-
-l login_name
Logs in using this username.
-
+a
Enables authentication agent forwarding.
-
-a
Disables authentication agent forwarding.
-
+x
Enables X11 connection forwarding.
-
-x
Disables X11 connection forwarding.
-
-k dir
Custom configuration dir where ssh2_config
, hostkeys and userkeys are located.
-
-i file
Specifies the identification file for public-key authentication. This option
ca also be specified in the configuration file.
-
-F file
Reads an alternative configuration file.
-
-t
Tty; allocates a tty even if command is given.
-
-v
Verbose; displays verbose debugging messages. Equivalent to -d 2
.
-
-d level
Sets debug level.
-
-V
Displays version string.
-
-q
Quiet; does not display any warning messages.
-
-c cipher
Selects encryption algorithm. Multiple -c
options are allowed and a
single -c
flag can have only one cipher.
-
-m MAC
Selects MAC algorithm. Multiple -m
options are allowed and a single
-m
flag can have only one MAC.
-
-p port
Connects to this port. Server must be on the same port.
-
-S
Does not request a session channel.
-
-L listen-port:host:port
Forwards local port to remote address.
This causes ssh2
to listen to connections on a port, and
forward them to the other side by connecting to host:port
.
-
-R listen-port:host:port
Forwards remote port to local address.
This causes ssh2
to listen to connections on a port, and
forward them to the other side by connecting to host:port
.
-
-g
Gateways ports, which means that remote hosts may connect to locally
forwarded ports. Note the logic of +
and -
in this
option.
-
+g
Does not gateway ports. Listens to tunneling connections originating only
from the localhost. Note the logic of +
and -
in this
option.
-
+C
Enables compression.
-
-C
Disables compression.
-
-E prov
Uses prov
as the external key provider.
-
-I initstr
Uses initstr
as initialization string for the external key provider.
-
-o options
Processes the option as if it was read from a configuration file.
The format is -o "ConfigKeyword=value"
.
-
-h
Displays help.
-
-K
Specifies the identity key file for public-key authentication that is
applied first. Multiple -K
options are allowed. This option can also
be specified in the configuration file.