Admin Guide 3.9.6 Solaris Revision:2037 Generated:02/10/2020 14:30 | Contents | Ii

Admin Guide 3.9.6 Solaris Revision:2037 Generated:02/10/2020 14:30 | Contents | Ii

High-Speed Endpoint Admin Guide 3.9.6 Solaris Revision:2037 Generated:02/10/2020 14:30 | Contents | ii Contents Introduction............................................................................................................... 6 Installation and Upgrades........................................................................................8 Before Upgrading or Downgrading......................................................................................................................8 Installing HST Endpoint.....................................................................................................................................10 Upgrade Follow up.................................................................................................................................11 Configuring the Firewall.................................................................................................................................... 12 Securing Your SSH Server.................................................................................................................................14 Changing and Securing the TCP Port....................................................................................................14 Configuring Transfer Server Authentication With the Host-Key Fingerprint........................................16 Testing a Locally Initiated Transfer................................................................................................................... 17 Updating the Product License............................................................................................................................ 18 Uninstalling......................................................................................................................................................... 18 Get Started with an Aspera Transfer Server.......................................................19 Get Started as a Transfer Client...........................................................................20 Comparison of Aspera File Delivery and Synchronization Tools...................... 20 Server Set up Methods...........................................................................................22 Set up Users and Groups.......................................................................................23 Setting Up Transfer Users.................................................................................................................................. 23 Setting Up a User's Public Key on the Server...................................................................................................25 Testing a User-Initiated Remote Transfer.......................................................................................................... 26 Configure the Server from the Command Line.................................................. 27 aspera.conf - Authorization Configuration.........................................................................................................27 aspera.conf - Transfer Configuration................................................................................................................. 29 Controlling Bandwidth Usage with Virtual Links (Command Line).................................................................44 Global Bandwidth Settings (Command Line)....................................................................................................47 Increasing Transfer Performance by Using an RTT Predictor...........................................................................48 aspera.conf - File System Configuration............................................................................................................49 aspera.conf - Transfer Server Configuration......................................................................................................56 aspera.conf - Filters to Include and Exclude Files............................................................................................ 57 Server-Side Encryption-at-Rest (EAR).............................................................................................................. 60 Reporting Checksums......................................................................................................................................... 61 Server Logging Configuration for Ascp and Ascp 4.........................................................................................64 Out-of-Transfer File Validation.......................................................................................................................... 67 Inline File Validation.......................................................................................................................................... 69 Inline File Validation with URI..........................................................................................................................71 | Contents | iii Inline File Validation with Lua Script............................................................................................................... 73 File Pre- and Post-Processing (Prepost)............................................................... 76 Setting Up Pre/Post Processing..........................................................................................................................76 Pre/Post Variables............................................................................................................................................... 77 Pre/Post Script Examples....................................................................................................................................79 Email Notifications................................................................................................. 80 Setting Up Email Notifications.......................................................................................................................... 80 Email Notification Examples..............................................................................................................................83 ascp: Transferring from the Command Line with Ascp.....................................84 Ascp Command Reference................................................................................................................................. 84 Ascp General Examples......................................................................................................................................99 Ascp File Manipulation Examples................................................................................................................... 101 Ascp Transfers with Object Storage and HDFS.............................................................................................. 103 Transfers with IBM Aspera On Demand and Cloud-Based HST Servers........................................... 103 Writing Custom Metadata for Objects in Object Storage.................................................................... 106 Using Standard I/O as the Source or Destination............................................................................................106 Using Filters to Include and Exclude Files......................................................................................................110 Symbolic Link Handling.................................................................................................................................. 115 Creating SSH Keys...........................................................................................................................................117 Reporting Checksums....................................................................................................................................... 118 Client-Side Encryption-at-Rest (EAR)............................................................................................................. 121 Ascp FAQs........................................................................................................................................................122 ascp4: Transferring from the Command Line with Ascp 4..............................124 Introduction to Ascp 4......................................................................................................................................124 Ascp 4 Command Reference............................................................................................................................124 Ascp 4 Transfers with Object Storage............................................................................................................. 132 Ascp 4 Examples.............................................................................................................................................. 132 Built-in I/O Provider.........................................................................................................................................133 Watch Folders and the Aspera Watch Service.................................................. 133 Introduction to Watch Folders and the Aspera Watch Service........................................................................ 133 Choosing User Accounts to Run Watch Folder Services................................................................................ 134 Creating, Managing, and Configuring Services...............................................................................................135

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    313 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us