Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
            Synopsis
            Options
            ssh2 Return Values
        scp2 >>
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>

Options

The following options are available:

  • -l login_name

    Logs in using this username.

  • +a

    Enables authentication agent forwarding.

  • -a

    Disables authentication agent forwarding.

  • +x

    Enables X11 connection forwarding.

  • -x

    Disables X11 connection forwarding.

  • -k dir

    Custom configuration dir where ssh2_config, hostkeys and userkeys are located.

  • -i file

    Specifies the identification file for public-key authentication. This option ca also be specified in the configuration file.

  • -F file

    Reads an alternative configuration file.

  • -t

    Tty; allocates a tty even if command is given.

  • -v

    Verbose; displays verbose debugging messages. Equivalent to -d 2.

  • -d level

    Sets debug level.

  • -V

    Displays version string.

  • -q

    Quiet; does not display any warning messages.

  • -c cipher

    Selects encryption algorithm. Multiple -c options are allowed and a single -c flag can have only one cipher.

  • -m MAC

    Selects MAC algorithm. Multiple -m options are allowed and a single -m flag can have only one MAC.

  • -p port

    Connects to this port. Server must be on the same port.

  • -S

    Does not request a session channel.

  • -L listen-port:host:port

    Forwards local port to remote address.

    This causes ssh2 to listen to connections on a port, and forward them to the other side by connecting to host:port.

  • -R listen-port:host:port

    Forwards remote port to local address.

    This causes ssh2 to listen to connections on a port, and forward them to the other side by connecting to host:port.

  • -g

    Gateways ports, which means that remote hosts may connect to locally forwarded ports. Note the logic of + and - in this option.

  • +g

    Does not gateway ports. Listens to tunneling connections originating only from the localhost. Note the logic of + and - in this option.

  • +C

    Enables compression.

  • -C

    Disables compression.

  • -E prov

    Uses prov as the external key provider.

  • -I initstr

    Uses initstr as initialization string for the external key provider.

  • -o options

    Processes the option as if it was read from a configuration file. The format is -o "ConfigKeyword=value".

  • -h

    Displays help.

  • -K

    Specifies the identity key file for public-key authentication that is applied first. Multiple -K options are allowed. This option can also be specified in the configuration file.

The command can be either of the following:

  • remote_command [arguments] ...

    Runs the command on a remote host.

  • -s service

    Enables a service in remote server.

Type ssh2 -h to see the command-line syntax, the location of the configuration files, supported ciphers, and your license type.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more