Port customization using the registry
The modern enterprise data center is characterized by a high degree of complexity, where a multitude of services, security agents, and infrastructure management tools compete for finite network resources. At the heart of this complexity lies the challenge of network orchestration, particularly the management of TCP and UDP ports. For data protection architects utilizing Veeam Backup & Replication, the default port assignments for various services—while designed for ease of use—frequently encounter conflicts with existing environment constraints.
The ability to pivot away from these defaults is not merely a technical convenience but a prerequisite for maintaining operational continuity, satisfying security compliance, and ensuring the seamless deployment of backup agents across heterogeneous environments.
Conflicts in with default network topologies
The initial deployment of Veeam Backup & Replication typically proceeds with the assumption that the standard communication channels are unobstructed and unoccupied. The Veeam Deployer Service, which manages the lifecycle of components on remote managed servers, defaults to TCP port 6160. Similarly, the Veeam Transport Service, responsible for the actual movement of backup data between the source and the repository, defaults to TCP port 6162. In a vacuum, these assignments are sufficient; however, real-world deployments are rarely conducted in a vacuum
The evolution of the Veeam platform itself introduces new network requirements that can clash with existing infrastructure. The transition to Veeam VBR version 13 has highlighted a significant architectural shift, requiring port 443 for critical update and management functions. In scenarios where the Veeam Backup & Replication (VBR) server is co-located on a physical host that also serves as a Hyper-V Replication server or hosts a mission-critical web application, port 443 is often already claimed. This necessitates a complex reconfiguration process where administrators must choose between moving the conflicting application or modifying the backup infrastructure’s network profile. This is particularly challenging for smaller organizations where dedicated hardware for separate roles is not always economically viable, leading to high-density service co-location.
Security hardening is another primary driver for port customization. The implementation of an Veeam Hardened Repository (VHR) requires a minimal attack surface. Administrators frequently seek to move management services away from well-known ports to obfuscate the infrastructure from automated scanning tools. Additionally, automated firewall management features within Veeam may inadvertently open ports on all active network interfaces, including public-facing ones, posing a risk in multi-homed systems. Restricting these services to specific ports on isolated management networks is a core practice of Zero Trust strategies.
The standard list
It is necessary to categorize the primary default ports utilized within the Veeam VBR ecosystem. The following table provides an overview of the essential communication channels that are subject to modification requirements.
Service Component |
Direction |
Protocol |
Default Port |
Functional Description |
|
Veeam Deployer Service |
VBR Server to Target |
TCP |
6160 |
Deployment and management of Linux components. |
|
Veeam Transport Service |
VBR Server to Target |
TCP |
6162 |
Data mover management and certificate exchange. |
|
Veeam Data Mover |
Source to Target |
TCP |
2500–3300 |
Dynamic range for actual data transmission. |
|
Management Agent |
Tenant to Cloud Gateway |
TCP |
6180 |
Management traffic in Service Provider environments. |
|
Cloud Gateway |
VBR Server |
TCP |
6169 |
Listening for incoming cloud commands from tenants. |
|
VSPC Web UI |
Console Server |
TCP |
1989 |
Communication between UI and management server. |
|
Veeam License Server |
Server to Web |
TCP |
443 |
Automated license updates and usage reporting. |
|
Enterprise Manager |
Web UI |
TCP |
9392 |
Web-based management interface for VBR. |
Port Determination: Logic Priority and Architectural Hierarchy
When Veeam Backup & Replication initiates a deployment task, the system evaluates several configuration layers to determine the target ports. This hierarchy is designed to provide maximum flexibility, allowing for global defaults to be overridden by more granular, group-specific settings. Understanding this logic is important for administrators who need to apply unique settings to specific network zones—such as a DMZ or a remote branch office—without disrupting the primary data center configuration.
The determination logic follows a strict three-tier priority system :
- Protection Group-Specific Overrides: The system first queries the registry (on Windows) or the configuration file (on the Linux appliance) for settings specific to the Protection Group ID. If a custom port is mapped to that specific ID, it takes precedence over all other settings.
- Global Custom Overrides: If no Protection Group-specific value is found, the system checks for a global custom port configuration. This applies a universal change to all new deployments across the entire backup infrastructure.
- Hardcoded System Defaults: In the absence of any custom configuration, the system reverts to the default ports (6160 and 6162).
Important to know
The customization of these ports only impacts deployments that occur after the registry values or configuration entries have been created. For existing agents, the ports remain at their previous settings unless the agent is removed and redeployed or the port is manually changed on the target host through the command-line interface.
Customizing Ports on Windows-Based VBR Servers
For environments managed by a Windows-based Veeam Backup & Replication server, the Windows Registry serves as the primary orchestration engine for port customization. Modification of these values requires administrative privileges and a restart of the Veeam services to ensure the internal deployment logic is refreshed.
Global Port Configuration
When the objective is to move eg. all future Linux agent deployments to a new port standard—for instance, to align with an organization-wide policy that reserves the 6000-range for other purposes—global registry keys are utilized.
To modify the Global Custom Deployer Service Port
- Path: HKLM\SOFTWARE\Veeam\Veeam Backup and Replication
- Name: AMCustomLinuxDeployerPort
- Type: REG_DWORD
This defines the port used by the veeamdeployment service.
To modify the Global Custom Transport Service Port
- Path: HKLM\SOFTWARE\Veeam\Veeam Backup and Replication
- Name: AMCustomDataMoverPort
- Type: REG_DWORD
Protection Group-Specific Configuration
In complex network topologies, different segments may require different port configurations. This is common in Service Provider environments where different tenants may have unique firewall constraints. Implementing these changes requires identifying the Protection Group ID via the Veeam PowerShell.
To modify the Protection Group-Specific Deployer Port
- Path: HKLM\SOFTWARE\Veeam\Veeam Backup and Replication
- Name: AMProtectionGroupCustomDeployerPort
- Type: REG_SZ (String)
To modify the Protection Group-Specific Transport Port
- Path: HKLM\SOFTWARE\Veeam\Veeam Backup and Replication
- Name: AMProtectionGroupCustomDataMoverPort
- Type: REG_SZ (String)
Format: PG_ID:port.
Time Synchronization and infrastructure health can cause troubles
Security Hardening and Zero Trust Implementation
|
Environment |
Specificity |
Registry Value / Config Key |
Data Type |
|
Windows VBR |
Global |
AMCustomLinuxDeployerPort |
REG_DWORD |
|
Windows VBR |
Global |
AMCustomDataMoverPort |
REG_DWORD |
|
Windows VBR |
PG-Specific |
AMProtectionGroupCustomDeployerPort |
REG_SZ |
|
Windows VBR |
PG-Specific |
AMProtectionGroupCustomDataMoverPort |
REG_SZ |
|
Linux Appliance |
Global |
AMCustomLinuxDeployerPort |
Integer |
|
Linux Appliance |
Global |
AMCustomDataMoverPort |
Integer |
|
Linux Appliance |
PG-Specific |
AMProtectionGroupCustomDeployerPort |
String |
|
Linux Appliance |
PG-Specific |
AMProtectionGroupCustomTransportPort |
String |
Note: Protection Group IDs are required for all group-specific overrides and can be retrieved via the Get-VBRProtectionGroup PowerShell cmdlet.
