Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Configuring Network Topologies, Gateways & Firewall Routes

Commvault
03/25/2026
36
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Commvault uses port 8400 for communication and port 8403 for automatic tunneling when dynamic ports are blocked, requiring no additional network configuration in most environments.
  • Network topologies simplify firewall configurations by defining communication rules between server groups, with options for one-way routes (client-initiated only) and two-way routes (bidirectional).
  • Network gateways are dedicated agents placed in perimeter networks that authenticate, encrypt, and tunnel connections between external clients and internal infrastructure, supporting NAT operations.
  • Cascading gateway configurations enable secure communication across multiple network zones by chaining gateway agents that authenticate and encrypt tunnel connections between zones.

This technical tutorial provides a comprehensive walkthrough of Commvault network configuration options for managing communication between backup infrastructure components across firewalls and segmented networks. The video explains how Commvault components use both standard communication ports and dynamic ports for data transfer, with automatic tunneling capabilities that encapsulate traffic through port 8403 when dynamic ports are blocked. Administrators learn that network topology configuration is only necessary when default automatic tunneling cannot be used or when specific firewall rules require custom routing. The tutorial covers the key topology types available in Commvault, including one-way network routes where only one side can initiate connections (typically client servers connecting to infrastructure in untrusted zones like DMZs), and two-way network routes that allow bidirectional communication with port restrictions. Network gateways are explained as dedicated Commvault agents placed in perimeter networks that authenticate, encrypt, and tunnel connections between external and internal clients, with support for NAT operations. The video also addresses cascading gateway configurations for environments spanning multiple network zones, where gateways in each zone communicate with each other to maintain secure tunneled connections. Port forwarding scenarios are covered for situations where internal infrastructure is exposed through a single external IP address, allowing specific gateway ports to forward connections to internal servers. The demonstration portion walks through creating a cascading gateway topology in the Commvault interface, showing how to select client groups, configure infrastructure machines using manual groups or smart groups, and set advanced options including encryption, tunnel protocol selection, and parallel data transfer stream configuration.

Chapters

0:00 - Network Configuration Fundamentals
1:17 - When Configuration Is Required
2:04 - Network Topology Types
3:53 - Network Gateways
4:23 - Cascading Gateways
5:53 - Creating a Network Topology

Key Quotes

1:01 "There is no need to configure any network topologies or network routes in the convult software. The only requirement is that the communication port 8400 and tunnel port 8403 are open and accessible between the components."
1:33 "Convult software uses network topologies to simplify network configurations between server groups."
3:53 "The Commvault network gateway is a special configuration in which a dedicated Commvault agent is placed in a perimeter network that is configured to allow connections into the perimeter network."
4:05 "The network gateway authenticates, encrypts and allows the tunnel connections it accepts to connect the clients operating outside of the private network to clients operating inside of it."

Categories:
  • » Webinar Library » Commvault
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Network Configuration
  • Firewall Management
  • Network Topologies
  • Port Forwarding
  • Network Gateways
  • Tunneling
  • DMZ Architecture
  • Data Protection Infrastructure
  • Commvault Administration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Configuring Network Topologies, Gateways & Firewall Routes

              Upcoming Webinar Calendar

              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Findings
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-findings/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                30

                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                04/30/202610:00 AM ET
                • Apr
                  30

                  The New Economics of a VMware Exit

                  04/30/202601:00 PM ET
                  • May
                    06

                    Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                    05/06/202602:00 AM ET
                    • May
                      06

                      World Password Day: Strategies for Managing Your Passwords Effectively.

                      05/06/202610:00 PM ET
                      • May
                        07

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/07/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version