-
-l login_name Logs in using this username.
-
+a Enables authentication agent forwarding.
-
-a Disables authentication agent forwarding.
-
+x Enables X11 connection forwarding.
-
-x Disables X11 connection forwarding.
-
-k dir Custom configuration dir where ssh2_config, hostkeys and userkeys are located.
-
-i file Specifies the identification file for public-key authentication. This option
ca also be specified in the configuration file.
-
-F file Reads an alternative configuration file.
-
-t Tty; allocates a tty even if command is given.
-
-v Verbose; displays verbose debugging messages. Equivalent to -d 2.
-
-d level Sets debug level.
-
-V Displays version string.
-
-q Quiet; does not display any warning messages.
-
-c cipher Selects encryption algorithm. Multiple -c options are allowed and a
single -c flag can have only one cipher.
-
-m MAC Selects MAC algorithm. Multiple -m options are allowed and a single
-m flag can have only one MAC.
-
-p port Connects to this port. Server must be on the same port.
-
-S Does not request a session channel.
-
-L listen-port:host:port Forwards local port to remote address.
This causes ssh2 to listen to connections on a port, and
forward them to the other side by connecting to host:port.
-
-R listen-port:host:port Forwards remote port to local address.
This causes ssh2 to listen to connections on a port, and
forward them to the other side by connecting to host:port.
-
-g Gateways ports, which means that remote hosts may connect to locally
forwarded ports. Note the logic of + and - in this
option.
-
+g Does not gateway ports. Listens to tunneling connections originating only
from the localhost. Note the logic of + and - in this
option.
-
+C Enables compression.
-
-C Disables compression.
-
-E prov Uses prov as the external key provider.
-
-I initstr Uses initstr as initialization string for the external key provider.
-
-o options Processes the option as if it was read from a configuration file.
The format is -o "ConfigKeyword=value".
-
-h Displays help.
-
-K Specifies the identity key file for public-key authentication that is
applied first. Multiple -K options are allowed. This option can also
be specified in the configuration file.