Veritas Velocity™ User's Guide
- Getting to know Velocity
- Setting up Velocity
- How to set up the Velocity Storage Server
- How to set up the Velocity Client
- Setting up the Velocity on-premises management server
- Upgrading Velocity
- Velocity Storage Server
- Users and roles
- Oracle database ingestion using Velocity
- How to use copy preparation to mask or sanitize sensitive data
- Oracle database ingestion using NetBackup CoPilot
- Microsoft SQL Server database ingestion using Velocity
- Database sources and copies
- About scheduling ingestions for a database source
- Retention periods for database sources and copies
- Sandboxes
- Database recovery
- Alerts and logs
- Managing the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- About WAN optimization on the Velocity physical appliance
- About the Veritas Remote Management Console on the Velocity physical appliance
- About Velocity physical appliance storage
- About users on the Velocity physical appliance
- About Velocity physical appliance checkpoints
- About factory reset on the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- Monitoring the Velocity physical appliance
- Velocity physical appliance security
- About Velocity physical appliance user account privileges
- About the Velocity physical appliance intrusion detection system
- About Velocity physical appliance operating system security
- Recommended IPMI settings on the Velocity physical appliance
- Best practices
- Troubleshooting
- Glossary
- Context-sensitive topics
- Section I. Velocity shell menu commands
- Introduction
- Appendix A. Main > Manage > Storage
- Appendix B. Main > Manage > Cloud
- Appendix C. Main > Manage > Software
- Appendix D. Main > Monitor
- Appendix E. Main > Network
- Appendix F. Main > Settings
- Appendix G. Main > Support
About the Velocity physical appliance ports
In addition to the ports used by the Velocity software, the Velocity Appliance uses additional ports for appliance-specific features, such as the in-band and out-of-band management interfaces.
Table: Inbound ports
Port | Service | Description |
---|---|---|
22 | SSH | In-band Velocity shell menu |
80 | HTTP | Out-of-band Veritas Remote Management Console |
443 | HTTPS | Out-of-band Veritas Remote Management Console |
5900 | KVM | Velocity shell menu access; ISO and CD-ROM redirection |
623 | KVM | (optional, used if open) |
7578 | RMM | Velocity shell menu access |
5120 | RMM | ISO & CD-ROM redirection |
5123 | RMM | Floppy redirection |
7582 | RMM | KVM |
5124 | HTTPS | CD-ROM |
5127 | USB or floppy | |
2049 | HTTPS | NFS Note: Once the NFS service is shut down, the vulnerability scanners do not pick up these ports as threats. |
445 | CIFS (for the log and install shares) |
Note:
Ports 7578, 5120, and 5123 are for the unencrypted mode. Ports 7528, 5124, and 5127 are for the encrypted mode.
Table: Outbound ports
Port | Service | Description |
---|---|---|
443 | HTTPS | Call Home (AutoSupport) |
162** | SNMP | Outbound traps and alerts Note: This port number can be changed within the appliance configuration to match the remote server. |