Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
        ssh-socks-proxy >>
        ssh-socks-proxy-config >>
        ssh-socks-proxy-ctl >>
        ssh-certview >>
        ssh-cmpclient >>
        ssh-keydist2 >>
        ssh-scepclient >>
    Log Messages >>


ssh-socks-proxy-ctl accepts the following general options:

  • -a, --socks-proxy-address=ADDRESS

    Connect to separate SSH Tectia SOCKS Proxy process using the given address.

  • -D, --debug=LEVEL

    Sets the debug level string to LEVEL.

  • -e, --charset=CS

    Set output character set. The supported character sets are utf8, iso-8895-1, latin1, iso-8859-15, latin9, and ascii.

  • -q, --quiet

    Print little or no output, depending on the command.

  • -s, --short

    Shorter more machine-readable output.

  • -v, --verbose

    Print more information if available.

  • -w, --wide

    Do not truncate output even if it means long lines.

  • --time-format=FMT

    Set output time format. Default depends on system locale settings.

  • -V, --version

    Displays program version and exits.

  • -h, --help

    Displays help on command-line options and exits. Help is available also on specific commands. For example, to get help on the status command, run:

    ssh-socks-proxy-ctl status --help

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now