Standard Installation |
Firewall settings required by the product.
Your Aspera transfer product requires access through the ports listed in the table below. If you cannot establish the connection, review your local corporate firewall settings and remove the port restrictions accordingly.
Product | Firewall Configuration |
---|---|
Enterprise Server | An Aspera server runs one SSH server on a configurable TCP port (22 by
default). Important:
Aspera strongly recommends running the SSH server
on a non-default port to ensure that your server remains secure from SSH
port scan attacks. Please refer to the topic Securing your SSH Server for detailed instructions on changing your
SSH port.
Your firewall should be configured as follows:
The firewall on the server side must allow the open TCP port to reach the Aspera server. Note that no servers are listening on UDP ports. When a transfer is initiated by an Aspera client, the client opens an SSH session to the SSH server on the designated TCP port and negotiates the UDP port over which the data transfer will occur. |
Connect Server | An Aspera server runs one SSH server on a configurable TCP port (22 by
default). Important:
Aspera strongly recommends running the SSH server
on a non-default port to ensure that your server remains secure from SSH
port scan attacks. Please refer to the topic Securing your SSH Server for detailed instructions on changing your
SSH port.
Your firewall should be configured as follows:
The firewall on the server side must allow the open TCP port to reach the Aspera server. Note that no servers are listening on UDP ports. When a transfer is initiated by an Aspera client, the client opens an SSH session to the SSH server on the designated TCP port and negotiates the UDP port over which the data transfer will occur. |
Client | Typically, consumer and business firewalls allow direct
outbound connections from client computers on TCP and UDP. There is no
configuration required for Aspera transfers in this case. In the special case of
firewalls disallowing direct outbound connections, typically using proxy servers
for Web browsing, the following configuration applies:
|