Link Menu Expand (external link) Document Search Copy Copied

Authentication protocols

Choose strong encryption algorithms for SSH. To communicate with Linux servers deployed as part of the backup infrastructure, Veeam Backup & Replication uses SSH. Make sure that for the SSH tunnel you use a strong and proven encryption algorithm, with sufficient key length. Ensure that private keys are kept in a highly secure place and cannot be uncovered by a 3rd party.

Since Veeam Backup & Replication v12, a kerberos-only architecture is possible so disable NTLM authentication whenever it’s possible.


Back to top

Copyright © 2019 - 2025 Solutions Architects, Veeam Software.
Please note that information provided in this guide is not produced or verified by Veeam R&D but is a result of community effort based on the field observations.