Admin Guide 3.9.6 Solaris Revision:2037 Generated:02/10/2020 14:30 | Contents | Ii
Total Page:16
File Type:pdf, Size:1020Kb
High-Speed Endpoint Admin Guide 3.9.6 Solaris Revision:2037 Generated:02/10/2020 14:30 | Contents | ii Contents Introduction............................................................................................................... 6 Installation and Upgrades........................................................................................8 Before Upgrading or Downgrading......................................................................................................................8 Installing HST Endpoint.....................................................................................................................................10 Upgrade Follow up.................................................................................................................................11 Configuring the Firewall.................................................................................................................................... 12 Securing Your SSH Server.................................................................................................................................14 Changing and Securing the TCP Port....................................................................................................14 Configuring Transfer Server Authentication With the Host-Key Fingerprint........................................16 Testing a Locally Initiated Transfer................................................................................................................... 17 Updating the Product License............................................................................................................................ 18 Uninstalling......................................................................................................................................................... 18 Get Started with an Aspera Transfer Server.......................................................19 Get Started as a Transfer Client...........................................................................20 Comparison of Aspera File Delivery and Synchronization Tools...................... 20 Server Set up Methods...........................................................................................22 Set up Users and Groups.......................................................................................23 Setting Up Transfer Users.................................................................................................................................. 23 Setting Up a User's Public Key on the Server...................................................................................................25 Testing a User-Initiated Remote Transfer.......................................................................................................... 26 Configure the Server from the Command Line.................................................. 27 aspera.conf - Authorization Configuration.........................................................................................................27 aspera.conf - Transfer Configuration................................................................................................................. 29 Controlling Bandwidth Usage with Virtual Links (Command Line).................................................................44 Global Bandwidth Settings (Command Line)....................................................................................................47 Increasing Transfer Performance by Using an RTT Predictor...........................................................................48 aspera.conf - File System Configuration............................................................................................................49 aspera.conf - Transfer Server Configuration......................................................................................................56 aspera.conf - Filters to Include and Exclude Files............................................................................................ 57 Server-Side Encryption-at-Rest (EAR).............................................................................................................. 60 Reporting Checksums......................................................................................................................................... 61 Server Logging Configuration for Ascp and Ascp 4.........................................................................................64 Out-of-Transfer File Validation.......................................................................................................................... 67 Inline File Validation.......................................................................................................................................... 69 Inline File Validation with URI..........................................................................................................................71 | Contents | iii Inline File Validation with Lua Script............................................................................................................... 73 File Pre- and Post-Processing (Prepost)............................................................... 76 Setting Up Pre/Post Processing..........................................................................................................................76 Pre/Post Variables............................................................................................................................................... 77 Pre/Post Script Examples....................................................................................................................................79 Email Notifications................................................................................................. 80 Setting Up Email Notifications.......................................................................................................................... 80 Email Notification Examples..............................................................................................................................83 ascp: Transferring from the Command Line with Ascp.....................................84 Ascp Command Reference................................................................................................................................. 84 Ascp General Examples......................................................................................................................................99 Ascp File Manipulation Examples................................................................................................................... 101 Ascp Transfers with Object Storage and HDFS.............................................................................................. 103 Transfers with IBM Aspera On Demand and Cloud-Based HST Servers........................................... 103 Writing Custom Metadata for Objects in Object Storage.................................................................... 106 Using Standard I/O as the Source or Destination............................................................................................106 Using Filters to Include and Exclude Files......................................................................................................110 Symbolic Link Handling.................................................................................................................................. 115 Creating SSH Keys...........................................................................................................................................117 Reporting Checksums....................................................................................................................................... 118 Client-Side Encryption-at-Rest (EAR)............................................................................................................. 121 Ascp FAQs........................................................................................................................................................122 ascp4: Transferring from the Command Line with Ascp 4..............................124 Introduction to Ascp 4......................................................................................................................................124 Ascp 4 Command Reference............................................................................................................................124 Ascp 4 Transfers with Object Storage............................................................................................................. 132 Ascp 4 Examples.............................................................................................................................................. 132 Built-in I/O Provider.........................................................................................................................................133 Watch Folders and the Aspera Watch Service.................................................. 133 Introduction to Watch Folders and the Aspera Watch Service........................................................................ 133 Choosing User Accounts to Run Watch Folder Services................................................................................ 134 Creating, Managing, and Configuring Services...............................................................................................135