Name
ssh
Synopsis
ssh [-luser]host[commands] ssh [options] [user@]host
Secures
shell. This is a secure replacement for the rsh,
rlogin, and rcp programs.
ssh uses strong public-key encryption technologies
to provide end-to-end encryption of data. There may be
licensing/patent issues restricting the use of the software in some
countries.
Options
-
-a Turn off authentication agent connection forwarding.
-
-A Turn on authentication agent connection forwarding.
-
-binterface Use the specified network interface (on a multiple interface machine).
-
-ccipher Use the specified type of encryption, either blowfish, des or 3des. 3des is the default.
-
-C Turn on compression.
-
-D Behave like a SOCKS4 server.
-
-ec Specify escape character c. Use the word “none” to disable any escape character.
-
-f Send
sshto the background.-
-Ffilename Use specified configuration file.
-
-g Accept connections to local forward ports from remote hosts.
- -i
keyfile Specify an identity file to use for authentication. The default is $HOME/.ssh/identity.
- -I
device Used smartcard device.
- -k
Turn off Kerberos ticket forwarding.
- -l
user Log in as user.
- -L
port1:host2: port2 Set up port forwarding from a local host to a remote host.
- -m
algorithm Use specifed MAC algorithm(s).
- -n
Does not allow reading form stdin.
- -N
Turn off remote command execution.
- -o
keyword Set configuration keyword.
- -p
port Select TCP port number.
- -P
Use a nonprivileged port is for outgoing connections.
- -q
Run in quiet mode.
- -R
port1:host2: port2 Set up port forwarding ...