4 4 3 Tigon:List of Ports Used by SEP sesam

From SEPsesam
Jump to: navigation, search

Copyright © SEP AG 1999-2018. All rights reserved.

Any form of reproduction of the contents or parts of this manual is allowed only with the express written permission from SEP AG. When compiling and designing user documentation SEP AG uses great diligence and attempts to deliver accurate and correct information. However, SEP AG cannot issue a guarantee for the contents of this manual.

Draft.png WORK IN PROGRESS
This page is a draft. Treat the information on this page with caution as it may be incomplete.
Docs latest icon.png Welcome to the latest SEP sesam documentation version 4.4.3 Tigon/4.4.3 Grolar. For previous documentation version(s), check Documentation archive.


Overview

SEP sesam client-server communication requires certain TCP ports to be open to enable SEP sesam components to communicate with each other through a firewall. Daemons are specific to the SEP sesam Client/SEP sesam Server/RDS installation and are using different port numbers.

By default, SEP sesam uses random ports which are specified by the operating system. However, if you want to back up a client which is behind a firewall, you must manually define the relevant ports in the client configuration in GUI: Main Selection -> Components -> Clients -> Client properties (Client or Options tab).

Port numbers

Use the following information to specify the ports used by SEP sesam daemons.

Port numbers for SEP sesam Server

Port number         Description
11301               Control unencrypted            (Client properties -> Access Mode  -> select CTRL)
11322               Control encrypted              (Client properties -> Access Mode  -> select SMSSH)
11001               Data over FTP                  (Client properties -> Interfaces -> enter <hostname>)
11000               Data over HTTP                 (Client properties -> Interfaces -> enter <http://hostname>)
11443               Data over HTTPS                (Client properties -> Interfaces -> enter <https://hostname>)
11401               Listen remote Java GUI/WEB UI
11403               Listen REST API
11701+drive number  Replication and source-side deduplication port, for example:
                          *If you replicate from dedup drive 2 (source) to the RDS drive 5 (target), the port 
                          is 11703 (daemon on the machine with drive 2).
                          *If you replicate from dedup drive 5 (source) to the RDS drive 2 (target), the port 
                          is 11706 (daemon on the machine with drive 5).

Port numbers for SEP sesam Client

Port number       Description
11301             Control plain                (Client properties -> Access Mode  -> select CTRL)
11322             Control encrypted            (Client properties -> Access Mode  -> select SMSSH)
11000             Data over HTTP               (Client properties -> Interfaces -> enter <http://hostname>)
11443             Data over HTTPS              (Client properties -> Interfaces -> enter <https://hostname>)
11002-11007       Port range for data over FTP (Client properties -> Options tab  -> Firewall Settings -> enter portrange in STPD options)

Port numbers for RDS

Port number         Description
11301               Control plain                  (Client properties -> Access Mode  -> select CTRL)
11322               Control encrypted              (Client properties -> Access Mode  -> select SMSSH)
11001               Data over FTP                  (Client properties -> Interfaces -> enter <hostname>)
11000               Data over HTTP                 (Client properties -> Interfaces -> enter <http://hostname>)
11443               Data over HTTPS                (Client properties -> Interfaces -> enter <https://hostname>)
11701+drive number  Replication and source-side deduplication port, for example:
                          *If you replicate from dedup drive 2 (source) to the RDS drive 5 (target), the port 
                          is 11703 (daemon on the machine with drive 2).
                          *If you replicate from dedup drive 5 (source) to the RDS drive 2 (target), the port 
                          is 11706 (daemon on the machine with drive 5).

See also

Configuring ClientsFirewalls