Your browser does not allow storing cookies. We recommend enabling them.

SSH

Defining File Transfer Mode

The Mode page of the Settings dialog affects which files are transferred using ASCII mode.

[Note]Note

The file transfer settings made here only affect the Tectia File Transfer GUI, not the SFTP conversion or command-line tools related to file transfer.

Selecting the file transfer mode

Figure B.8. Selecting the file transfer mode

File Transfer Mode

Select the default file transfer mode from the following options:

ASCII

By default all files will be transferred in ASCII mode.

Binary

By default all files will be transferred in binary mode.

Auto Select

The files using a file extension specified on the ASCII Extensions list will be transferred in ASCII mode. All other files will be transferred in binary mode.

ASCII Extensions

Files using a file extension specified in the ASCII Extensions list will be transferred using ASCII mode.

New

Click the New icon (at the top right-hand side of the ASCII Extensions list) to add a new file extension to the list. The keyboard shortcut for the New icon is the Ins key.

Note that you can use wildcard characters to specify the file extensions. The ? character matches any 1 character, and the * character matches any 0 or more characters. For example htm* would match both htm and html.

Delete

Select a file extension entry from the list and click the Delete icon (at the top right-hand side of the ASCII Extensions list) to remove the extension. The keyboard shortcut for the Delete icon is the Delete key.


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more