Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
        scp2 >>
            File Name Support
            scp2 Return Values
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


The following command-line parameters can be used to further specify the scp2 options.

  • -D debug_level_spec

    Sets debug level (syntax is module=level).

  • -d

    Forces target to be a directory.

  • -q

    Makes scp2 quiet (only fatal errors are displayed).

  • -Q

    Hides the progress indicator.

  • -p

    Preserves file timestamps.

  • -u

    Removes source files after copying.

  • -B

    Sets batch mode on.

  • --interactive

    Prompts whether to overwrite an existing destination file (does not work with -B).

  • -I

    Prompts whether to overwrite an existing destination file (does not work with -B).

  • --overwrite[=no]

    Prompts whether to overwrite existing destination file(s) (default: yes).

  • -r

    Recurses subdirectories.

  • -a[arg]

    Transfers files in ASCII mode. See manual page for description of optional argument.

  • --verbose

    Verbose mode, equivalent to -D 2.

  • -v

    Verbose mode, equivalent to -D 2.

  • -c cipher

    Selects encryption algorithm. Multiple -c options are allowed and a single -c flag can have only one cipher.

  • -S ssh2-path

    Tells scp2 where to find ssh2.

  • -P ssh2-port

    Tells scp2 which port sshd2 listens to on the remote machine.

  • -b buffer-size

    Defines maximum buffer size for one request (default 32768 bytes).

  • -N max_requests

    Defines maximum number of concurrent requests (default 10).

  • -m fileperm[:dirperm]

    Sets the default file/dir permission bits for upload.

  • -o ssh2-options

    Specifies additional options for ssh2. The format is -o "ConfigKeyword=value".

  • -i

    Specifies the identification file to give to ssh2. The identification file can also be specified in the configuration file.

  • -k dir

    Custom configuration directory where ssh2_config, hostkeys and userkeys are located.

  • -K

    Specifies the identity key file to give to ssh2. The specified key file is applied first. Multiple -K options are allowed. The key file can also be specified in the configuration file.

  • --version

    Displays version.

  • -V

    Displays version.

  • --help

    Displays help.

  • -h

    Displays help.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now