Ports

Veeam Backup & Replication automatically creates firewall rules for the ports required to allow communication between the Proxmox VE server, workers and the backup server.

Workers

The following table describes network ports that must be open to ensure proper communication of workers with other backup infrastructure components.

Workers

From

To

Protocol

Port

Notes

Worker

Proxmox VE server

TCP/HTTPS

8006

Used to communicate with the REST API service running on the Proxmox VE server.

Proxmox VE server

SSH

22

Used to communicate with Proxmox VE server.

Backup server

TCP

10006

Used to communicate with the backup server.

Backup server

TCP

2500 to 3300

Default range of ports used for ransomware index transfer.

Veeam backup repository or gateway server

TCP

6162
(2500 to 3300)

Default range of ports used as transmission channels for jobs and restore sessions. The port range 2500-3300 is used for failover if port 6162 is unavailable.

Veeam Update Repository
(repository.veeam.com)

Amazon CloudFront
(cloudfront.net, amazonaws.com)

TCP/HTTPS

443

Used to download worker deployment packages.

Note: Veeam Update Repository uses the Amazon CloudFront service to distribute traffic when downloading product updates.

NTP server

UDP

123

Used for time synchronization with NTP servers.

Backup Server

The following table describes network ports that must be open to ensure proper communication of the backup server with other backup infrastructure components.

Backup Server

From

To

Protocol

Port

Notes

Backup server

Worker

TCP

19000

Used to communicate with workers.

Worker

TCP/HTTPS

443

Used by the Platform Service to enable communication with the Veeam Updater service on the worker.

Backup server

TCP/HTTPS

6172

Used by the Platform Service to enable communication with the Veeam Backup & Replication database.

Proxmox VE server

TCP/HTTPS

8006

Used to communicate with the REST API service running on the Proxmox VE server.

Proxmox VE server

SSH

22

Used to communicate with the Proxmox VE server.

FLR helper appliance

TCP

22

Used to connect to the helper appliance during file-level restore.

 

Note

For the list of ports used by the backup server to communicate with backup repositories, see Ports.

Guest Processing Components

The following tables describe network ports that must be opened to ensure proper communication for components involved in the guest processing:

If any basic backup infrastructure components will also be used, you also need to open ports for these components. For example, Backup Server. You may also need to open ports for other features described in this section. For example, Guest OS File Recovery.

Guest Interaction Proxies

The following table describes network ports that must be opened for guest interaction proxies involved in the guest processing.

Guest Interaction Proxies

From

To

Protocol

Port

Notes

Backup server

Guest interaction proxy

TCP

445, 135

Ports used for adding Windows VMs to managed servers using local administrator credentials.
Note: Kerberos domain account with administrator privileges should be used.

TCP

6160

Port used for adding both Windows and Linux VMs to managed servers using a certificate-based authentication.
Note: Deployment kit should be pre-installed on VMs.

TCP

22

Port used for adding Linux VMs to managed servers using SSH credentials.

Connections for Non-Persistent Runtime Components

Backup server

Guest interaction proxy

TCP

6190

Port used for communication of the backup server and backup infrastructure components with the non-persistent runtime components deployed inside the VM guest OS for application-aware processing and indexing.

Protected Workloads

The following table describes network ports that must be opened for protected workloads involved in the guest processing.

Protected Workloads

From

To

Protocol

Port

Notes

Connections for Non-Persistent Runtime Components

Guest interaction proxy

VM guest OS

TCP

2500 to 3300

Default range of ports used as transmission channels for log shipping.
Note: These ports are NOT required in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

Guest interaction proxy

VM guest OS (Microsoft Windows)

TCP

445, 135

Port used to deploy the runtime coordination process on the VM guest OS.
Note: These ports are NOT required in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

TCP

6173

Port used by the runtime process deployed inside the VM for guest OS interaction.
Note: This port NOT required in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

Guest interaction proxy

VM guest OS (Linux)

TCP

22

Default SSH port used as a control channel.
Note: This port NOT required in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

Connections for Persistent Agent Components

Backup server

VM guest OS (Linux)

TCP

22

Default SSH port used as a control channel during persistent agent installation.

TCP

2500 to 3300

Range of ports used only during the installation of the persistent agent.

Default range of ports used for communication with a guest OS.

Guest interaction proxy

VM guest OS (Linux)

TCP

6160

Default port used by Veeam Installer Service for Linux.

TCP

6162

Default Management Agent port. Required if it is used as a control channel instead of SSH.

Guest interaction proxy

VM guest OS (Windows)

TCP

6160, 11731

Default ports used by Veeam Installer Service.

Port 11731 is used for failover if port 6160 is unavailable.

TCP

6173

Port used by the Veeam Guest Helper for guest OS processing and file system indexing.

Gateway Servers

The following table describes network ports that must be opened for gateway servers involved in the guest processing.

Gateway Servers

From

To

Protocol

Port

Notes

Guest interaction proxy

Gateway server

TCP

6162, 2500 to 3300

Default port used by Veeam Transport Service (Veeam Data Mover Service if Veeam Backup & Replication is installed on the Microsoft Windows machine).

The port range 2500-3300 is used for failover if port 6162 is unavailable.

Hypervisors

The following table describes network ports that must be opened for the hypervisors involved in the guest processing.

Hypervisors

From

To

Protocol

Port

Notes

Guest interaction proxy

ESXi server

TCP

443

Default port used for connections to ESXi host.
This port must be opened to ensure proper communication with the non-persistent runtime components deployed inside the VM guest OS for application-aware processing and indexing.
[For VMware vSphere earlier than 6.5] Not required if vCenter connection is used. In VMware vSphere versions 6.5 and later, port 443 is required by vCenter Web Services.

Log Shipping Components

The following tables describe network ports that must be opened to ensure proper communication for components involved in log backup, such as Microsoft SQL Server log backup, Oracle log backup and PostgreSQL WAL files backup:

If any basic backup infrastructure components will also be used, you also need to open ports for these components. For example, Backup Server. You may also need to open ports for other features described in this section. For example, Guest OS File Recovery.

Log Shipping Servers

The following table describes network ports that must be opened for log shipping servers involved in the log backup.

Log Shipping Servers

From

To

Protocol

Port

Notes

Backup server

Log shipping server

TCP

445, 135, 137, 139

Ports used for deploying Veeam Backup & Replication components. These ports are not required if the Veeam Deployment Kit is installed on the backup infrastructure component.

Note: 137 and 139 are legacy ports. If your backup infrastructure components do not use SMB 1.0, they are not required.

TCP

6160

Default port used by Veeam Installer Service.

TCP

6162

Default port used by Veeam Transport Service (Veeam Data Mover Service if Veeam Backup & Replication is installed on the Microsoft Windows machine).

Hyper-V host

Log shipping server (backup server)

TCP

6162, 2500 to 3300

Port or range of ports used for communication with the Hyper-V host and for transfer log backups.

These ports are required only if the log shipping server transfers data over PowerShell Direct. In this case, the backup server performs the role of the log shipping server.

Note: The port range 2500 - 3300 is optional. You can use it for failover if port 6162 is unavailable.

VM guest OS
(VM with MS SQL, Oracle, or PostgreSQL)

Log shipping server

TCP

6162, 2500 to 3300

Default port or range of ports used for communication with a log shipping server and transfer log backups.

MS SQL Guest OS

The following table describes network ports that must be opened for MS SQL VM guest OS involved in the log backup.

MS SQL Guest OS

From

To

Protocol

Port

Notes

Guest interaction proxy

MS SQL VM guest OS

TCP

445, 135, 137, 139

[Non-persistent runtime components only] Ports used for deploying Veeam Backup & Replication components including Veeam Log Shipper runtime component.

These ports are not required:

  • When working in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.
  • If the Veeam Deployment Kit is installed on the backup infrastructure component.

Note: 137 and 139 are legacy ports. If your backup infrastructure components do not use SMB 1.0, they are not required.

TCP

2500 to 3300

Default range of ports used for communication with a guest OS.

These ports are NOT required when working in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

TCP

6173

Port used by the Veeam Guest Helper for guest OS processing.

TCP

6160, 11731

[Persistent agent components only] Default ports used by Veeam Installer Service.

Port 11731 is used for failover if port 6160 is unavailable.

TCP

6167

Port used by the Veeam Log Shipping Service for preparing the database and taking logs.

Oracle Guest OS

The following table describes network ports that must be opened for Oracle VM guest OS involved in the log backup.

Oracle Guest OS

From

To

Protocol

Port

Notes

Guest interaction proxy

Oracle VM guest OS

TCP

2500 to 3300

Default range of ports used for communication with a guest OS.

These ports are NOT required when working in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

Guest interaction proxy

Oracle VM guest OS (Microsoft Windows)

TCP

445, 135

[Non-persistent runtime components only] Ports used for deploying Veeam Backup & Replication components including Veeam Log Shipper runtime component.

These ports are not required:

  • When working in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.
  • If the Veeam Deployment Kit is installed on the backup infrastructure component.

Note: 137 and 139 are legacy ports. If your backup infrastructure components do not use SMB 1.0, they are not required.

TCP

6173

Port used by the Veeam Guest Helper for guest OS processing

TCP

6160, 11731

[Persistent agent components only] Default ports used by Veeam Installer Service.

Port 11731 is used for failover if port 6160 is unavailable.

TCP

6167

Port used by the Veeam Log Shipping Service for preparing the database and taking logs.

Guest interaction proxy

Oracle VM guest OS (Linux)

TCP

22

[Non-persistent runtime components only] Default SSH port used as a control channel.

This port is NOT required when working in networkless mode over VMware VIX/vSphere Web Services or PowerShell Direct.

TCP

6162

[Persistent agent components only] Default Management Agent port. Required if it is used as a control channel instead of SSH.

PostgreSQL Guest OS

The following table describes network ports that must be opened for PostgreSQL VM guest OS involved in the log backup.

PostgreSQL Guest OS

From

To

Protocol

Port

Notes

Guest interaction proxy

PostgreSQL VM guest OS

TCP

22

[Non-persistent runtime components only] Default SSH port used as a control channel.

This port is NOT required when working in networkless mode over vSphere Web Services.

TCP

6162

[Persistent agent components only] Default Management Agent port. Required if it is used as a control channel instead of SSH.

TCP

2500 to 3300

Default range of ports used for communication with a guest OS.

These ports are NOT required when working in networkless mode over vSphere Web Services.

Backup Repositories

The following table describes network ports that must be opened for backup repositories involved in the log backup.

Backup Repositories

From

To

Protocol

Port

Notes

Log shipping server

Backup repository

TCP

6162 or 2500 to 3300

Default port used by Veeam Transport Service (Veeam Data Mover Service if Veeam Backup & Replication is installed on the Microsoft Windows machine).

Note: The port range 2500 - 3300 is optional. You can use it for failover if port 6162 is unavailable.

VM guest OS
(VM with MS SQL, Oracle, or PostgreSQL)

Backup repository

TCP

6162 or 2500 to 3300

Default port or range of ports used for communication with a backup repository and transfer log backups. Should be opened if log shipping servers are not used in the infrastructure and the MS SQL server has a direct connection to the backup repository.

Gateway Servers

The following table describes network ports that must be opened for gateway servers involved in the log backup.

Gateway Servers

From

To

Protocol

Port

Notes

Log shipping server

Gateway server

TCP

6162 or 2500 to 3300

Default port used by Veeam Transport Service (Veeam Data Mover Service if Veeam Backup & Replication is installed on the Microsoft Windows machine).

Note: The port range 2500 - 3300 is optional. You can use it for failover if port 6162 is unavailable.

Hypervisors

The following table describes network ports that must be opened for hypervisors involved in the log backup.

Hypervisors

From

To

Protocol

Port

Notes

Log shipping server (backup server)

Hyper-V host

TCP

6162 or 2500 to 3300

Port or range of ports used for communication with the Hyper-V host and for transfer log backups.

These ports are required only if the log shipping server transfers data over PowerShell Direct. In this case, the backup server performs the role of the log shipping server.

Note: The port range 2500 - 3300 is optional. You can use it for failover if port 6162 is unavailable.

Log shipping server

ESXi host

TCP

443

Default port used for communication with a log shipping server and transfer log backups over vSphere API.