Veritas™ Resiliency Platform 2.2 Update 3 Release Notes
- Overview
- System requirements
- Fixed issues
- Known issues
- Known issues: Resiliency Platform Data Mover
- Known issues: Recovery to Amazon Web services (AWS)
- Known issues: NetBackup integration
- Known issues: Recovery to vCloud
- Limitations
- Appendix A. Virtual appliance security features
Network and firewall requirements
The following are the network requirements for Veritas Resiliency Platform:
Before you use the hostname and the IP address in the Network settings, you need to register them with the DNS server.
The hostname or the IP address which is used for product configuration, should not have multiple entries in the DNS server. For example, the IP address should not be associated with multiple hostnames, or the hostname should not be associated with multiple IP addresses.
Ensure that ports 88 and 750 on DNS server are open for communication with IMS.
In case of recovery to cloud, ensure that port 53 on DNS server is open for bi-directional communication with the cloud data center.
The hostname that you use for a virtual appliance must not start with a digit and must not contain the underscore ( _ ) character.
Veritas Resiliency Platform supports only Internet protocol version (IPV) 4.
If you plan to use the DHCP server, the DHCP server should be in the same subnet where you plan to deploy the product.
The following ports are used for Veritas Resiliency Platform:
Table: Ports used for Resiliency Manager
Ports used | Purpose | For communication between | Direction | Protocol |
---|---|---|---|---|
443 | Used for SSL communication | Resiliency Manager and web browser | Browser to Resiliency Manager | HTTPS, TLS v1.1+ |
14176 | Used for communication between the Resiliency Manager and Infrastructure Management Server (IMS) | Resiliency Manager and IMS | Bi-directional | HTTPS, TLS v1.1+ |
7001 | Used for database replication | Resiliency Manager and IMS | Bi-directional | TCP with SSL/TLS1.1+ |
389 | Used for communication with LDAP/AD server | Resiliency Manager and LDAP/AD server | Bi-directional | TCP, user provided |
636 | Used for communication with LDAP/AD server | Resiliency Manager and LDAP/AD server | Bi-directional | TCP with SSL/TLS, user provided |
22 | Used for communication between remote host to the appliance klish access | Appliance and the hosts | Bi-directional | TCP |
123 | Used for NTP synchronization | Appliance and the NTP server | Bi-directional | TCP |
14180 | Used for accessing API service | Resiliency Manager and the API service | Bi-directional | HTTS, TLSv1.1+ |
Table: Ports used for on-premises IMS and in-cloud IMS
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
14176 | Used for communication between the Resiliency Manager and Infrastructure Management Server (IMS) | Resiliency Manager and IMS | Bi-directional | HTTPS, TLSv1.1+ |
5634 | Used for IMS configuration | IMS and the hosts | Bi-directional | HTTPS, TLSv1.1+ |
14161 | Used for running the IMS console | Resiliency Manager and IMS | Resiliency Manager to IMS | HTTPS, TLSv1.1+ |
22 | Used for communication between remote host to the appliance klish access Used for remote deployment of the packages on remote UNIX host from IMS | IMS and the hosts | Bi-directional | TCP |
135 | Used for remote deployment on client computer (inbound) | Host and remote Windows hosts | Bi-directional | TCP |
123 | Used for NTP synchronization | Appliance and the NTP server | Bi-directional | TCP |
Table: Ports used for on-premises Replication Gateway and in-cloud Replication Gateway
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
33056 | Used for replication | On-premises virtual machine and Replication Gateway/Storage Proxy | Bi-directional | TCP |
5634 | Used for communication with IMS | IMS and Replication Gateway/Storage Proxy | Bi-directional | HTTPS, TLSv1.1+ |
8089 | Used for replication | in-cloud component and on-premises component | Bi-directional | TCP |
443 | Used for communication between paired Gateways | Paired Gateways | Bi-directional | HTTPS, TLS v1.1+ |
Table: Ports used for target Gateway in resync operation
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
67 | BOOTP server | Target Gateway enabled with DHCP role and physical host | Uni-directional | UDP |
68 | BOOTP client | Target Gateway enabled with DHCP role and physical host | Uni-directional | UDP |
69 | TFTP protocol | Target Gateway enabled with PXE role and physical host | Uni-directional | TCP/UDP |
Table: Ports used for virtual machines
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
22 | Used for communication between remote host to the appliance klish access Used for remote deployment of the packages on remote UNIX host from IMS | IMS and the hosts | Bi-directional | TCP |
5634 | Used for communication with IMS | IMS and the hosts | Bi-directional | HTTPS, TLSv1.1+ |
33056 | Used for replication | On-premises virtual machine and Replication Gateway | Bi-directional | TCP |