Configuring Network Traffic Rules

In this article

    Network traffic rules control traffic transferred between backup infrastructure components. These rules allow you to do the following:

    • Throttle network traffic
    • Encrypt transferred data

    The rules apply only to the backup infrastructure components, so you do not have to change your network infrastructure.

    How Network Rules Work

    Each network rule contains IP address ranges for source and target components. When a job starts, Veeam Backup & Replication checks the rules against the components involved in the job. If the IP addresses of the components fall into the IP address ranges of a rule, the rule applies.

    For example,– is the source range, and– is the target range. is the IP address of one component, and is the IP address of another component. Both IP addresses fall into the ranges, so the rule will apply.

    Note that the rules are reversible. The rule from the example will also apply to the specified components if you swap the ranges: make– the target range and– the source range.


    You can define a rule for specific components. For this, specify a single IP address in the source range and in the target range.

    Creating Network Rules

    You must create network rules at the backup server level. For details, see Enabling Traffic Throttling and Enabling Data Encryption.

    Veeam Backup & Replication has a predefined rule for traffic transferred between public networks. For more information, see Adjusting Internet Rule.


    If you created a rule for an off-host backup proxy, you can check whether it applies. For this, open the Traffic Rules step of the backup proxy wizard. The rule must be in the list of rules.