If you’re evaluating IBM’s Aspera for high-speed file transferring within your organization, you may be wondering what ports the solution uses. Don’t worry. As an IBM Gold Business Partner, we’re here to answer all your questions about configuring the product within your organization.
Aspera Leverages SSH as Part of the FASP Protocol
Aspera has a list of best practices for using its solution seamlessly throughout your organization. And at the top of that list is the recommendation that you run the transfer server on a non standard SSH port, which defaults to 33001. This is especially important if your server lives in a DMZ, where it is vulnerable to port scan attacks.
Configuring Your Firewall
To best run Aspera on your Enterprise Server or Point-to-Point, follow these instructions to configure your firewall:
Configuring Your Client Machines
Most consumer and business firewalls allow client machines to create direct outbound connections on TCP and UDP. Therefore, there’s no client-side configuration needed in order for Aspera to work.
However, there are always exceptions that restrict direct outbound connections, such as proxy servers for Web browsing. If your organization meets this exception, you’ll need to perform the following client-side configurations:
Ask Us Your Aspera Configuration Questions
We know that organizations that consider Aspera for their high-speed file transfer needs spend a great deal of time researching how they’ll configure the solution if they choose to deploy it. You don’t need to go on a data dive yourself. As your trusted solution providers, we’re here to help you every step of the way as you evaluate IBM’s Aspera for your business so you can make the most informed decision possible.
To reach us, call us at (512) 766-8715 or email us at sales@pacgenesis.com.
As data transfer technology advances, we’re entering a transformative era where faster, more secure, and…
In today’s fast-paced e-commerce landscape, staying competitive means more than just offering great products and…
In today’s digital age, the loss of critical data can be devastating. Whether you're a…
Transferring files between devices, servers, and networks is a daily necessity for both individuals and…
As a trusted partner in cybersecurity, we know just how important it is to stay…
Secure and seamless file transfers can impact your productivity and trustworthiness, whether you’re sharing files…