Configuring Security Settings

When you configure the backup infrastructure for enterprise applications in Veeam Backup & Replication, you can specify what security settings Veeam Backup & Replication will use to establish a secure connection between the backup server and protected computers. By default, Veeam Backup & Replication offers the following security settings:

  • To establish a secure connection between parties, Veeam Backup & Replication uses the default self-signed TLS certificate.
  • Veeam Backup & Replication allows all computers that run a Linux OS to establish a connection to the backup server using the SSH fingerprint.

Keep in mind that default security settings are only for testing and evaluation purposes. To prevent potential security issues, you can change security settings. For example, you can use a custom TLS certificate and verification of Linux host SSH fingerprints.

To specify the security settings, do the following:

  1. From the main menu, select Options.
  2. Click the Security tab.
  3. In the Certificate section, check information about the currently used certificate. By default, Veeam Backup & Replication uses a self-signed TLS certificate generated during the Veeam Backup & Replication installation process. If you want to use a custom certificate, click Install and specify a new certificate. To learn more, see Managing TLS Certificates.
  4. In the Linux hosts authentication section, specify how Veeam Backup & Replication will add Linux-based protected computers to the list of trusted hosts. You can select one of the following options:
  • Add all discovered hosts to the list automatically — with this option enabled, Veeam Backup & Replication allows all discovered computers that run a Linux OS to connect to the backup server. This scenario is recommended for demo environments only.
  • Add unknown hosts to the list manually (more secure) — with this option enabled, only the following Linux-based computers can connect to the backup server:
  • Protected computers that have already established a connection to the backup server and have their fingerprints stored in the Veeam Backup & Replication database. Veeam Backup & Replication displays the number of such computers in the Trusted hosts field. You can export the list of trusted Linux computers to a known_hosts file. To do this, click Export and specify a path to the folder to save the file.
  • Protected computers specified in the known_hosts file imported to Veeam Backup & Replication. To import a known_hosts file, click Import and specify a path to the folder where the file resides.
  • Protected computers added to the list of trusted hosts in the Veeam Backup & Replication console. To learn more, see Adding Computers to Trusted Hosts List.

The computers that are not in the list of trusted hosts cannot connect to the Veeam backup server and download Veeam components during discovery.

  1. Click OK.

TIP

To learn more about other security settings available on the Security tab, see the Configuring Security Settings section in the Veeam Backup & Replication User Guide.

Configuring Security Settings 

Related Topics

Page updated 11/1/2024

Page content applies to build 12.2.0.334