# Server Firewall

#### **Stage 1: Temporary Access for Initial Deployment** <a href="#stage-1-temporary-access-for-initial-deployment" id="stage-1-temporary-access-for-initial-deployment"></a>

**Purpose:**

To log in to the server and execute initial installation commands.

**Action:**

* In your cloud provider's firewall settings (e.g., AWS Security Group), add an inbound rule to allow SSH (TCP port 22) traffic from **your current public IP address**.
* **Security Tip:** This rule is temporary. Do not open the SSH port to all IPs (`0.0.0.0/0`), as this poses a significant security risk.

#### **Stage 2: Configure Core Node Communication Port (28610)** <a href="#stage-2-configure-core-node-communication-port-28610" id="stage-2-configure-core-node-communication-port-28610"></a>

**Purpose:**

To allow your node to interact with the HodiFi network and to allow you to access the management dashboard.

**Action:**

You need to add an inbound rule to allow TCP traffic to port `28610` from the following sources:

* **Source 1 (Protocol Communication):** `47.75.255.16/32` and `47.244.122.30/32`. These are the addresses for HodiFi's core relay network. Your node must be able to receive instructions from these addresses to function correctly.
* **Source 2 (Personal Management):**`Your current public IP address`.This IP will be allowed to access port 28610 on your server`http://<Your-Server-IP>:28610`from your personal network.

<figure><img src="https://459585957-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdkdPuEXoABael0nl3mh2%2Fuploads%2Fgit-blob-160dd4383a1a0729f5ea76bfe758434bb0270f0b%2Fimage.png?alt=media" alt=""><figcaption></figcaption></figure>

#### **Stage 3: Security Hardening (After Successful Deployment)** <a href="#stage-3-security-hardening-after-successful-deployment" id="stage-3-security-hardening-after-successful-deployment"></a>

**Purpose:**

To remove unnecessary public entry points and significantly enhance server security.

**Action:**

After you have confirmed that your node is deployed and running stably, you **must perform the following critical step**:

* **Remove SSH Access Rule:** Return to your firewall settings and **delete or disable** the rule allowing SSH (port 22) access that you created in Stage 1.

<figure><img src="https://459585957-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdkdPuEXoABael0nl3mh2%2Fuploads%2Fgit-blob-afffa32363d38022b4dcbfc30b5566199e5d38e8%2Fimage%20(1).png?alt=media" alt=""><figcaption></figcaption></figure>

* **How to manage the server after closing SSH?** You will no longer connect via public SSH. Instead, you should **rely exclusively on the secure, in-browser management tools provided by your cloud provider** (e.g., AWS Session Manager, Linode Lish Console), which is the industry-recommended best practice.

<figure><img src="https://459585957-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FdkdPuEXoABael0nl3mh2%2Fuploads%2Fgit-blob-02f821b353abd1f74bc801e7a7eeaafb75b5eb35%2Fimage%20(2).png?alt=media" alt=""><figcaption></figcaption></figure>
