HTTP Fallback serves as a secondary transfer method when the
Internet connectivity required for Aspera accelerated transfers (i.e., UDP port
33001, by default) is unavailable. When HTTP Fallback is enabled and UDP
connectivity is lost or cannot be established, the transfer will continue over the
HTTP protocol (or HTTPS protocol). The instructions below walk
through the process of setting up HTTP/HTTPS fallback. For additional information on
configuring different modes and testing, please refer to the Aspera KB Article
"HTTP fallback configuration, testing and
troubleshooting."
NOTE ON ENCRYPTION-AT-REST: When a transfer falls back to the HTTP (or HTTPS) protocol, Encryption-at-Rest is no
longer supported. If fallback occurs while downloading, then, despite
entering a passphrase, the files will remain encrypted (i.e., enveloped). If
HTTP Fallback occurs while uploading, then, despite entering a
passphrase, the files will not be encrypted (i.e., enveloped).
NOTE ON HTTPD: Ensure that your HTTP daemon (Aspera HTTPD) is
running with sufficient privileges, so that it can modify file ownership.
-
Turn on HTTP/HTTPS Fallback.
These instructions assume that you have already configured your Connect
Server's Web UI, as documented in the topic "Connect Server Web UI Settings." If you have not done
so, please review that topic before proceeding. To turn on HTTP/HTTPS
Fallback, you must edit the <WEB/> section of
aspera.conf. This configuration file can be found in
the following directory:
/Library/Aspera/etc/aspera.conf
If you do not see the <WEB/> section, you will need to
copy it from the file aspera-web-sample.conf, as described
in "Connect Server Web UI Settings." Within the
<WEB/> section, locate and confirm the following
entries:
<WEB
...
HttpFallback = "yes" <!-- Yes to turn on; No to turn off -->
HttpFallbackPort = "8080" <!-- Default: 8080 -->
HttpsFallbackPort = "8443" <!-- Default: 8443 -->
/>
If you modify aspera.conf, run the following command (from
Enterprise Server's bin directory) to validate your updated
configuration file:
$ /Library/Aspera/bin/asuserdata -v
-
Configure HTTP/HTTPS
Fallback settings.
To
edit your settings, launch Connect
Server and go to .
Review the following settings:
- Set Enable HTTP to
true.
- If you want to allow fallback over HTTPS, set
Enable HTTPS to true.
- Verify that the value shown for HTTP Port
matches that which is displayed in the aspera.conf
file, under the <WEB/> section (default: 8080).
Refer to Step 1 for additional information.
- (If applicable) Verify that the value shown for
HTTPS Port matches that which is displayed in the
aspera.conf file, under the
<WEB/> section (default: 8443). Refer to Step
1 for additional information.
-
Review additional HTTP Fallback settings.
Additional HTTP Fallback settings can be found under the
Connect Server GUI's HTTP Fallback tab:
# |
Field |
Description |
Values |
Default |
1 |
Cert File |
The absolute path to an SSL certificate file. If left blank,
the default certificate file that came with your Aspera Enterprise
Server will be used. |
file path |
blank |
2 |
Key File |
The absolute path to an SSL key file. If left blank, the
default certificate file that came with your Aspera Enterprise
Server will be used. |
file path |
blank |
3 |
Bind Address |
This is the network interface address on which the HTTP
Fallback Server listens. The default value 0.0.0.0 allows the Aspera
HTTP Fallback Server to accept transfer requests on all network
interfaces for this node. Alternatively, a specific network
interface address may be specified. |
valid IPv4 address |
0.0.0.0 |
4 |
Restartable Transfers |
Setting this to true allows interrupted
transfers to resume at the point of interruption. |
|
true |
5 |
Session Activity Timeout |
Any value greater than 0 sets the amount of time, in seconds,
that the HTTP Fallback Server will wait without any transfer
activity before canceling the transfer. Notice that this option
cannot be left at 0, otherwise interrupted HTTP Fallback sessions
will get stuck until server or asperacentral is
restarted. |
positive integer |
- |
6 |
HTTP Port |
The port on which the HTTP server listens. Valid port numbers
range between 1 and 65535.
|
positive integer |
8080 |
7 |
HTTPS Port |
The port on which the HTTPS server listens. Valid port numbers
range between 1 and 65535.
|
positive integer |
8443 |
8 |
Enable HTTP |
Enables the HTTP Fallback Server that allows failed UDP
transfers to continue over HTTP. |
|
false |
9 |
Enable HTTPS |
Enables the HTTPS Fallback Server that allows failed UDP
transfers to continue over HTTPS. |
|
false |
-
Specify a token encryption key.
The token encryption key is the secret text string that is used to authorize
transfers configured to require a token.
NOTE: If HTTP/HTTPS fallback is enabled, a
token encryption key is required. If HTTP/HTTPS is configured without
the encryption key, initiating a transfer with the download button
generates the following
error:
Error: internal error - unable to start token generation
You can specify a token encryption key from the
Aspera Enterprise/Connect Server GUI or in aspera.conf. To
configure your token encryption key within the GUI, launch your
Enterprise/Connect Server application and click
Configuration. Go to , check the option Token Encryption Key
and enter a key string of your choice (in the example below, the string
"secret").
To specify the token encryption key in aspera.conf, open the
file with a text editor, and add or update the
authorization section's encryption_key
(the example below uses the string "secret"; however, it
can be any string):
IMPORTANT NOTE: After changing your Aspera token settings
(either via aspera.conf or the GUI), you must
restart AsperaHTTPD. For instructions, see the
final step in this topic.
-
Restart Aspera Central and Aspera HTTPD to
apply new settings.
Run the following commands to restart
Aspera Central and Aspera
HTTPD:
$ sudo launchctl stop com.aspera.asperacentral
$ sudo launchctl start com.aspera.asperacentral
$ sudo launchctl stop com.aspera.asperahttpd
$ sudo launchctl start com.aspera.asperahttpd