below after you are done setting up your validator node.
Your validator node will be secured with an SSH key so that only users who have this SSH key can access it
Any home devices that become compromised will not be able to access your validator node which sits in a separate subnet
If you think your SSH keys could be leaked, turn off any port forwarding settings and change the SSH key pair in your Validator Node