Veritas™ Resiliency Platform 2.2 Deployment Guide
- Section I. Overview and planning
- Overview of Resiliency Platform
- Recovery to premises using third-party replication technologies
- Recovery to premises using Resiliency Platform Data Mover
- Recovery to AWS using Resiliency Platform Data Mover
- Recovery to vCloud Using Resiliency Platform Data Mover
- System requirements
- Section II. Deploying and configuring the virtual appliances
- Section III. Setting up and managing the resiliency domain
- Setting up the resiliency domain
- Managing Infrastructure Management Servers
- Managing NetBackup and NetBackup Appliances
- Adding NetBackup master server
- Managing Veritas InfoScale Operations Manager Server
- Managing Resiliency Platform Data Mover gateway pairing
- Setting up the resiliency domain
- Section IV. Adding the asset infrastructure
- Managing asset infrastructure
- Preparing and maintaining host assets
- Managing Hyper-V virtualization server assets
- Managing VMware virtualization server assets
- About adding a host for discovery of VMware servers
- Managing enclosure assets
- About the discovery host for enclosures
- Configuration prerequisites for adding storage enclosures to an IMS
- Adding storage enclosures
- Adding RecoverPoint appliance for replication
- Managing asset infrastructure
- Section V. Managing users and global product settings
- Managing licenses
- Managing user authentication and permissions
- Configuring authentication domains
- Managing service objectives
- Managing reports
- Managing settings
- Section VI. Updating or uninstalling the product
- Updating Resiliency Platform
- Using YUM virtual appliance as YUM server
- Uninstalling Resiliency Platform
- Updating Resiliency Platform
- Section VII. Troubleshooting and maintenance
- Troubleshooting and maintenance
- Displaying risk information
- Troubleshooting and maintenance
- Section VIII. Reference
Network and firewall requirements
The following are the network requirements for Veritas Resiliency Platform:
Before you use the hostname and the IP address in the Network settings, you need to register them with the DNS server.
The hostname or the IP address which is used for product configuration, should not have multiple entries in the DNS server. For example, the IP address should not be associated with multiple hostnames, or the hostname should not be associated with multiple IP addresses.
Ensure that ports 88 and 750 on DNS server are open for communication with IMS.
In case of recovery to cloud, ensure that port 53 on DNS server is open for bi-directional communication with the cloud data center.
The hostname that you use for a virtual appliance must not start with a digit and must not contain the underscore ( _ ) character.
Veritas Resiliency Platform supports only Internet protocol version (IPV) 4.
If you plan to use the DHCP server, the DHCP server should be in the same subnet where you plan to deploy the product.
The following ports are used for Veritas Resiliency Platform:
Table: Ports used for Resiliency Manager
Ports used | Purpose | For communication between | Direction | Protocol |
---|---|---|---|---|
443 | Used for SSL communication | Resiliency Manager and web browser | Browser to Resiliency Manager | HTTPS, TLS v1.1+ |
14176 | Used for communication between the Resiliency Manager and Infrastructure Management Server (IMS) | Resiliency Manager and IMS | Bi-directional | HTTPS, TLS v1.1+ |
7001 | Used for database replication | Resiliency Manager and IMS | Bi-directional | TCP with SSL/TLS1.1+ |
389 | Used for communication with LDAP/AD server | Resiliency Manager and LDAP/AD server | Bi-directional | TCP, user provided |
636 | Used for communication with LDAP/AD server | Resiliency Manager and LDAP/AD server | Bi-directional | TCP with SSL/TLS, user provided |
22 | Used for communication between remote host to the appliance klish access | Appliance and the hosts | Bi-directional | TCP |
123 | Used for NTP synchronization | Appliance and the NTP server | Bi-directional | TCP |
14180 | Used for accessing API service | Resiliency Manager and the API service | Bi-directional | HTTS, TLSv1.1+ |
Table: Ports used for on-premises IMS and in-cloud IMS
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
14176 | Used for communication between the Resiliency Manager and Infrastructure Management Server (IMS) | Resiliency Manager and IMS | Bi-directional | HTTPS, TLSv1.1+ |
5634 | Used for IMS configuration | IMS and the hosts | Bi-directional | HTTPS, TLSv1.1+ |
14161 | Used for running the IMS console | Resiliency Manager and IMS | Resiliency Manager to IMS | HTTPS, TLSv1.1+ |
22 | Used for communication between remote host to the appliance klish access Used for remote deployment of the packages on remote UNIX host from IMS | IMS and the hosts | Bi-directional | TCP |
135 | Used for remote deployment on client computer (inbound) | Host and remote Windows hosts | Bi-directional | TCP |
123 | Used for NTP synchronization | Appliance and the NTP server | Bi-directional | TCP |
Table: Ports used for on-premises Replication Gateway and in-cloud Replication Gateway
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
33056 | Used for replication | On-premises virtual machine and Replication Gateway/Storage Proxy | Bi-directional | TCP |
5634 | Used for communication with IMS | IMS and Replication Gateway/Storage Proxy | Bi-directional | HTTPS, TLSv1.1+ |
8089 | Used for replication | in-cloud component and on-premises component | Bi-directional | TCP |
443 | Used for communication between paired Gateways | Paired Gateways | Bi-directional | HTTPS, TLS v1.1+ |
Table: Ports used for target Gateway in resync operation
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
67 | BOOTP server | Target Gateway enabled with DHCP role and physical host | Uni-directional | UDP |
68 | BOOTP client | Target Gateway enabled with DHCP role and physical host | Uni-directional | UDP |
69 | TFTP protocol | Target Gateway enabled with PXE role and physical host | Uni-directional | TCP/UDP |
Table: Ports used for virtual machines
Ports used | Description | For communication between | Direction | Protocol |
---|---|---|---|---|
22 | Used for communication between remote host to the appliance klish access Used for remote deployment of the packages on remote UNIX host from IMS | IMS and the hosts | Bi-directional | TCP |
5634 | Used for communication with IMS | IMS and the hosts | Bi-directional | HTTPS, TLSv1.1+ |
33056 | Used for replication | On-premises virtual machine and Replication Gateway | Bi-directional | TCP |
More Information