Supported platforms requirements
Last updated
Last updated
Connection URL: https://VCENTER_HOST
or https://ESXI_HOST
Source | Destination | Ports | Description |
---|---|---|---|
Connection URL: https://VCENTER_HOST
or https://ESXI_HOST
Source | Destination | Ports | Description |
---|---|---|---|
Connection URL: https://PRISM_HOST:9440/api/nutanix/v3
(Prism Central or Prism Elements)
Note: when connecting via Prism Central, the same credentials will be used to access all Prism Elements
Source | Destination | Ports | Description |
---|---|---|---|
Connection URL: https://KEYSTONE_HOST:5000/v3
Connection URL: https://KEYSTONE_HOST:5000/v3
Note: you also must provide SSH credentials to all hypervisors that have been detected during inventory sync
Connection URL: https://KEYSTONE_HOST:5000/v3
Note: you also must provide SSH credentials to all hypervisors that have been detected during inventory sync
Connection URL: https://MANAGER_HOST
Connection URL: https://MANAGER_HOST/ovirt-engine/api
Connection URL: https://MANAGER_HOST/ovirt-engine/api
Connection URL: https://MANAGER_HOST/ovirt-engine/api
Note: you also must provide SSH credentials to all hypervisors that have been detected during inventory sync
Connection URL: https://MANAGER_HOST/ovirt-engine/api
Connection URL: https://MANAGER_HOST:7002
Note: all hosts in the pool must be defined
Connection URL: https://API_HOST:6443
Connection URL: https://API_HOST:6443
Connection URL: https://MANAGER_HOST
Connection URL: https://MANAGER_HOST
Connection URL: https://MANAGER_HOST:8443
You can find more detailed descriptions of Office 365 URLs and IP address ranges on this page.
To successfully synchronize M365 user account, it must fulfill following requirements:
has an email,
is not filtered by location, country or office location (user filter in UI),
field user type
is set to Member
,
has a license or is a shared mailbox.
User vprotect
must be a member of group "disk".
Sudo privileges are required for the following commands:
Storware Backup & Recovery Node:
/usr/bin/targetcli
/usr/sbin/exportfs
/usr/sbin/kpartx
/usr/sbin/dmsetup
/usr/bin/qemu-nbd
/usr/bin/guestmount
/usr/bin/fusermount
/bin/mount
/bin/umount
/usr/sbin/parted
/usr/sbin/nbd-client
/usr/bin/tee
/opt/vprotect/scripts/vs/privileged.sh
/usr/bin/yum
/usr/sbin/mkfs.xfs
/usr/sbin/fstrim
/usr/sbin/xfs_growfs
/usr/bin/docker
/usr/bin/rbd
/usr/bin/chown
/usr/sbin/nvme
/bin/cp
/sbin/depmod
/usr/sbin/modprobe
/bin/bash
/usr/local/sbin/nbd-client
/bin/make
Storware Backup & Recovery server:
/opt/vprotect/scripts/application/vp_license.sh
/bin/umount
/bin/mount
PERMISSIVE - currently it interferes with the mountable backups (file-level restore) mechanism. Optionally can be changed to ENFORCING if the file-level restore is not required.
KODO for Endpoints client can be installed on the following operating systems:
Microsoft Windows 7 32-bit
Microsoft Windows 7 64-bit## VMware vCenter/ESXi
Connection URL: https://VCENTER_HOST
or https://ESXI_HOST
Connection URL: https://VCENTER_HOST
or https://ESXI_HOST
Microsoft Windows 8 32-bit
Microsoft Windows 8 64-bit
Microsoft Windows 8.1 64-bit
Microsoft Windows 8.1 64-bit
Microsoft Windows 10 32-bit
Microsoft Windows 10 64-bit
The following packages need to be installed on the operating system:
Microsoft Vistual C++ 2012 Redistributable (x64) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2012 Redistributable (x86) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2015-2019 Redistributable (x64) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x86.exe)
Microsoft Vistual C++ 2015-2019 Redistributable (x86) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x64.exe)
.NET Framework 4.7.2
The following packages need to be installed on the operating system:
Microsoft Vistual C++ 2012 Redistributable (x64) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2012 Redistributable (x86) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2015-2019 Redistributable (x64) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x86.exe)
Microsoft Vistual C++ 2015-2019 Redistributable (x86) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x64.exe)
.NET Framework 4.8
The following packages need to be installed on the operating system:
Microsoft Vistual C++ 2012 Redistributable (x64) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2012 Redistributable (x86) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2015-2019 Redistributable (x64) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x86.exe)
Microsoft Vistual C++ 2015-2019 Redistributable (x86) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x64.exe)
.NET Framework 4.8
The following packages need to be installed on the operating system:
Microsoft Vistual C++ 2010 x64 Redistributable package-10.0.40219 (https://www.microsoft.com/en-us/download/details.aspx?id=26999)
Microsoft Vistual C++ 2012 Redistributable (x64) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2012 Redistributable (x86) package-11.0.61030 (https://my.visualstudio.com/Downloads?pid=1452)
Microsoft Vistual C++ 2015-2019 Redistributable (x64) package-14.20.27508 (https://aka.ms/vs/16/release/vc_redist.x86.exe)
.NET Framework 4.8
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Source | Destination | Ports | Description |
---|---|---|---|
Node
vCenter/ESXi host
443/tcp
API access
Node
ESXi hosts
902/tcp
NBD transfer
Node
vCenter/ESXi host
443/tcp
API access
Node
ESXi hosts
902/tcp
NBD transfer
Node
Prism Elements (and optionally Prism Central if used)
9440/tcp
API access to the Nutanix manager
Node
Keystone, Nova, Glance, Cinder
ports that were defined in endpoints for OpenStack services
API access to the OpenStack management services - using endpoint type that has been specified in hypervisor manager details
Node
Ceph monitors
3300/tcp, 6789/tcp
if Ceph RBD is used as the backend storage - used to collect changed-blocks lists from Ceph
Node
Hypervisor
22/tcp
SSH access
Hypervisor
Node
netcat port range defined in node configuration - by default 16000-16999/tcp
optional netcat access for data transfer
Node
Ceph monitors
3300/tcp, 6789/tcp, 10809/tcp
if Ceph RBD is used as the backend storage - used for data transfer over NBD
Node
Hypervisor
22/tcp
SSH access
Hypervisor
Node
netcat port range defined in node configuration - by default 16000-16999/tcp
optional netcat access for data transfer
Node
Ceph monitors
3300/tcp, 6789/tcp, 10809/tcp
if Ceph RBD is used as the backend storage - used for data transfer over NBD
Node
Manager Host
XML-RPC API port - 2633/tcp by default
API access to the OpenNebula management services
Node
oVirt/RHV/OLVM manager
443/tcp
oVirt/RHV/OLVM API access
Node
oVirt/RHV/OLVM manager
443/tcp
oVirt/RHV/OLVM API access
Node
oVirt/RHV/OLVM hypervisor
54322/tcp
oVirt/RHV/OLVM ImageIO services - for data transfer (primary source)
Node
oVirt/RHV/OLVM manager
54323/tcp
oVirt/RHV/OLVM ImageIO services - for data transfer (fallback to ImageIO Proxy)
Node
oVirt/RHV/OLVM manager
443/tcp
oVirt/RHV/OLVM API access
Node
oVirt/RHV/OLVM hypervisor
22/tcp
SSH access for data transfer
oVirt/RHV/OLVM hypervisor
Node
netcat port range defined in node configuration - by default 16000-16999/tcp
optional netcat access for data transfer
Node
oVirt/RHV/OLVM manager
443/tcp
oVirt/RHV/OLVM API access
Node
oVirt/RHV/OLVM hypervisor
54322/tcp
oVirt/RHV/OLVM ImageIO services - for data transfer
Node
oVirt/RHV/OLVM manager
54323/tcp
oVirt/RHV/OLVM ImageIO services - for data transfer
Node
OVM manager
7002/tcp
OVM API access
Hypervisor
Node
If Node is hosting staging space: 111/tcp, 111/UDP, 2049/tcp, 2049/UDP, ports specified in /etc/sysconfig/nfs
- variables MOUNTD_PORT
(TCP and UDP), STATD_PORT
(TCP and UDP), LOCKD_TCPPORT
(TCP), LOCKD_UDPPORT
(UDP), otherwise please check the documentation of your NFS storage provider
if staging space (export storage repository) is hosted on the Node - NFS access
Node and hypervisor
shared NFS storage
check the documentation of your NFS storage provider
if staging space (export storage repository) is hosted on the shared storage - NFS access
Node
Hypervisor
443/tcp
API access (for data transfer management IP is used, unless transfer NIC
parameter is configured in hypervisor details)
Node
Hypervisor
443/tcp
API access (for data transfer management IP is used, unless transfer NIC
parameter is configured in hypervisor details)
Node
Hypervisor
10809/tcp
NBD access (data transfer IP is returned by hypervisor)
Node
Hypervisor
22/tcp
SSH access
Hypervisor
Node
netcat port range defined in node configuration - by default 16000-16999/tcp
optional netcat access for data transfer
Node
Ceph monitors
3300/tcp, 6789/tcp, 10809/tcp
if Ceph RBD is used as the backend storage - used for data transfer over NBD
Node
Hypervisor
22/tcp
SSH access
Hypervisor
Node
If Node is hosting staging space: 111/tcp, 111/UDP, 2049/tcp, 2049/UDP, ports specified in /etc/sysconfig/nfs
- variables MOUNTD_PORT
(TCP and UDP), STATD_PORT
(TCP and UDP), LOCKD_TCPPORT
(TCP), LOCKD_UDPPORT
(UDP), otherwise please check the documentation of your NFS storage provider
if staging space (export storage domain) is hosted on the Node - NFS access
Node and hypervisor
shared NFS storage
check the documentation of your NFS storage provider
if staging space (export storage domain) is hosted on the shared storage - NFS access
Node
Kubernetes API host
22/tcp
SSH access
Node
Kubernetes API host
6443/tcp
API access
Node
Kubernetes API host
6443/tcp
API access
Node
Openshift Workers
2049/tcp, 2049/udp
NFS connection
Openshift Workers
Node
2049/tcp, 2049/udp
NFS connection
Node
Openshift Workers
30000-32767/tcp
access to service exposed by Storware Backup & Recovery plugin
Node
Storware Backup & Recovery Agent
50881/tcp for http connection, 50882/tcp for https connection
Storware Backup & Recovery Agent access and data transfer, firewall rules are added automatically during agent installation
Node
Storware Backup & Recovery Agent
50881/tcp for http connection, 50882/tcp for https connection
Storware Backup & Recovery Agent access and data transfer, firewall rules are added automatically during agent installation
Node
SC//Platform manager
443/tcp
API access
Node
SC//Platform hosts
445/tcp
SMB transfer
SC//Platform hosts
Node
445/tcp
SMB transfer
Node
SC//Platform manager
443/tcp
API access
Node
Huawei FusionCompute VRM
8443/tcp
API access
Node
SC//Platform hosts
445/tcp
SMB transfer
SC//Platform hosts
Node
445/tcp
SMB transfer
Node
Microsoft 365
443/tcp
Microsoft 365 API access
OS Agent
Node
15900/tcp
Node - OS Agent communication
Node
vCenter/ESXi host
443/tcp
API access
Node
ESXi hosts
902/tcp
NBD transfer
Node
vCenter/ESXi host
443/tcp
API access
Node
ESXi hosts
902/tcp
NBD transfer