Network ports used by the Backup & Disaster Recovery appliance

Infrascale Backup & Disaster Recovery (IBDR) appliance is designed to function behind a firewall. To ensure its proper operation, you must open the network ports as per sections that follow.

Between the appliance and the internet

PortProtocolDirectionPurpose
122TCP

Appliance to support-svc.infrascale.com
Appliance to support2-svc.infrascale.com

Technical support tunnel. Allows the Support team to access the appliance remotely for troubleshooting.
443TCP

Appliance to services-svc.infrascale.com
Appliance to secure.sosonlinebackup.com
Appliance to pr.pusg2-d-0.infrascale.com
Appliance to pr.pukg0-d-0.infrascale.com
Appliance to pr.pcag0-d-0.infrascale.com

Registration. Required to register appliance in the Dashboard during the initial configuration.
  

Appliance to license-svc.infrascale.com
Appliance to licapi-svc.infrascale.com

Licensing. Allows validation of the appliance’s license on a daily basis.
  Appliance to update-svc.infrascale.comSoftware updates. Allows the appliance to download firmware updates (never installed automatically).
  

Appliance to sr.pusg2-d-0.infrascale.com
Appliance to uip.pusg2-d-0.infrascale.com
Appliance to sr.pukp0-d-0.infrascale.com
Appliance to uip.pukg0-d-0.infrascale.com
Appliance to sr.pcag0-d-0.infrascale.com
Appliance to uip.pcag0-d-0.infrascale.com
Appliance to sr.inf-us-ut-1.myinfrascale.net
Appliance to uip.inf-us-ut-1.myinfrascale.net
Appliance to sr.inf-uk-tor-1.myinfrascale.net
Appliance to uip.inf-uk-tor-1.myinfrascale.net
Appliance to sr.inf-ca-nhm-1.myinfrascale.net
Appliance to uip.inf-ca-nhm-1.myinfrascale.net

Remote access from the Dashboard. Allows for accessing the appliance directly from the Dashboard. If needed, you can turn this on or off later in the Management Console of the appliance.
  Appliance to cm.sosonlinebackup.comSending monitoring events to the Dashboard. Allows for centralized monitoring of backups and health of the appliance in the Dashboard.
  

Appliance to backend.pusg2-d-0.infrascale.com
Appliance to backend.pukg0-d-0.infrascale.com
Appliance to backend.pcag0-d-0.infrascale.com
Appliance to storage.googleapis.com
Appliance to oauth2.googleapis.com

Replication. Allows for sending the encrypted backup data to the cloud 1.

 

Between the appliance and a protected machine

In Windows, these ports are opened automatically during installation of the DR backup agent.

PortProtocolDirectionPurpose
49152–65535TCPClient machine to applianceDR image backup (NBD transport)
9101, 9102, 9103, 9104, 9105TCPAppliance to client machineBasic appliance communication
9102UDPClient machine to applianceAppliance auto-discovery
139, 445TCPClient machine to applianceDR image backup (Samba ports)
135, 137, 138UDPClient machine to applianceDR image backup (Samba ports)
80TCPClient machine to applianceDiagnostic information

In a Unix-like operating system, you also have to open the following ports:

PortProtocolDirectionPurpose
22TCPAppliance to client machineSSH-based management
873TCPAppliance to client machinersync daemon port

Between the appliance and VMware vCenter Server or an ESXi host

PortProtocolDirectionPurpose
443, 902TCPAppliance to VMware vCenter Server or an ESXi hostVMware VM backup

Between the appliance and an administrative machine

An administrative machine is a machine used to access the appliance via the Management Console or by other means.

PortProtocolDirectionPurpose
80, 443TCPAdministrative machine to applianceAccess to the Management Console of the appliance
22TCPAdministrative machine to applianceSSH-based management of the appliance (optional)
  1. This traffic may not be monitored using the network traffic inspection tools due to high volume. You may choose not to open these ports in the standalone setups or in the environments with peer-to-peer replication to another appliance at the same data center. ↩

Previous

Unpacking and installing the Backup & Disaster Recovery appliance

Next

Configuring network settings of the Backup & Disaster Recovery appliance