Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files >>
        Starting and Stopping the Server >>
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A) >>
        SSH Tectia Client >>
            Using the Client (ssh2)
            Using Secure Copy (scp2)
            Using Secure File Transfer (sftp2)
            Using Authentication Agent (ssh-agent2, ssh-add2)
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

Using Secure File Transfer (sftp2)

sftp2 is an FTP-like client that works in a similar fashion to scp2. Just like scp2, sftp2 runs with normal user privileges and uses ssh2 for transport. Even though it functions like ftp, sftp2 does not use the FTP daemon or the FTP client for its connections. The sftp2 client can be used to connect to any host that is running the Secure Shell server daemon (sshd2).

The basic syntax for sftp2 is:

sftp [options] [user@]host

Note: As shown in the example above, in the normal case, you do not have to type sftp2. The installation process creates a symbolic link, sftp, that points to the actual sftp2 executable. sftp was not included in Secure Shell 1.x.

Actual usage of sftp2 is similar to the traditional ftp program.

The sftp2 command-line options and commands are documented in detail on the sftp2 man page.

ASCII Transfer

To facilitate successful transferring of ASCII (plaintext) files, the server provides its newline convention to the client so that it can handle the newline convention properly. On Windows systems, a line break is specified by using Carriage Return and Linefeed (CRLF, with ASCII values of 13 and 10). Unix systems use only Linefeed (LF, or the ASCII value 10) for this purpose.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now