Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>
        ssh2 >>
            File Name Support
            scp2 Return Values
        sftp2 >>
        ssh-keygen2 >>
        ssh-cmpclient >>
        ssh-certview >>


scp2.exe is a Windows port of the Unix scp2 tool.

scp2 (Secure Copy 2) is used to securely copy files over the network. The program uses the Secure Shell version 2 protocol for data transfer, and uses the same authentication and provides the same security as ssh2. scp2 will ask for passwords or passphrases if they are needed for authentication.

Any file name may contain a host, user and port specification to indicate that the file is to be copied to or from that host. Copies between two remote hosts are permitted.

scp2 uses the same host keys and user keys as the graphical client. The default location for these files is the directory used to store the user profile. The -k switch can be used to override the default location. Certificate authentication can be used in some configurations with scp2, but scp2 exists for scripting purposes and certificate usage is not recommended.

On Windows, scp2.exe launches ssh2.exe as a transport. Therefore the configuration and authentication features of ssh2.exe can be used in scp2.exe as well.

Also note that scp2 offers no fallback to the Secure Shell version 1 protocol.

File Name Support



scp2 Return Values

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now