Putty command line ssh port

Putty command line ssh port

Author: Sect0R Date of post: 17.06.2017

Previous Contents Index Next. This chapter provides a general introduction to some more advanced features of PuTTY. For extreme detail and reference purposes, chapter 4 is likely to contain more information.

A lot of PuTTY's complexity and features are in the configuration panel. Once you have worked your way through that and started a session, things should be reasonably simple after that.

ssh - Putty session start from shortcut on port - Stack Overflow

Nevertheless, there are a few more useful features available. Often in a PuTTY session you will find text on your terminal screen which you want to type in again. Like most other terminal emulators, PuTTY allows you to copy and paste the text rather than having to type it again. Also, copy and paste uses the Windows clipboard, so that you can paste for example URLs into a web browser, or paste from a word processor or spreadsheet into your terminal session. PuTTY's copy and paste works entirely with the mouse.

In order to copy text to the clipboard, you just click the left mouse button in the terminal window, and drag to select text. When you let go of the button, the text is automatically copied to the clipboard. You do not need to press Ctrl-C or Ctrl-Ins; in fact, if you do press Ctrl-C, PuTTY will send a Ctrl-C character down your session to the server where it will probably cause a process to be interrupted.

Pasting is done using the right button or the middle mouse button, if you have a three-button mouse and have set it up; see section 4.

When you click the right mouse button, PuTTY will read whatever is in the Windows clipboard and paste it into your session, exactly as if it had been typed at the keyboard.

Therefore, be careful of pasting formatted text into an editor that does automatic indenting; you may find that the spaces pasted from the clipboard plus the spaces added by the editor add up to too many spaces and ruin the formatting. There is nothing PuTTY can do about this. If you double-click the left mouse button, PuTTY will select a whole word.

If you double-click, hold down the second click, and drag the mouse, PuTTY will select a sequence of whole words. You can adjust precisely what PuTTY considers to be part of a word; see section 4. If you triple -click, or triple-click and drag, then PuTTY will select a whole line or sequence of lines.

If you want to select a rectangular region instead of selecting to the end of each line, you can do this by holding down Alt when you make your selection. You can also configure rectangular selection to be the default, and then holding down Alt gives the normal behaviour instead.

If you have a middle mouse button, then you can use it to adjust an existing selection if you selected something slightly wrong. If you have configured the middle mouse button to paste, then the right mouse button does this instead. Click the button on the screen, and you can pick up the nearest end of the selection and drag it to somewhere else. It's possible for the server to ask to handle mouse clicks in the PuTTY window itself.

If this happens, the mouse pointer will turn into an arrow, and using the mouse to copy and paste will only work if you hold down Shift.

PuTTY keeps track of text that has scrolled up off the top of the terminal. So if something appears on the screen that you want to read, but it scrolls too fast and it's gone by the time you try to look for it, you can use the scrollbar on the right side of the window to look back up the session history and find it again.

As well as using the scrollbar, you can also page the scrollback up and down by pressing Shift-PgUp and Shift-PgDn. You can scroll a line at a time using Ctrl-PgUp and Ctrl-PgDn. These are still available if you configure the scrollbar to be invisible.

By default the last lines scrolled off the top are preserved for you to look at. You can increase or decrease this value using the configuration box; see section 4. If you click the left mouse button on the icon in the top left corner of PuTTY's terminal window, or click the right mouse button on the title bar, you will see the standard Windows system menu containing items like Minimise, Move, Size and Close.

PuTTY's system menu contains extra program features in addition to the Windows standard options. These extra menu commands are described below. These options are also available in a context menu brought up by holding Ctrl and clicking with the right mouse button anywhere in the PuTTY window. Most of the events in the log will probably take place during session startup, but a few can occur at any point in the session, and one or two occur right at the end.

You can use the mouse to select one or more lines of the Event Log, and hit the Copy button to copy them to the clipboard. If you are reporting a bug, it's often useful to paste the contents of the Event Log into your bug report. Their precise effect is usually up to the server. Currently only Telnet and SSH have special commands. PuTTY can also be configured to send this when the Backspace key is pressed; see section 4.

PuTTY can also be configured to send this when Ctrl-C is typed; see section 4. PuTTY can also be configured to send this when Ctrl-Z is typed; see section 4. Only available in SSH Forces a repeat key exchange immediately and resets associated timers and counters. For more information about repeat key exchanges, see section 4. Only available in SSH-2, and only during a session. Optional extension; may not be supported by server.

PuTTY requests the server's default break length. Sends various POSIX signals. Not honoured by all servers. This allows you to adjust most properties of your current session. You can change the terminal size, the font, the actions of various keypresses, the colours, and so on.

Some of the options that are available in the main configuration box are not shown in the cut-down Change Settings box. These are usually options which don't make sense to change in the middle of a session for example, you can't switch from SSH to Telnet in mid-session. This system menu option provides a convenient way to copy the whole contents of the terminal screen up to the last nonempty line and scrollback to the clipboard in one go.

This might be useful, for example, if you displayed sensitive information and wanted to make sure nobody could look over your shoulder and see it. Note that this only prevents a casual user from using the scrollbar to view the information; the text is not guaranteed not to still be in PuTTY's memory. A VT-series terminal is a complex piece of software and can easily get into a state where all the text printed becomes unreadable. This can happen, for example, if you accidentally output a binary file to your terminal.

If this happens, selecting Reset Terminal should sort it out. When you select this, PuTTY will expand to fill the whole screen and its borders, title bar and scrollbar will disappear. You can configure the scrollbar not to disappear in full-screen mode if you want to keep it; see section 4. When you are in full-screen mode, you can still access the system menu if you click the left mouse button in the extreme top left corner of the screen.

For some purposes you may find you want to log everything that appears on your screen. Enter a log file name, and select a logging mode.

You can log all session output including the terminal control sequences, or you can just log the printable text. It depends what you want the log for. If you find that special characters accented characters, for example, or line-drawing characters are not being displayed correctly in your PuTTY session, it may be that PuTTY is interpreting the characters sent by the server according to the wrong character set. There are a lot of different character sets available, so it's entirely possible for this to happen.

Now all you need is to find out which of them you want! The SSH protocol has the ability to securely forward X Window System applications over your encrypted SSH connection, so that you can run an application on the SSH server machine and have it put its windows up on your local machine without sending any X network traffic in the clear.

This will probably install itself as display number 0 on your local machine; if it doesn't, the manual for the X server should tell you what it does do. If that needs changing, then change it. Now you should be able to log in to the SSH server as normal.

To check that X forwarding has been successfully negotiated during connection startup, you can check the PuTTY Event Log see section 3. It should say something like this:. If the remote system is Unix or Unix-like, you should also be able to see that the DISPLAY environment variable has been set to point at display 10 or above on the SSH server machine itself:.

If this works, you should then be able to run X applications in the remote session and have them display their windows on your PC. Note that if your PC X server requires authentication to connect, then PuTTY cannot currently support it.

If this is a problem for you, you should mail the PuTTY authors and give details see appendix B. For more options relating to X11 forwarding, see section 4.

The SSH protocol has the ability to forward arbitrary network connections over your encrypted SSH connection, to avoid the network traffic being sent in clear. For example, you could use this to connect from your home computer to a POP-3 server on a remote machine without your POP-3 password being visible to network sniffers.

Using PuTTY

In order to use port forwarding to connect from your local machine to a port on a remote server, you need to:. Now start your session and log in. Port forwarding will not be enabled until after you have logged in; otherwise it would be easy to perform completely anonymous network attacks, and gain access to anyone's virtual private network. To check that PuTTY has set up the port forwarding correctly, you can look at the PuTTY Event Log see section 3.

Now if you connect to the source port number on your local PC, you should find that it answers you exactly as if it were the service running on the destination machine. So in this example, you could then configure an e-mail client to use localhost: Of course, the forwarding will stop happening when your PuTTY session closes down.

You can also forward ports in the other direction: An alternative way to forward local connections to remote hosts is to use dynamic SOCKS proxying. This will cause PuTTY to listen on the port you have specified, and provide a SOCKS proxy service to any programs which connect to that port. So, in particular, you can forward other PuTTY connections through it by setting up the Proxy control panel see section 4. The source port for a forwarded connection usually does not accept connections from any machine except the SSH client or server machine itself for local and remote forwardings respectively.

There are controls in the Tunnels panel to change this:. You can also specify an IP address to listen on. Typically a Windows machine can be asked to listen on any single IP address in the So if you forward for example This can be useful if the program connecting to the forwarded port doesn't allow you to change the port number it uses. This feature is available for local-to-remote forwarded ports; SSH-1 is unable to support it for remote-to-local ports, while SSH-2 can support it in theory but servers will not necessarily cooperate.

Note that if you're using Windows XP Service Pack 2, you may need to obtain a fix from Microsoft in order to use addresses like A lot of Internet protocols are composed of commands and responses in plain text.

For example, SMTP the protocol used to transfer e-mail , NNTP the protocol used to transfer Usenet news , and HTTP the protocol used to serve Web pages all consist of commands in readable plain text.

On Unix machines, you can do this using the system's telnet command to connect to the right port number. For example, telnet mailserver. Although the Unix telnet program provides this functionality, the protocol being used is not really Telnet.

putty command line ssh port

Really there is no actual protocol at all; the bytes sent down the connection are exactly the ones you type, and the bytes shown on the screen are exactly the ones sent by the server. Unix telnet will attempt to detect or guess whether the service it is talking to is a real Telnet service or not; PuTTY prefers to be told for certain. You can then enter a host name and a port number, and make the connection. PuTTY can be made to do various things without user intervention by supplying command-line arguments e.

These options allow you to bypass the configuration window and launch straight into a session. If this syntax is used, settings are taken from the Default Settings see section 4. Also, you can specify a protocol, which will override the default protocol see section 3. For telnet sessions, the following alternative syntax is supported this makes PuTTY suitable for use as a URL handler for telnet URLs in web browsers:.

In order to start an existing saved session called sessionname , use the -load option described in section 3. If invoked with the -cleanup option, rather than running as normal, PuTTY will remove its registry entries and random seed file from the local machine after confirming with the user. Note that on multi-user systems, -cleanup only removes registry entries and files associated with the currently logged-in user.

PuTTY and its associated tools support a range of command-line options, most of which are consistent across all the tools. This section lists the available options in all tools. Options which are specific to a particular tool are covered in the chapter about that tool.

The -load option causes PuTTY to load configuration details out of a saved session. If these details include a host name, then this option is all you need to make PuTTY start a session.

If you want to create a Windows shortcut to start a PuTTY saved session, this is the option you should use: Note that PuTTY itself supports an alternative form of this option, for backwards compatibility. If you execute putty sessionname it will have the same effect as putty -load "sessionname".

With the form, no double quotes are required, and the sign must be the very first thing on the command line. This form of the option is deprecated. These options are not available in the file transfer tools PSCP and PSFTP which only work with the SSH protocol. These options are equivalent to the protocol selection buttons in the Session panel of the PuTTY configuration box see section 4.

Most of the PuTTY tools can be made to tell you more about what they are doing by supplying the -v option. If you are having trouble when making a connection, or you're simply curious, you can turn this switch on and hope to find out more about what is happening. You can specify the user name to log in as on the remote server using the -l option.

For example, plink login. These options are equivalent to the username selection box in the Connection panel of the PuTTY configuration box see section 4. As well as setting up port forwardings in the PuTTY configuration see section 4. The command-line options work just like the ones in Unix ssh programs. To forward a local port say to a remote destination say popserver.

To forward a remote port to a local destination, just use the -R option instead of -L:. To specify an IP address for the listening end of the tunnel, prepend it to the argument:.

To set up SOCKS-based dynamic port forwarding on a local port, use the -D option. For this one you only have to pass the port number:. For general information on port forwarding, see section 3.

However, the -m option expects to be given a local file name, and it will read a command from that file. The -P option is used to specify the port number to connect to. If you have a Telnet server running on port of a machine instead of port 23, for example:.

Note that this option is more useful in Plink than in PuTTY, because in PuTTY you can write putty -telnet host. This option is equivalent to the port number control in the Session panel of the PuTTY configuration box see section 4. A simple way to automate a remote login is to supply your password on the command line. This is not recommended for reasons of security. If you possibly can, we recommend you set up public-key authentication instead.

See chapter 8 for details. Note that the -pw option only works when you are using the SSH protocol.

SSH, SSH Port Tunneling, XRDP, SCP, and RDesktop Part 2

Due to fundamental limitations of Telnet and Rlogin, these protocols do not support automated password authentication. The -A option turns on SSH agent forwarding, and -a turns it off.

These options are only meaningful if you are using SSH. See chapter 9 for general information on Pageant, and section 9. Note that there is a security risk involved with enabling this option; see section 9. These options are equivalent to the agent forwarding checkbox in the Auth panel of the PuTTY configuration box see section 4.

PuTTY SSH - Overview & Download

The -X option turns on X11 forwarding in SSH, and -x turns it off. These options are equivalent to the X11 forwarding checkbox in the Tunnels panel of the PuTTY configuration box see section 4. The -t option ensures PuTTY attempts to allocate a pseudo-terminal at the server, and -T stops it from allocating one.

The -N option prevents PuTTY from attempting to start a shell or command on the remote server. You might want to use this option if you are only using the SSH connection for port forwarding, and your user account on the server does not have the ability to run a shell. This feature is only available in SSH protocol version 2 since the version 1 protocol assumes you will always want to run a shell. The -C option enables compression of the data sent across the network.

This option is only meaningful if you are using SSH. The -1 and -2 options force PuTTY to use version 1 or version 2 of the SSH protocol.

The -4 and -6 options force PuTTY to use the older Internet protocol IPv4 or the newer IPv6. PPK format which PuTTY will use to authenticate with the server.

For general information on public-key authentication, see chapter 8. This option causes the PuTTY tools not to run as normal, but instead to display the fingerprints of the PuTTY PGP Master Keys, in order to aid with verifying new versions. See appendix E for more information. If you want to provide feedback on this manual or on the PuTTY tools themselves, see the Feedback page.

Rating 4,8 stars - 818 reviews
inserted by FC2 system