Name
ssh
Synopsis
ssh [-luser]host[commands] ssh [options] [user@]host
The Secure Shell, ssh is a
secure replacement for the rsh,
rlogin, and rcp programs.
ssh uses strong public-key encryption technologies
to provide end-to-end encryption of data. There may be
licensing/patent issues restricting the use of the software in some
countries.
Options
-
-a Turn off authentication agent connection forwarding.
-
-A Turn on authentication agent connection forwarding.
-
-binterface Use the specified network interface (on a multiple interface machine).
-
-ccipher Use the specified type of encryption, either
blowfish,desor3des.3desis the default.-
-C Turn on compression.
-
-D Behave like a SOCKS4 server.
-
-ec Specify escape character
c. Use the word “none” to disable any escape character.-
-f Send
sshto the background.-
-Ffilename Use specified configuration file.
-
-g Accept connections to local forward ports from remote hosts.
-
-ikeyfile Specify an identity file to use for authentication. The default is
$HOME/.ssh/identity.-
-Idevice Used smartcard
device.-
-k Turn off Kerberos ticket forwarding.
-
-luser Log in as
user.-
-Lport1:host2:port2 Set up port forwarding from a local host to a remote host.
-
-malgorithm Use specified MAC algorithm(s).
-
-n Doesn’t allow reading from STDIN.
-
-N Turn off remote command execution.
-
-okeyword Set configuration keyword.
-
-pport Select TCP port number.
-
-P Use a nonprivileged port is for outgoing connections.
-
-q Run in quiet mode.
-
-Rport1:host2:port2 Set up port ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access