Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
        scp2 >>
        sftp2 >>
            File Name Support
            sftp2 Commands
            sftp2 Command Interpretation
            sftp2 Return Values
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


The following options are available:

  • -D debug_level_spec

    Debug mode. Makes sftp2 send verbose debug output. The debugging level is either a number (0-99), or a comma-separated list of assignments of the format ModulePattern=debug_level, for example *=10,sshd2=2.

  • -B batchfile

    Batch mode. Reads commands from a file instead of standard input. Since this mode is intended for scripts, sftp2 will not try to interact with the user, which means that only passwordless authentication methods will work. In batch mode, a failure to change the current working directory will cause sftp2 to abort. Other errors are ignored.

  • -S path

    Specifies the path to the ssh2 binary.

  • -h

    Prints the command syntax and exits.

  • -V

    Prints version information and exits.

  • -P port

    Specifies the port to be used.

  • -b buffer_size

    Specifies the size of the buffer.

  • -N max_requests

    Specifies the maximum number of allowed requests.

  • -c cipher

    Specifies the cipher to be used.

  • -m mac

    Specifies the MAC algorithm to be used.

  • -o ssh2-options

    Specifies options to give to ssh2. The option has the same format as a line in the configuration file. Comment lines are not accepted. Where applicable, egrep regex format is used.

  • -k dir

    Custom configuration directory where ssh2_config, hostkeys and userkeys are located.

  • user

    Specifies the username to use when connecting. (Optional)

  • host

    Specifies the host to connect to.

  • port

    Specifies the port on the host to connect to. (Optional)

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now