SIRIS, ALTO, and NAS: BCDR networking and bandwidth requirements



This article describes the local and off-site networking requirements and best practices for Datto Business Continuity & Disaster Recovery (BCDR) appliances and the Datto Cloud Continuity for PCs solution.

As of January 3, 2017, Datto appliances no longer support SNMP.


  • Datto SIRIS
  • Datto ALTO
  • Datto NAS
  • Datto Cloud Continuity for PCs


By default, Datto disables local network access to the Datto device UI. You can enable local access under Configuration → Global Device Settings → Local Access Control in the Datto Device Web UI.

Network link speed requirements

A 100 Mbps network cannot efficiently transfer large datasets between the protected machines and a Datto appliance. You must have a gigabit network connection between all protected machines and the Datto appliance over your LAN.

All SIRIS 3 and 4 devices, as well as Datto NAS 3 and 4 series (except for the DN-3A), must use a gigabit connection. They will not function on a slower connection.

Datto strongly recommends placing the Datto appliance and all protected machines on the same LAN. If you must set up backups over a WAN, you will need a 50 Mbps dedicated uplink for every terabyte of protected data. Otherwise, backups will not be reliable. Even if you meet this requirement, the latency between endpoints will significantly decrease backup throughput. The higher the latency, the lower the performance.

Any device function performed through a site to site VPN/MPLS will be subject to degraded performance.

Network architecture considerations

Datto expects that you will deploy BDR appliances in a secure LAN environment. Inbound access from untrusted WAN hosts should be blocked at the edge of the network (via the router/firewall) to limit the accessibility of appliance network daemons and services. For more information, see Secure Deployment Best Practices For Datto Appliances.

WAN uplink considerations

To reliably synchronize with the Datto Cloud, ensure that your connection is at least 1 Mbps (125 KBps) uplink per terabyte of protected data stored locally on the Datto device. To check how much data your Datto appliance is currently protecting, see this article.

For every 1 Mbps of upload capacity that you dedicate to off-site traffic, you will be able to upload approximately 10 GB of change per day.


  • 2 Mbps of upload capacity would net approximately 20 GB of change uploaded per day.
  • 10 Mbps of upload capacity would net approximately 100 GB of change uploaded per day.
  • 100 Mbps of upload capacity would net approximately 1 TB of change uploaded per day.

Offsiting 1 TB of change over a 1 Mbps uplink will take approximately 100 days. For images this large, Datto recommends using the RoundTrip service to send the original base image offsite.

Network MTU considerations

The Datto appliance will most reliably communicate with our monitoring servers when you set the router's MTU size to 1500 bytes. Since the Datto appliance is also using a 1500 byte MTU size, this will prevent packet fragmentation, which can cause issues with communication to our monitoring servers.

Port access and IP whitelist requirements

Ports 25566 and 25568 (listed as 6001-47000 when WinNAT is enabled) must be open.

Depending on your network security configuration, you may need to whitelist for optimal device communication.

Additional port access requirements will vary, depending on the type of agent deployed. See the following resources for more information.

Agent-based and agentless solution requirements

For networking requirements specific to Datto's various agent and agentless backup solutions, see the following articles:

Internet access requirements for protected machines

Datto strongly recommends enabling IPMI on Datto appliances that include this feature and configuring the IPMI port with a static IPv4 address. Enabling IPMI will allow you to access the device for remote troubleshooting if you cannot access the GUI.
  • The Datto appliance must have access to the Datto Cloud for backup replication and remote device management. Also, all ICMP packets must be allowed through the firewall.
  • Datto recommends disabling any application-layer filtering of traffic destined for or originating from your Datto appliance.

For device management, to synchronize time, and to download operating system updates, all backup appliances must be able to resolve the following Datto sites in the local DNS:


For operating system maintenance, the Datto appliance must also be able to resolve the following community sites in the local DNS:

  • - Ubuntu managed Network Time Portal server, used to synchronize time
  • - Ubuntu managed application repository
  • - Ubuntu managed application repository
  • - Ubuntu managed application repository

All Datto appliances must have outbound access the following IP ranges for Cloud infrastructure, DNS failback, and device management: 

IP Range Ports UDP/TCP Purpose 53  Both  DNS
123 UDP  NTP 443 TCP  Datto Portal 443 TCP  Cloud restores 443 TCP Image / package server 443 and 80 TCP Device Web 21 TCP Bandwidth testing

80, 2200, and 443 TCP Device Web and cloud storage

The Datto appliance must have outbound access to port 22 (TCP) for data synchronization and port 1194 (TCP) for hybrid virtualizations, as well as VPN tunneling and off-site storage. Depending on your country, the Datto appliance will require outbound access to the following IP address ranges:

United States

  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Pennsylvania)
  • (Utah)
  • (Utah)
  • (Utah)
  • (Utah)


  • (Toronto)
  • (Calgary)
  • (Toronto)


  • (UK)
  • (Iceland)
  • (Germany)
  • (Germany)
  • (Germany)

ANZ (Australia and New Zealand)

  • (Sydney, Australia)
  • (Melbourne, Australia)


It is normal to see the Datto appliance repeatedly connecting to one or more of the IP addresses listed above as it checks in with our monitoring servers.

To learn which Cloud storage node your Datto device uses, open the backup appliance's GUI. On the Overview screen, you will see replication information similar to the example shown in Figure 1.

markdatto.pngFigure 1: Offsite server IP address (click to enlarge)

IPMI considerations

 IPMI access requires the local network to be within a private IP range (,, per IANA standards (external link).

Virtual SIRIS considerations

When performing an off-site hybrid virtualization on a virtual device bridged to your local network, ensure you have enabled promiscuous mode and forged transmits on the port group or virtual switch to which the vSIRIS is connected.

Additional Resources

Was this article helpful?

41 out of 48 found this helpful

You must sign in before voting on this article.

Want to talk about it? Have a feature request?

Head on over to our Datto Community Forum or the Datto Community Online.

For more Business Management resources, see the Datto RMM Online Help and the Autotask PSA Online Help .

Still have questions? Get live help.

Datto Homepage