ascp: Transferring from the command line
Ascp is a scriptable FASP® transfer binary that enables the transfer to and from Aspera® transfer servers to which you have authentication credentials. Transfer settings are customizable and can include file manipulation on the source or destination, filtering of the source content, and client-side encryption-at-rest.
Ascp command reference The ascp executable is a command line FASP transfer program. This reference describes ascp syntax, command options, and supported environment variables.Ascp general examples Use the following Ascp examples to craft your own transfers.Ascp file manipulation examples Ascp can manipulate files and directories as part of the transfer, such as upload only the files in the specified source directory but not the directory itself, create a destination directory, and move or delete source files after they are transferred.Using standard I/O as the source or destination Ascp can use standard input (stdin) as the source or standard output (stdout) as the destination for a transfer. The syntax depends on the number of files in your transfer; for single files use stdio:// and for multiple files use stdio-tar:// . The transfer is authenticated by using SSH or a transfer token.Using filters to include and exclude files For example, on Windows FAT or NTFS (or directories) to transfer by indicating which to skip or include based on name matching. When no filtering rules are specified by the client, ascp transfers all source files in the transfer list.Symbolic link handling When transferring files by using FASP (the Aspera GUI, ascp , ascp4 , or async ), you can configure how the server and client handle symbolic links.Creating SSH keys from the command line Public key authentication (SSH Key) is a more secure alternative to password authentication that allows users to avoid entering or storing a password, or sending it over the network. Public key authentication uses the client computer to generate the key pair (a public key and a private key). The public key is then provided to the remote computer's administrator to be installed on that machine.Reporting checksums File checksums are useful for troubleshooting file corruption, allowing to determine at what point in the transfer file corruption occurred. Aspera servers can report source file checksums that are calculated in real time during transfer and then sent from the source to the destination.Client-Side Encryption-at-Rest (EAR) Aspera clients can set their transfers to encrypt content that they upload to a server while it is in transit and stored on the server, a process known as client-side encryption-at-rest (EAR). The client specifies an encryption password and the files are uploaded to the server with a .aspera-env extension. Anyone downloading these .aspera-env files must have the password to decrypt them, and decryption can occur as the files are downloaded or later once they are physically moved to a computer with no network connection.Comparison of ascp and ascp4 options Many command line options are the same for ascp and ascp4 ; however, some options are available for only one or the behavior of an option is different. The following table lists the options that are available only for Ascp or Ascp4 , and the options that are available with both. If the option behavior is different, the ascp option has ** added to the end and the difference is described following the table.Ascp FAQs Answers to some common questions about controlling transfer behavior, such as bandwidth usage, resuming files, and overwriting files.