Network traffic rules control traffic transferred between backup infrastructure components. These rules allow you to do the following:
- Throttle network traffic
- Encrypt transferred data
The rules apply only to the backup infrastructure components, so you do not have to change your network infrastructure.
Each network rule contains IP address ranges for source and target components. When a job starts, Veeam Backup & Replication checks the rules against the components involved in the job. If the IP addresses of the components fall into the IP address ranges of a rule, the rule applies.
For example, 192.168.0.1–192.168.0.255 is the source range, and 172.16.0.1–172.16.0.255 is the target range. 192.168.0.12 is the IP address of one component, and 172.16.0.31 is the IP address of another component. Both IP addresses fall into the ranges, so the rule will apply.
You can define a rule for specific components. For this, specify a single IP address in the source range and in the target range.
Creating Network Rules
Veeam Backup & Replication has a predefined rule for traffic transferred between public networks. For more information, see Adjusting Internet Rule.
If you created a rule for an off-host backup proxy, you can check whether it applies. For this, open the Traffic Rules step of the backup proxy wizard. The rule must be in the list of rules.