Name
ssh
Synopsis
ssh [-luser
]host
[commands
] ssh [options
] [user
@]host
Secures
shell. This is a secure replacement for the rsh
,
rlogin
, and rcp
programs.
ssh
uses strong public-key encryption technologies
to provide end-to-end encryption of data. There may be
licensing/patent issues restricting the use of the software in some
countries.
Options
-
-a
Turn off authentication agent connection forwarding.
-
-A
Turn on authentication agent connection forwarding.
-
-b
interface
Use the specified network interface (on a multiple interface machine).
-
-c
cipher
Use the specified type of encryption, either blowfish, des or 3des. 3des is the default.
-
-C
Turn on compression.
-
-D
Behave like a SOCKS4 server.
-
-e
c
Specify escape character c. Use the word “none” to disable any escape character.
-
-f
Send
ssh
to the background.-
-F
filename
Use specified configuration file.
-
-g
Accept connections to local forward ports from remote hosts.
- -i
keyfile
Specify an identity file to use for authentication. The default is $HOME/.ssh/identity.
- -I
device
Used smartcard device.
- -k
Turn off Kerberos ticket forwarding.
- -l
user
Log in as user.
- -L
port1:host2: port2
Set up port forwarding from a local host to a remote host.
- -m
algorithm
Use specifed MAC algorithm(s).
- -n
Does not allow reading form stdin.
- -N
Turn off remote command execution.
- -o
keyword
Set configuration keyword.
- -p
port
Select TCP port number.
- -P
Use a nonprivileged port is for outgoing connections.
- -q
Run in quiet mode.
- -R
port1:host2: port2
Set up port forwarding ...
Get Mac OS X in a Nutshell now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.