Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
        Handling MVS Datasets and HFS File System Access>>
        Controlling File Transfer>>
            Advice String
            File Transfer Profiles
            File Transfer Environment Variables for the Clients
            File Transfer Environment Variables for the Server
        Staging
        Listing Datasets with SFTP Clients>>
        Secure File Transfer Examples Using the z/OS Client>>
        Secure File Transfer Examples Using Windows and Unix Clients>>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

File Transfer Environment Variables for the Clients

In the scp2 and sftp2 file transfer clients, if no file transfer profile is found, the default values for advice string parameters (Section Advice String) are taken from the following environment variables. These can be set in the /etc/profile file globally for all users and in the $HOME/.profile file for each user separately (or another corresponding file, depending on the users' shell):

SSH_SFT_ADVISOR_TRANSFER_MODE           (default: NULL)
SSH_SFT_ADVISOR_TRANSFER_FORMAT         (default: "line")
SSH_SFT_ADVISOR_RECORD_TRUNCATE         (default: "no")
SSH_SFT_ADVISOR_FILE_CODESET            (default: NULL)
SSH_SFT_ADVISOR_TRANSFER_CODESET        (default: NULL)
SSH_SFT_ADVISOR_TRANSLATE_TABLE         (default: NULL)
SSH_SFT_ADVISOR_TRANSLATE_DSN_TEMPLATES (default: NULL)
SSH_SFT_ADVISOR_FILE_LINE_DELIMITER     (default: NULL)
SSH_SFT_ADVISOR_TRANSFER_LINE_DELIMITER (default: NULL)
SSH_SFT_ADVISOR_FILE_TYPE               (default: "po" or "ps")
SSH_SFT_ADVISOR_FILE_ORG                (default: "vb")
SSH_SFT_ADVISOR_FILE_RECLEN             (default: "4096" or "80" or "1024")
SSH_SFT_ADVISOR_FILE_BLOCKLEN           (default: NULL)
SSH_SFT_ADVISOR_FILE_SIZE               (default: "1000000")
SSH_SFT_ADVISOR_DIRECTORY_SIZE          (default: "10")

The file transfer server does not use environment variables for default advice string parameter values.

The file transfer clients also use the following environment variables:

SSH_SFTP_OVERWRITE                      (default: "yes")
SSH_SFTP_SHOW_BYTE_COUNT                (default: "no")
SSH_SFTP_SMF_TYPE                       (default: NULL)

If variable SSH_SFTP_OVERWRITE is set to yes the default behavior is to overwrite existing files. If it is set to no the default behavior is not to overwrite existing files.

If variable SSH_SFTP_SHOW_BYTE_COUNT is set to yes the number of transferred bytes is shown after successful file transfer. Also the names of source and destination files are shown.

If variable SSH_SFTP_SMF_TYPE is set to TYPE119 file transfers create SMF records of type 119.

Furthermore, the sftp2 file transfer client uses the following environment variable:

SSH_SFTP_CMD_GETPUT_MODE                (default: NULL)

The SSH_SFTP_CMD_GETPUT_MODE variable specifies the FTP compatibility mode for get and put commands. If the variable is set to ftp the commands behave as in FTP client. For more information, see commands sget and sput.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more