External kista
External kistas support labs with a trusted way to transfer data from an external user located outside HUNT Cloud and into a lab in HUNT Cloud.
Note
This page describes the practical aspects of external kista transfers. Head over to our External kista FAQ for more information on the service itself.
For external users
This section aims to give a technical description on how external users outside HUNT Cloud can connect and transfer data to our hosted SFTP service called external kista.
In short, external kistas are short-lived and hardened SFTP servers dedicated to transferring data. Please contact us if you require more information or run into trouble.
Technical requirements
As an external user outside HUNT Cloud, you will need to meet the following technical requirements to transfer data to/from a external kista.
All major operating systems such as Windows, MacOS and Linux are supported.
Network connection to HUNT Cloud
Your host organization might need to open it's network firewall in order for your computer to connect and transfer to the external kistas in HUNT Cloud. Below are the network details that your organizational IT department will need add such a firewall opening:
- External kista IP address:
129.241.176.121 - Port range:
2000-2128 - Protocol:
TCP
We will select one specific port number during the kista deployment. This will be forwarded in the transfer information to your HUNT Cloud party when the external kista has been setup.
SSH key pair
You will use a SSH public key to authenticate and access your kista instead of passwords. You must therefore send us such a key before we can deploy your kista. This section describes how to do this.
1. Generate a SSH key pair
We recommend that you create a dedicated SSH key pair for each kista transfer. Click on the section below for a step wise guide on how to generate a new key pair in Windows that you can use for your kista access.
How to generate a RSA SSH key pair on Windows 10 or higher using Open SSH
Open new Command Prompt window (WIN + R and type cmd.exe then hit Enter).
Generate rsa key pair in default location.
ssh-keygen -q -t rsa -b 4096 -f "%USERPROFILE%\.ssh\id_rsa" -N ""- Copy public key. This command will save it to a new text file and place it on your desktop.
type %USERPROFILE%\.ssh\id_rsa.pub > %USERPROFILE%\Desktop\ekista_pubkey.txt- Share the
ekista_pubkey.txtto your HUNT Cloud contact.
How to generate a RSA SSH key pair on OS X, macOS and Ubuntu
Open new Terminal
Generate a new dedicated RSA key pair.
bash
ssh-keygen -q -t rsa -b 4096 -f ~/.ssh/id_rsa -N ""- Copy the id_rsa key to your downloads directory.
bash
cat ~/.ssh/ekista.pub > ~/Downloads/ekista_pubkey.txt- Share the
ekista_pubkey.txtto your HUNT Cloud contact.
Accepted key types
We accept the following public key types:
- RSA
- ECDSA
- Ed25519
2. Share public SSH key with HUNT Cloud
After generating the SSH key pair, please share the public key (not the private one) with us. Send your new public key ekista_pubkey.txt as an email attachment to your HUNT Cloud contact that can forward your key to us as an attachment in their service order.
SFTP client
You will need a SFTP client to connect and transfer data to the external kista. For Windows, we recommend the WinSCP client. OS X, macOS and Ubuntu can use built in command line tools.
In addition to the SFTP software, you will need the external kista transfer information shipped by HUNT Cloud on the time of deployment to be able to connect.
Access information from HUNT Cloud
You will need the following information from HUNT Cloud to connect to your kista:
Host namePort numberUser name
Below is a guide on how to connect using the WinSCP SFTP client on Windows.
How to connect to an external kista on Windows with WinSCP
- In
WinSCP:- Click
New Session
- Click

- In the
Loginwindow:- Enter
ekista.hdc.ntnu.noasHost name - Enter the port number from the transfer information as
Port number(the number in the example will not work). - Enter the user name from the transfer information as
User name(the name in the example will not work). - Click
Advanced
- Enter

- In the
Advanced Site Settingswindow:- Select the
Authenticationpage in the sidebar - Uncheck the
Attempt 'keyboard-interactive' authenticationcheckbox - Enter the location of the
Private key file. If you followed the previous guide, then this should be the location of theekistaprivate key file. - Click
OK
- Select the

- In the
Loginwindow:- Click
Save
- Click

- In the
Save session as sitewindow:- Choose a
Site nameif required, combining theUser nameandHost name(the site name given in the example will not work). - Click
OK
- Choose a

- In the
Loginwindow:- Click
Login
- Click

- In the
Warningwindow:- Compare and verify that the appropriate
SHA-256 key fingerprintfrom the transfer information matches - Click
Yes
- Compare and verify that the appropriate

- In the
Authentication Bannerwindow:- Read the information banner to ensure you are connecting to correct kista
- Click
Continue

- In the
Key passphrasewindow:- Enter the passphrase for your private key. If you followed the previous guide, this should be the
ekista.ppkkey and passphrase that you set during the generation in the SSH key pair section above. - Click
OK
- Enter the passphrase for your private key. If you followed the previous guide, this should be the

- In
WinSCP:
- You should now be connect to the SFTP server
- Upload data in the
uploaddirectory

How to connect to an external kista on OS X, macOS and Ubuntu
You can connect to the kista from your local computer using the built in SFTP tool.
bash
# -- principal example
sftp -oPort=<port-number> <username>@ekista.hdc.ntnu.no
# -- practical example
sftp -oPort=2124 johndoe-importer@ekista.hdc.ntnu.noOnce logged in you can follow the examples from our internal kista guide for upload or download of data.
For internal users
Follow the examples from our internal kista guide.
Troubleshooting
Cannot connect to external kista
Confirm that you are using correct key to authenticate (based on guide above).
If correct key is used, there are few things that could be an issue.
connection is blocked by firewalls (organisational or on your local computer/virtual machine)
misconfiguration on HUNT Cloud side
- To get the correct idea on what could be an issue, you can share
nmaportraceroutelogs with HUNT Cloud in communication email
Nmap
This is a faster way to get results out of traceroute.
- Download and install nmap from official website.
https://nmap.org/download.html
- Run below code in command prompt or terminal (change port to match the one for your ekista transfer).
nmap -Pn --traceroute -p <port number> ekista.hdc.ntnu.no- Share output in communication email with HUNT Cloud.
Traceroute
- Run below code in command prompt or terminal (this might take a while)
traceroute -P TCP -p <port number> ekista.hdc.ntnu.noNote: on linux or macOS machines, you might need sudo permission.
- Share output in communication email with HUNT Cloud.