Only the initial connections are mediated by Crashplan.com.
I've been running CrashPlan as you suggested for the past several months.
My (initial) configuration did NOT involve opening port 4242 (used for all peer-to-peer communications) and it worked flawlessly as long as computers stayed where they were set up. However, when laptops moved to locations behind different routers, CrashPlan often could not make a connection until they came back to their initial locations. (See below for more details.)
For example, my mother's laptop backed up remotely from her house, which is where I'd configured it; CrashPlan traversed just fine through both her firewall and mine without either having 4242 open on either. But when she went to other locations, CrashPlan reported that it couldn't make a connection unless I open 4242 on my side.
Is there something about the *initial* connection that is stored and therefore is easier to make again? Is more information/negotiation required to connect at at new location?
CrashPlan Support says that I must open 4242 for peer-to-peer, remote backups:
CrashPlan Support said:
Jake B. (CrashPlan Support)
May 24 10:31 am (CDT)
Nello,
Unfortunately CrashPlan will require you to have ports 4242 open for inbound and outbound traffic if you want to achieve peer-to-peer backups. This is something that is required by the application and cannot be changed.
If you are attempting to access CrashPlan Central in anyway, that will require port 443 to be open for inbound and outbound traffic.
Have these ports open allows CrashPlan to backup to your archive but also report information back to the CrashPlan application to ensure your backup archives are accurate and consistant. The method in which the data is sent will be encrypted before being sent anywhere, so your data is safe during the transfer.
Please let me know if you have additional questions.
Thanks,
Jake
I feel uneasy about opening a port on my firewall that forwards into my LAN.
Is my concern reasonable? Is there something else that I should do to mitigate risks from port forwarding?
As always, thank you for your time and attention!
- nello
Configuration
Network: ATT Uverse broadband service using a 2Wire modem/router connecting to an ASUS RT-N16 flashed with Tomato Firmware 1.28.0000 MIPSR2-102 K26 USB AIO. (I use this firmware for its OpenVPN service.)
CrashPlan Server Hardware: iMac 27" 2010 (aka "Argus") uses drive mounted via AFP on FreeNAS server with 16GB RAM and four Western Digital 3TB Red NAS drives configured as RAIDZ2.
CrashPlan Client Hardware: MacBook Air 13" 2012 ("Decartes"); MacBook Air 11" 2012 ("Champagne"); MacBook Pro 13" 2012 ("Traveler").
Client Connections: Argus (wired LAN); Descartes, and Champagne (WiFi "G" LAN); Traveler (WAN)
Reliability
Argus never fails.
Descartes and Champagne work flawlessly locally; they do not backup from wireless access points away from home, i.e., outside of my firewall.
Traveler is my mother's computer and as long as she uses her home Comcast connection to the Internet, her backups kickoff like clockwork; there is never a problem. Unfortunately, when she travels, she connects to Argus at some locations and not at others.
Attempts to Improve Reliability
I presume that all of these reliability issues are routing problems.
I had assumed that Traveler working from my mother's home implied that port 4242 on Argus (used by CrashPlan) was accessible from the Internet. CrashPlan recommends testing connectivity by trying to make a telnet connection to port 4242. Unfortunately, this test fails consistently from outside my firewall using my dyndns domain, ***.dyndns.biz, e.g, telnet ***.dyndns.biz 4242. So, I set up the Asus to forward port 4242 to Argus (after assigning Argus a static IP address). Voilà, the telnet test passed and Traveler made a connection to Argus from a location where it had always failed before.
After reflecting further on these results, I thought that the erratic connections to Argus' port 4242--works from some locations, not others--might have been the result of inadvertently double NATing the 2Wire and Asus routers. Apparently, the only way to turn off NAT on the 2Wire is to create a DMZ between it and the Asus, which I did. Unfortunately, the telnet test still fails without forwarding port 4242 to Argus.