Your browser does not allow storing cookies. We recommend enabling them.


Native z/OS FTP commands versus SSH Tectia SFTP commands

SSH Tectia client tools for z/OS convert the unsecured FTP subcommands to secure SFTP commands according to the following matrix:

Table 5.1. Comparison between native z/OS FTP subcommands and SFTP commands

z/OS FTP subcommandTectia SFTP commandDescription
asciiasciiChange the data transfer type to ASCII
binarybinaryChange the data transfer type to image
cd directorycd directoryChange the working directory or file group on the remote host:
cd /mydir/testcd /mydir/test- when the remote end is Unix
cd //- when the remote end is mainframe, go to MVS-level prefix.*
cd 'my.dataset.cntl'cd //'my.dataset.cntl'Define an absolute dataset
cd my.dataset.cntlcd //my.dataset.cntlDefine a relative dataset
delete foreign_filerm [options...] foreign_fileDelete the foreign_file (or a directory with the rm command)
delete your_file.txtrm your_file.txtDelete a file
rm yourdirDelete a directory
dir name (DISKlsView directory contents. See the options in the ls command
lcd directorylcd directoryChange the current working directory on the local host
lcd 'my.dataset.cntl'cd //'my.dataset.cntl'Define an absolute dataset
lcd my.dataset.cntlcd //my.dataset.cntlDefine a relative dataset
lmkdir directory (LIKE remote_directorylmkdir directoryMake a directory on the remote host
lmkdir examplelmkdir exampleWhen the local dir is MVSUSER.FTP. then MVSUSER.FTP.EXAMPLE is created
locsite parameters...lsite parameters...Define parameters for controlling the file transfer. Many of the parameters are the same. See the manual.
ls name (DISK ls [-R] [-l] [-S] [-r] [-p] [-z|+z] [file...]List only the names of a set of remote files, file group, or directory
ls bartls bart
ls //'USER1.TEST.PS.'List all MVS datasets with prefix USER1.TEST.PS
ls //__USER1.TEST.PS.List all MVS datasets with prefix USER1.TEST.PS (for a client that does not send the / character)
ls -lExtended list command
ls bart (DISK SFTP has no option to store the output
get srcfile dstfile (REPLACEsget [options...] srcfile [dstfile]
get myfilesget myfile
mget foreign_file (REPLACEmget [options...] fileCopy multiple files from a remote host to your local host, and create a corresponding number of local files. For SFTP 'replace' is the default!
mget foreign_filemget --overwrite=no foreign_fileNote: The defaults are different!
mkdir directory (LIKE local_directory)mkdir directory Make a directory on the remote host
mput local_data_setmget [options...] fileCopy multiple datasets from your local host to the remote host. For SFTP 'replace' is the default!
mget foreign_filemput --overwrite=no foreign_file Note: The defaults are different!
open hostname portnumberopen hostname | -lOpen a connection to the given host, or to local host: open -l
open remhostopen REMUSER@remhostOpen a connection to a remote host
put srcfile dstfile (REPLACEsput [options...] srcfile [dstfile]
put 'myfile.dataset.cnt' c:\bart.txtsput //'myfile.dataset.cnt' c:\bart.txtThe mainframe dataset specification syntax can be different per client
sput /ftadv:P=TEXT/__DATASET.TXT file.txtWhen advice is used, the preferred dataset specification is different
rename oldfile newfilerename oldfile newfileRename a file

IBM z/OS: For MVS datasets, if the dataset that is specified by the newfile value already exists, the server rejects the rename request.

For z/OS UNIX files and named pipes, if the file that is specified by the newfile value already exists, the existing file is replaced.

Tectia: Tries to rename the oldfile to newfile. If the new file already exists, the files are left intact.

sendsitenot applicableToggle the automatic sending of the SITE commands when sending a dataset to a foreign host.
byebyeThe same as quit.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more