Link Search Menu Expand Document

Using Veeam Ports mapper tool

The Veeam ports tool simplifies finding network port requirements between backup infrastructure components. The output is a human readable spreadsheet listing source and target components roles, hostname and IP addresses, required protocol and ports between them and all related comments.

This tool is specially useful if to comply to Veeam Security best practices and deploy a segmented infrastructure as it will provide the complete list of network ports to open between all deployed servers.

How it works

Determining network requirements is based on the operations to perform with Veeam Backup and Replication, and on the underlying infrastructure available.

For example, it might be required to back up a MS-SQL guest on vSphere using VSS framework for consistency and log shipping for point in time recovery. This will necessitate an interaction between the following roles:

  • VBR server
  • proxy
  • repository
  • guest interaction proxy
  • MS-SQL guest

But still the infrastructure components must be defined, such as:

  • The proxy type (windows/Linux)
  • The proxy transport mode (Network block mode, storage integration, hot-add)
  • The repository type
  • The hypervisor administration tool (vSphere? ESXi?)

To guide through this selection process, the tool is using a tree-like decision assistance to narrow the possibilities as long as choices are made. Dropdown menus are dynamics, proposing only relevant options depending on previous choices.

Once all operations and infrastructure are defined, the tool will propose a list of the necessary roles. Each role can be defined as a component to be installed on a specific server.

It will then be time to decide how these roles will be distributed on the infrastructure. To do so, the tool will ask you to:

  • Define a list of servers composing the infrastructure
  • map each role on one or – if it is technically possible - many servers

Documentation

The documentation is accessible on the tool webpage Instructions tab located on the upper left corner includes a walkthrough example that should be read before using the tool.

Usage best practice

An effective use of this tool requires a precise knowledge of the way you intend to use Veeam. For example, Veeam Backup and Replication offers multiple ways to restore an item, each of them requiring specific communications between specific roles. The same occurs about the infrastructure. A proxy can be used multiple ways leading to different results.

Since handling a huge amount information at the same time can be difficult, it is recommended to use the tool in multiple simple sessions rather than one session comprising all the information.

Separating backup and restore operations is a good starting point. Once both results are downloaded in excel format, it is easy to merge them in a single file, manually removing redundant entries.

Common mistakes

All relevant operations shall be considered. The “Backup” operation will not consider restore, externalization (backup copy or capacity tiering) or replication. Each and any operation must be inputed.

Use the “Map” button. The most common mistake is forgetting to press the “Map” button beside the role/server map line at the step #4 of the process. This will lead to a void result.


Back to top

Copyright © 2019-2021 Solutions Architects, Veeam Software.