Requirements
Before you start using Veeam Backup for AWS, consider the following requirements.
The following network ports must be open to ensure proper communication of components in the backup infrastructure of Veeam Backup for AWS.
From | To | Protocol | Port | Notes |
---|---|---|---|---|
Web browser (local machine) | TCP | 443 | Port used for communication with the Web UI component. | |
SSH | 22 | Command port used for communication with the backup service. | ||
TCP | 11005 | Default port used for communication with the REST API service. For information on how to change the port number, see the Configuring Security Settings section in the Veeam Backup for AWS REST API Reference. | ||
TCP | 443 | Port used for communication with the Veeam Backup browser on the worker instance in the file-level restore process. | ||
SMTP server | TCP | 25 | Default port used for sending email notifications. | |
Veeam Update Notification Server (repository.veeam.com) | TCP | 443 | Port used for downloading information about available product updates. |
To open network ports, in the AWS Management Console, you must add inbound rules to security groups associated with backup infrastructure components.
- A security group for the backup server is created during the product installation. For details, see Installing Veeam Backup for AWS.
- A security group for worker instances is selected per AWS region and Availability Zone. For details, see Configuring Worker Instance Settings.
For details on how to add inbound rules to security groups, see AWS Documentation.
To access Veeam Backup for AWS, you can use the following web browsers: Microsoft Edge 40 or later, Mozilla Firefox 56 or later, Google Chrome 62 or later.
IAM roles that Veeam Backup for AWS uses to perform data protection and disaster recovery operations must have permissions to access AWS services and resources. The minimal set of permissions for IAM roles is described in the following Veeam KB articles: KB3032, KB3033, KB3034.
The backup server and worker instances must have outbound internet access to the following AWS services:
- Amazon CloudWatch
- Amazon CloudWatch Events
- Amazon Elastic Block Store (EBS)
- Amazon Elastic Compute Cloud (EC2)
- Amazon Simple Notification Service (SNS)
- Amazon Simple Queue Service (SQS)
- Amazon Simple Storage Service (S3)
- AWS Identity and Access Management (IAM)
- AWS Key Management Service (KMS)
- AWS Marketplace Metering Service
- AWS Security Token Service (STS)
- AWS Service Quotas
- AWS Systems Manager (SSM), including access to the ec2messages and ssmmessages endpoints
Related Topics