Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


NAKIVO Backup & Replication can read data directly from VMware VM disks located on SAN, bypassing the network, which can significantly increase job performance.
This is achieved with VMware's Direct SAN Access technology, which enables accessing source VM disks directly from the SAN. In order for the Direct SAN Access to work, the source Transporter (the one reading data from the source VM) should have access to the SAN. AlsoAdditionally, if you are using an iSCSI SAN, then you need to configure the iSCSI initiator on the machine where you plan to install the source Transporter (for more information, refer to Transporter Deployment for SAN Access).


When running on Linux, NAKIVO Backup & Replication utilizes the AppArmor service to access SAN.
This package is no longer available in the Ubuntu 16.04 distributive. To solve the problem with missing AppArmor service, please install the AppArmor service manually before deploying NAKIVO Backup & Replication (superuser privileges are required):

Code Block
apt-get install apparmor

If the NAKIVO Backup & Replication Transporter was already installed on Ubuntu 16.04+, install AppArmor service using the command above and re-run Transporter installation.
This will re-write configuration so SAN access will be enabled. If this doesn't help, uninstall the Transporter completely and install reinstall it back again.

Old Version of TLS in ESXi 5.5

Starting from NAKIVO Backup & Replication v7.5, TLS 1.0 which is used by ESXi 5.5, is not supported by default.
We recommend updating your vSphere environment to the latest version to avoid usage of using the old TLS. If this solution is not available, please create a configuration file on the machine where the source Transporter is installed: