Operating System Firewalls
After configuring your router, you must also configure your operating system's firewall to allow Autonomys Network traffic.
Quick Setup by OS
- Windows
- Linux
- macOS
Windows Firewall Configuration
Method 1: PowerShell (Recommended)
Run PowerShell as Administrator and execute:
# Space Acres users - only need these two
New-NetFirewallRule -DisplayName "Autonomys Consensus" `
-Direction Inbound -Protocol TCP -LocalPort 30333 -Action Allow
New-NetFirewallRule -DisplayName "Autonomys DSN" `
-Direction Inbound -Protocol TCP -LocalPort 30433 -Action Allow
# CLI Farmers - add this additional port
New-NetFirewallRule -DisplayName "Autonomys Farmer" `
-Direction Inbound -Protocol TCP -LocalPort 30533 -Action Allow
# Verify rules were created successfully
Get-NetFirewallRule -DisplayName "Autonomys*" |
Format-Table DisplayName, Enabled, Direction, Action
# Expected output:
# DisplayName Enabled Direction Action
# ----------- ------- --------- ------
# Autonomys Consensus True Inbound Allow
# Autonomys DSN True Inbound Allow
# Autonomys Farmer True Inbound Allow
Method 2: Windows Defender Firewall GUI
-
Open Windows Defender Firewall
- Press
Win + R, typewf.msc, press Enter - Or: Control Panel → System and Security → Windows Defender Firewall → Advanced Settings
- Press
-
Create Inbound Rules
- Click "Inbound Rules" in left panel
- Click "New Rule..." in right panel
-
Configure Rule (repeat for each port)
- Rule Type: Select "Port" → Next
- Protocol and Ports:
- Select "TCP"
- Select "Specific local ports"
- Enter port number (30333, 30433, or 30533) → Next
- Action: Select "Allow the connection" → Next
- Profile: Check all three (Domain, Private, Public) → Next
- Name:
- Name: "Autonomys Consensus" (for 30333)
- Description: "Allow Autonomys Network consensus P2P"
- Finish
-
Verify Rules
- Rules should appear in the Inbound Rules list
- Ensure they show as "Enabled: Yes"
Windows Firewall Troubleshooting
Check if ports are blocked:
# Test if firewall is blocking
Test-NetConnection -ComputerName localhost -Port 30333
# Check which program is using a port
netstat -ano | findstr :30333
# Get process name from PID
Get-Process -Id (Get-NetTCPConnection -LocalPort 30333).OwningProcess
Temporarily disable firewall (for testing only):
# Disable firewall temporarily
Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
# Remember to re-enable!
Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled True