Backup Appliances in Private Environment

Starting from Veeam Backup for AWS version 7.0, you can deploy backup appliances in private networks to increase the security of your environment. When a backup appliance is deployed in a private environment, it is not assigned any public IPv4 address, and you will have to perform a number of additional configuration actions to allow private network access.

When deploying a backup appliance using a CloudFormation template, you have an option to connect it either to an existing or to a new private VPC:

  • If you choose to connect the appliance to a new private VPC, the VPC and two subnets (public and private) will be automatically created in the AWS Region in which the appliance resides; also, an internet gateway will be attached to the VPC to allow the appliance to access the internet. The appliance will be connected to the private subnet and will access the required AWS services through a route to a NAT gateway that will be created in the public subnet.
  • If you choose to connect the appliance to an existing VPC, you will have to manually configure access both to the AWS services and the internet in the way that suites your security concerns best.

When deploying a backup appliance from the Veeam Backup & Replication console, the only option is to connect it to an existing VPC. In this case, you must allow communication between the Veeam Backup & Replication server and the backup appliance. One possible solution is to establish an AWS Site-to-Site VPN (Site-to-Site VPN) connection between the VPC of the appliance and your on-premises network, as described in Configuring Access to Backup Appliances in AWS.

Private Network Deployment

In both cases, you must take into account the backup appliance requirements listed below.

Requirements for Backup Appliances

For a backup appliance to be able to operate in a private environment, the following requirements must be met:

From

To

Protocol

Port

Backup appliance

Veeam Update Notification Server (repository.veeam.com)

HTTPS

443

Ubuntu Security Update Repository (security.ubuntu.com)

HTTP

80

DotNetCore Repository (packages.microsoft.com)

HTTPS

443

PostgreSQL Apt Repository (apt.postgresql.org)

HTTP

80

PostgreSQL Website* (postgresql.org)

HTTPS

443

*Required to download the file https://www.postgresql.org/media/keys/ACCC4CF8.asc.

  • To perform data protection and disaster recovery operations, the backup appliance must have outbound internet access to the AWS services.
  • If you want to receive daily reports and email notifications on backup policy results, outbound internet access must be allowed from the backup appliance to the email service through port 443 over the HTTPS protocol or through the SMTP port specified in the email server settings (port 25 by default).
  • If you want to enable single sign-on (SSO) authentication to log in to different software systems with the same credentials using the identity provider service, outbound internet access must be allowed from the user workstation to the identity provider through port 443 over the HTTPS protocol.
  • If you want to access the Web UI component from a user workstation, inbound internet access must be allowed from the user workstation to the appliance through port 443 over the HTTPS protocol.
  • If the backup appliance is managed by a Veeam Backup & Replication server, inbound internet access must be allowed from the server to the appliance through port 443 over the HTTPS protocol.