0dbdfe4aa3ddf14efc393d70ef71a2f98ef0888e
[u/mdw/putty] / doc / using.but
1 \versionid $Id: using.but,v 1.25 2004/07/25 12:12:53 jacob Exp $
2
3 \C{using} Using PuTTY
4
5 This chapter provides a general introduction to some more advanced
6 features of PuTTY. For extreme detail and reference purposes,
7 \k{config} is likely to contain more information.
8
9 \H{using-session} During your session
10
11 A lot of PuTTY's complexity and features are in the configuration
12 panel. Once you have worked your way through that and started
13 a session, things should be reasonably simple after that.
14 Nevertheless, there are a few more useful features available.
15
16 \S{using-selection} Copying and pasting text
17
18 \I{copy and paste}Often in a PuTTY session you will find text on
19 your terminal screen which you want to type in again. Like most
20 other terminal emulators, PuTTY allows you to copy and paste the
21 text rather than having to type it again. Also, copy and paste uses
22 the \I{Windows clipboard}Windows \i{clipboard}, so that you can
23 paste (for example) URLs into a web browser, or paste from a word
24 processor or spreadsheet into your terminal session.
25
26 PuTTY's copy and paste works entirely with the \i{mouse}. In order
27 to copy text to the clipboard, you just click the \i{left mouse
28 button} in the terminal window, and drag to \I{selecting text}select
29 text. When you let go of the button, the text is \e{automatically}
30 copied to the clipboard. You do not need to press Ctrl-C or
31 Ctrl-Ins; in fact, if you do press Ctrl-C, PuTTY will send a Ctrl-C
32 character down your session to the server where it will probably
33 cause a process to be interrupted.
34
35 Pasting is done using the right button (or the middle mouse button,
36 if you have a three-button mouse and have set it up; see
37 \k{config-mouse}). (Pressing \i{Shift-Ins}, or selecting \q{Paste}
38 from the Ctrl+right-click context menu, have the same effect.) When
39 you click the \i{right mouse button}, PuTTY will read whatever is in
40 the Windows clipboard and paste it into your session, \e{exactly} as
41 if it had been typed at the keyboard. (Therefore, be careful of
42 pasting formatted text into an editor that does automatic indenting;
43 you may find that the spaces pasted from the clipboard plus the
44 spaces added by the editor add up to too many spaces and ruin the
45 formatting. There is nothing PuTTY can do about this.)
46
47 If you \i{double-click} the left mouse button, PuTTY will select a
48 whole word. If you double-click, hold down the second click, and
49 drag the mouse, PuTTY will select a sequence of whole words. (You
50 can adjust precisely what PuTTY considers to be part of a word; see
51 \k{config-charclasses}.) If you \e{triple}-click, or
52 \i{triple-click} and drag, then PuTTY will select a whole line or
53 sequence of lines.
54
55 If you want to select a \I{rectangular selection}rectangular region
56 instead of selecting to the end of each line, you can do this by
57 holding down Alt when you make your selection. (You can also
58 configure rectangular selection to be the default, and then holding
59 down Alt gives the normal behaviour instead. See
60 \k{config-rectselect} for details.)
61
62 If you have a \i{middle mouse button}, then you can use it to
63 \I{adjusting a selection}adjust an existing selection if you
64 selected something slightly wrong. (If you have configured the
65 middle mouse button to paste, then the right mouse button does this
66 instead.) Click the button on the screen, and you can pick up the
67 nearest end of the selection and drag it to somewhere else.
68
69 It's possible for the server to ask to handle mouse clicks in the
70 PuTTY window itself. If this happens, the mouse cursor will turn
71 into an arrow, and using the mouse to copy and paste will only work if
72 you hold down Shift. See \k{config-features-mouse} and
73 \k{config-mouseshift} for details of this feature and how to configure
74 it.
75
76 \S{using-scrollback} \I{scrollback}Scrolling the screen back
77
78 PuTTY keeps track of text that has scrolled up off the top of the
79 terminal. So if something appears on the screen that you want to
80 read, but it scrolls too fast and it's gone by the time you try to
81 look for it, you can use the scrollbar on the right side of the
82 window to look back up the session \i{history} and find it again.
83
84 As well as using the scrollbar, you can also page the scrollback up
85 and down by pressing \i{Shift-PgUp} and \i{Shift-PgDn}. You can
86 scroll a line at a time using \i{Ctrl-PgUp} and \i{Ctrl-PgDn}. These
87 are still available if you configure the scrollbar to be invisible.
88
89 By default the last 200 lines scrolled off the top are
90 preserved for you to look at. You can increase (or decrease) this
91 value using the configuration box; see \k{config-scrollback}.
92
93 \S{using-sysmenu} The \i{System menu}
94
95 If you click the left mouse button on the icon in the top left
96 corner of PuTTY's window, or click the right mouse button on the
97 title bar, you will see the standard Windows system menu containing
98 items like Minimise, Move, Size and Close.
99
100 PuTTY's system menu contains extra program features in addition to
101 the Windows standard options. These extra menu commands are
102 described below.
103
104 (These options are also available in a context menu brought up
105 by holding Ctrl and clicking with the right mouse button anywhere
106 in the PuTTY window.)
107
108 \S2{using-eventlog} The PuTTY \i{Event Log}
109
110 If you choose \q{Event Log} from the system menu, a small window
111 will pop up in which PuTTY logs significant events during the
112 connection. Most of the events in the log will probably take place
113 during session startup, but a few can occur at any point in the
114 session, and one or two occur right at the end.
115
116 You can use the mouse to select one or more lines of the Event Log,
117 and hit the Copy button to copy them to the \i{clipboard}. If you
118 are reporting a bug, it's often useful to paste the contents of the
119 Event Log into your bug report.
120
121 \S2{using-specials} \ii{Special commands}
122
123 Depending on the protocol used for the current session, there may be
124 a submenu of \q{special commands}. These are protocol-specific
125 tokens, such as a \i{\q{break} signal}, that can be sent down a
126 connection in addition to normal data. Currently only Telnet and SSH
127 have special commands.
128
129 \# FIXME: possibly the full list of special commands should be
130 \# given here, if only so that it can be sensibly indexed and
131 \# someone looking up (e.g.) AYT can find out how to send one?
132
133 \S2{using-newsession} Starting new sessions
134
135 PuTTY's system menu provides some shortcut ways to start new
136 sessions:
137
138 \b Selecting \i{\q{New Session}} will start a completely new
139 instance of PuTTY, and bring up the configuration box as normal.
140
141 \b Selecting \i{\q{Duplicate Session}} will start a session with
142 precisely the same options as your current one - connecting to the
143 same host using the same protocol, with all the same terminal
144 settings and everything.
145
146 \b The \i{\q{Saved Sessions} submenu} gives you quick access to any
147 sets of stored session details you have previously saved. See
148 \k{config-saving} for details of how to create saved sessions.
149
150 \S2{using-changesettings} \I{settings, changing}Changing your
151 session settings
152
153 If you select \i{\q{Change Settings}} from the system menu, PuTTY will
154 display a cut-down version of its initial configuration box. This
155 allows you to adjust most properties of your current session. You
156 can change the terminal size, the font, the actions of various
157 keypresses, the colours, and so on.
158
159 Some of the options that are available in the main configuration box
160 are not shown in the cut-down Change Settings box. These are usually
161 options which don't make sense to change in the middle of a session
162 (for example, you can't switch from SSH to Telnet in mid-session).
163
164 \S2{using-copyall} \i{Copy All to Clipboard}
165
166 This system menu option provides a convenient way to copy the whole
167 contents of the terminal screen (up to the last nonempty line) and
168 scrollback to the \i{clipboard} in one go.
169
170 \S2{reset-terminal} \I{scrollback, clearing}Clearing and
171 \I{terminal, resetting}resetting the terminal
172
173 The \i{\q{Clear Scrollback}} option on the system menu tells PuTTY
174 to discard all the lines of text that have been kept after they
175 scrolled off the top of the screen. This might be useful, for
176 example, if you displayed sensitive information and wanted to make
177 sure nobody could look over your shoulder and see it. (Note that
178 this only prevents a casual user from using the scrollbar to view
179 the information; the text is not guaranteed not to still be in
180 PuTTY's memory.)
181
182 The \i{\q{Reset Terminal}} option causes a full reset of the
183 terminal emulation. A VT-series terminal is a complex piece of
184 software and can easily get into a state where all the text printed
185 becomes unreadable. (This can happen, for example, if you
186 accidentally output a binary file to your terminal.) If this
187 happens, selecting Reset Terminal should sort it out.
188
189 \S2{using-fullscreen} \ii{Full screen} mode
190
191 If you find the title bar on a maximised window to be ugly or
192 distracting, you can select Full Screen mode to maximise PuTTY
193 \q{even more}. When you select this, PuTTY will expand to fill the
194 whole screen and its borders, title bar and scrollbar will
195 disappear. (You can configure the scrollbar not to disappear in
196 full-screen mode if you want to keep it; see \k{config-scrollback}.)
197
198 When you are in full-screen mode, you can still access the system
199 menu if you click the left mouse button in the \e{extreme} top left
200 corner of the screen.
201
202 \H{using-logging} Creating a \i{log file} of your \I{session
203 log}session
204
205 For some purposes you may find you want to log everything that
206 appears on your screen. You can do this using the \i{\q{Logging}
207 panel} in the configuration box.
208
209 To begin a session log, select \q{Change Settings} from the system
210 menu and go to the Logging panel. Enter a log file name, and select
211 a logging mode. (You can log all session output including the
212 terminal control sequences, or you can just log the printable text.
213 It depends what you want the log for.) Click \q{Apply} and your log
214 will be started. Later on, you can go back to the Logging panel and
215 select \q{Logging turned off completely} to stop logging; then PuTTY
216 will close the log file and you can safely read it.
217
218 See \k{config-logging} for more details and options.
219
220 \H{using-translation} Altering your \i{character set} configuration
221
222 If you find that special characters (\i{accented characters}, for
223 example) are not being displayed correctly in your PuTTY session, it
224 may be that PuTTY is interpreting the characters sent by the server
225 according to the wrong \e{character set}. There are a lot of
226 different character sets available, so it's entirely possible for
227 this to happen.
228
229 If you click \q{Change Settings} and look at the \i{\q{Translation}
230 panel}, you should see a large number of character sets which you
231 can select. Now all you need is to find out which of them you want!
232
233 \H{using-x-forwarding} Using \i{X11 forwarding} in SSH
234
235 The SSH protocol has the ability to securely forward X Window System
236 applications over your encrypted SSH connection, so that you can run
237 an application on the SSH server machine and have it put its windows
238 up on your local machine without sending any X network traffic in
239 the clear.
240
241 In order to use this feature, you will need an X display server for
242 your Windows machine, such as X-Win32 or Exceed. This will probably
243 install itself as display number 0 on your local machine; if it
244 doesn't, the manual for the \i{X server} should tell you what it
245 does do.
246
247 You should then tick the \q{Enable X11 forwarding} box in the
248 Tunnels panel (see \k{config-ssh-x11}) before starting your SSH
249 session. The \q{X display location} box reads \c{localhost:0} by
250 default, which is the usual display location where your X server
251 will be installed. If that needs changing, then change it.
252
253 Now you should be able to log in to the SSH server as normal. To
254 check that X forwarding has been successfully negotiated during
255 connection startup, you can check the PuTTY Event Log (see
256 \k{using-eventlog}). It should say something like this:
257
258 \c 2001-12-05 17:22:01 Requesting X11 forwarding
259 \c 2001-12-05 17:22:02 X11 forwarding enabled
260
261 If the remote system is Unix or Unix-like, you should also be able
262 to see that the \i{\c{DISPLAY} environment variable} has been set to
263 point at display 10 or above on the SSH server machine itself:
264
265 \c fred@unixbox:~$ echo $DISPLAY
266 \c unixbox:10.0
267
268 If this works, you should then be able to run X applications in the
269 remote session and have them display their windows on your PC.
270
271 Note that if your PC X server requires authentication to connect,
272 then PuTTY cannot currently support it. If this is a problem for
273 you, you should mail the PuTTY authors \#{FIXME} and give details
274 (see \k{feedback}).
275
276 \H{using-port-forwarding} Using \i{port forwarding} in SSH
277
278 The SSH protocol has the ability to forward arbitrary network
279 connections over your encrypted SSH connection, to avoid the network
280 traffic being sent in clear. For example, you could use this to
281 connect from your home computer to a POP-3 server on a remote
282 machine without your POP-3 password being visible to network
283 sniffers.
284
285 In order to use port forwarding to connect from your local machine
286 to a port on a remote server, you need to:
287
288 \b Choose a port number on your local machine where PuTTY should
289 listen for incoming connections. There are likely to be plenty of
290 unused port numbers above 3000. (You can also use a local loopback
291 address here; see below for more details.)
292
293 \b Now, before you start your SSH connection, go to the Tunnels
294 panel (see \k{config-ssh-portfwd}). Make sure the \q{Local} radio
295 button is set. Enter the local port number into the \q{Source port}
296 box. Enter the destination host name and port number into the
297 \q{Destination} box, separated by a colon (for example,
298 \c{popserver.example.com:110} to connect to a POP-3 server).
299
300 \b Now click the \q{Add} button. The details of your port forwarding
301 should appear in the list box.
302
303 Now start your session and log in. (Port forwarding will not be
304 enabled until after you have logged in; otherwise it would be easy
305 to perform completely anonymous network attacks, and gain access to
306 anyone's virtual private network). To check that PuTTY has set up
307 the port forwarding correctly, you can look at the PuTTY Event Log
308 (see \k{using-eventlog}). It should say something like this:
309
310 \c 2001-12-05 17:22:10 Local port 3110 forwarding to
311 \c popserver.example.com:110
312
313 Now if you connect to the source port number on your local PC, you
314 should find that it answers you exactly as if it were the service
315 running on the destination machine. So in this example, you could
316 then configure an e-mail client to use \c{localhost:3110} as a POP-3
317 server instead of \c{popserver.example.com:110}. (Of course, the
318 forwarding will stop happening when your PuTTY session closes down.)
319
320 You can also forward ports in the other direction: arrange for a
321 particular port number on the \e{server} machine to be forwarded
322 back to your PC as a connection to a service on your PC or near it.
323 To do this, just select the \q{Remote} radio button instead of the
324 \q{Local} one. The \q{Source port} box will now specify a port
325 number on the \e{server} (note that most servers will not allow you
326 to use port numbers under 1024 for this purpose).
327
328 An alternative way to forward local connections to remote hosts is
329 to use \I{dynamic port forwarding}dynamic \I{SOCKS} proxying. For
330 this, you will need to select the \q{Dynamic} radio button instead
331 of \q{Local}, and then you should not enter anything into the
332 \q{Destination} box (it will be ignored). This will cause PuTTY to
333 listen on the port you have specified, and provide a SOCKS proxy
334 service to any programs which connect to that port. So, in
335 particular, you can forward other PuTTY connections through it by
336 setting up the Proxy control panel (see \k{config-proxy} for
337 details).
338
339 The source port for a forwarded connection usually does not accept
340 connections from any machine except the SSH client or server machine
341 itself (for local and remote forwardings respectively). There are
342 controls in the Tunnels panel to change this:
343
344 \b The \q{Local ports accept connections from other hosts} option
345 allows you to set up local-to-remote port forwardings (including
346 dynamic port forwardings) in such a way that machines other than
347 your client PC can connect to the forwarded port.
348
349 \b The \q{Remote ports do the same} option does the same thing for
350 remote-to-local port forwardings (so that machines other than the
351 SSH server machine can connect to the forwarded port.) Note that
352 this feature is only available in the SSH 2 protocol, and not all
353 SSH 2 servers support it (OpenSSH 3.0 does not, for example).
354
355 You can also specify an \i{IP address} to listen on. Typically a
356 Windows machine can be asked to listen on any single IP address in
357 the \cw{127.*.*.*} range, and all of these are loopback addresses
358 available only to the local machine. So if you forward (for example)
359 \c{127.0.0.5:79} to a remote machine's \cw{finger} port, then you
360 should be able to run commands such as \c{finger fred@127.0.0.5}.
361 This can be useful if the program connecting to the forwarded port
362 doesn't allow you to change the port number it uses. This feature is
363 available for local-to-remote forwarded ports; SSH1 is unable to
364 support it for remote-to-local ports, while SSH2 can support it in
365 theory but servers will not necessarily cooperate.
366
367 \H{using-rawprot} Making \i{raw TCP connections}
368
369 A lot of \I{debugging Internet protocols}Internet protocols are
370 composed of commands and responses in plain text. For example,
371 \i{SMTP} (the protocol used to transfer e-mail), \i{NNTP} (the
372 protocol used to transfer Usenet news), and \i{HTTP} (the protocol
373 used to serve Web pages) all consist of commands in readable plain
374 text.
375
376 Sometimes it can be useful to connect directly to one of these
377 services and speak the protocol \q{by hand}, by typing protocol
378 commands and watching the responses. On Unix machines, you can do
379 this using the system's \c{telnet} command to connect to the right
380 port number. For example, \c{telnet mailserver.example.com 25} might
381 enable you to talk directly to the SMTP service running on a mail
382 server.
383
384 Although the Unix \c{telnet} program provides this functionality,
385 the protocol being used is not really Telnet. Really there is no
386 actual protocol at all; the bytes sent down the connection are
387 exactly the ones you type, and the bytes shown on the screen are
388 exactly the ones sent by the server. Unix \c{telnet} will attempt to
389 detect or guess whether the service it is talking to is a real
390 Telnet service or not; PuTTY prefers to be told for certain.
391
392 In order to make a debugging connection to a service of this type,
393 you simply select the fourth protocol name, \I{\q{Raw}
394 protocol}\q{Raw}, from the \q{Protocol} buttons in the \q{Session}
395 configuration panel. (See \k{config-hostname}.) You can then enter a
396 host name and a port number, and make the connection.
397
398 \H{using-cmdline} The PuTTY command line
399
400 PuTTY can be made to do various things without user intervention by
401 supplying \i{command-line arguments} (e.g., from a \i{command prompt
402 window}, or a \i{Windows shortcut}).
403
404 \S{using-cmdline-session} Starting a session from the command line
405
406 \I\c{-ssh}\I\c{-telnet}\I\c{-rlogin}\I\c{-raw}These options allow
407 you to bypass the configuration window and launch straight into a
408 session.
409
410 To start a connection to a server called \c{host}:
411
412 \c putty.exe [-ssh | -telnet | -rlogin | -raw] [user@]host
413
414 If this syntax is used, settings are taken from the Default Settings
415 (see \k{config-saving}); \c{user} overrides these settings if
416 supplied. Also, you can specify a protocol, which will override the
417 default protocol (see \k{using-cmdline-protocol}).
418
419 For telnet sessions, the following alternative syntax is supported
420 (this makes PuTTY suitable for use as a URL handler for \i{telnet
421 URLs} in web browsers):
422
423 \c putty.exe telnet://host[:port]/
424
425 In order to start an existing saved session called \c{sessionname},
426 use the \c{-load} option (described in \k{using-cmdline-load}).
427
428 \c putty.exe -load "session name"
429
430 \S{using-cleanup} \i\c{-cleanup}
431
432 If invoked with the \c{-cleanup} option, rather than running as
433 normal, PuTTY will remove its registry entries and random seed file
434 from the local machine (after confirming with the user).
435
436 \S{using-general-opts} Standard command-line options
437
438 PuTTY and its associated tools support a range of command-line
439 options, most of which are consistent across all the tools. This
440 section lists the available options in all tools. Options which are
441 specific to a particular tool are covered in the chapter about that
442 tool.
443
444 \S2{using-cmdline-load} \i\c{-load}: load a saved session
445
446 \I{saved sessions, loading from command line}The \c{-load} option
447 causes PuTTY to load configuration details out of a saved session.
448 If these details include a host name, then this option is all you
449 need to make PuTTY start a session.
450
451 You need double quotes around the session name if it contains spaces.
452
453 If you want to create a Windows shortcut to start a PuTTY saved
454 session, this is the option you should use: your shortcut should
455 call something like
456
457 \c d:\path\to\putty.exe -load "my session"
458
459 (Note that PuTTY itself supports an alternative form of this option,
460 for backwards compatibility. If you execute \c{putty @sessionname}
461 it will have the same effect as \c{putty -load "sessionname"}. With
462 the \c{@} form, no double quotes are required, and the \c{@} sign
463 must be the very first thing on the command line. This form of the
464 option is deprecated.)
465
466 \S2{using-cmdline-protocol} Selecting a protocol: \c{-ssh},
467 \c{-telnet}, \c{-rlogin}, \c{-raw}
468
469 To choose which protocol you want to connect with, you can use one
470 of these options:
471
472 \b \i\c{-ssh} selects the SSH protocol.
473
474 \b \i\c{-telnet} selects the Telnet protocol.
475
476 \b \i\c{-rlogin} selects the Rlogin protocol.
477
478 \b \i\c{-raw} selects the raw protocol.
479
480 These options are not available in the file transfer tools PSCP and
481 PSFTP (which only work with the SSH protocol).
482
483 These options are equivalent to the \i{protocol selection} buttons
484 in the Session panel of the PuTTY configuration box (see
485 \k{config-hostname}).
486
487 \S2{using-cmdline-v} \i\c{-v}: increase verbosity
488
489 \I{verbose mode}Most of the PuTTY tools can be made to tell you more
490 about what they are doing by supplying the \c{-v} option. If you are
491 having trouble when making a connection, or you're simply curious,
492 you can turn this switch on and hope to find out more about what is
493 happening.
494
495 \S2{using-cmdline-l} \i\c{-l}: specify a \i{login name}
496
497 You can specify the user name to log in as on the remote server
498 using the \c{-l} option. For example, \c{plink login.example.com -l
499 fred}.
500
501 These options are equivalent to the username selection box in the
502 Connection panel of the PuTTY configuration box (see
503 \k{config-username}).
504
505 \S2{using-cmdline-portfwd} \I{-L-upper}\c{-L}, \I{-R-upper}\c{-R}
506 and \I{-D-upper}\c{-D}: set up \i{port forwardings}
507
508 As well as setting up port forwardings in the PuTTY configuration
509 (see \k{config-ssh-portfwd}), you can also set up forwardings on the
510 command line. The command-line options work just like the ones in
511 Unix \c{ssh} programs.
512
513 To forward a local port (say 5110) to a remote destination (say
514 \cw{popserver.example.com} port 110), you can write something like
515 one of these:
516
517 \c putty -L 5110:popserver.example.com:110 -load mysession
518 \c plink mysession -L 5110:popserver.example.com:110
519
520 To forward a remote port to a local destination, just use the \c{-R}
521 option instead of \c{-L}:
522
523 \c putty -R 5023:mytelnetserver.myhouse.org:23 -load mysession
524 \c plink mysession -R 5023:mytelnetserver.myhouse.org:23
525
526 To specify an IP address for the listening end of the tunnel,
527 prepend it to the argument:
528
529 \c plink -L 127.0.0.5:23:localhost:23 myhost
530
531 To set up SOCKS-based dynamic port forwarding on a local port, use
532 the \c{-D} option. For this one you only have to pass the port
533 number:
534
535 \c putty -D 4096 -load mysession
536
537 For general information on port forwarding, see
538 \k{using-port-forwarding}.
539
540 These options are not available in the file transfer tools PSCP and
541 PSFTP.
542
543 \S2{using-cmdline-m} \i\c{-m}: read a remote command or script from
544 a file
545
546 The \i\c{-m} option performs a similar function to the \q{Remote
547 command} box in the SSH panel of the PuTTY configuration box (see
548 \k{config-command}). However, the \c{-m} option expects to be given
549 a local file name, and it will read a command from that file. On
550 most Unix systems, you can even put multiple lines in this file and
551 execute more than one command in sequence, or a whole shell script;
552 but this will not work on all servers (and is known not to work
553 with certain \q{embedded} servers such as routers).
554
555 This option is not available in the file transfer tools PSCP and
556 PSFTP.
557
558 \S2{using-cmdline-p} \I{-P-upper}\c{-P}: specify a \i{port number}
559
560 The \c{-P} option is used to specify the port number to connect to. If
561 you have a Telnet server running on port 9696 of a machine instead of
562 port 23, for example:
563
564 \c putty -telnet -P 9696 host.name
565 \c plink -telnet -P 9696 host.name
566
567 (Note that this option is more useful in Plink than in PuTTY,
568 because in PuTTY you can write \c{putty -telnet host.name 9696} in
569 any case.)
570
571 This option is equivalent to the port number control in the Session
572 panel of the PuTTY configuration box (see \k{config-hostname}).
573
574 \S2{using-cmdline-pw} \i\c{-pw}: specify a \i{password}
575
576 A simple way to automate a remote login is to supply your password
577 on the command line. This is \e{not recommended} for reasons of
578 security. If you possibly can, we recommend you set up public-key
579 authentication instead. See \k{pubkey} for details.
580
581 Note that the \c{-pw} option only works when you are using the SSH
582 protocol. Due to fundamental limitations of Telnet and Rlogin, these
583 protocols do not support automated password authentication.
584
585 \S2{using-cmdline-agent} \I{-A-upper}\c{-A} and \i\c{-a}: control \i{agent
586 forwarding}
587
588 The \c{-A} option turns on SSH agent forwarding, and \c{-a} turns it
589 off. These options are only meaningful if you are using SSH.
590
591 See \k{pageant} for general information on \i{Pageant}, and
592 \k{pageant-forward} for information on agent forwarding. Note that
593 there is a security risk involved with enabling this option; see
594 \k{pageant-security} for details.
595
596 These options are equivalent to the agent forwarding checkbox in the
597 Auth panel of the PuTTY configuration box (see \k{config-ssh-agentfwd}).
598
599 These options are not available in the file transfer tools PSCP and
600 PSFTP.
601
602 \S2{using-cmdline-x11} \I{-X-upper}\c{-X} and \i\c{-x}: control \i{X11
603 forwarding}
604
605 The \c{-X} option turns on X11 forwarding in SSH, and \c{-x} turns
606 it off. These options are only meaningful if you are using SSH.
607
608 For information on X11 forwarding, see \k{using-x-forwarding}.
609
610 These options are equivalent to the X11 forwarding checkbox in the
611 Tunnels panel of the PuTTY configuration box (see
612 \k{config-ssh-x11}).
613
614 These options are not available in the file transfer tools PSCP and
615 PSFTP.
616
617 \S2{using-cmdline-pty} \i\c{-t} and \I{-T-upper}\c{-T}: control
618 \i{pseudo-terminal allocation}
619
620 The \c{-t} option ensures PuTTY attempts to allocate a
621 pseudo-terminal at the server, and \c{-T} stops it from allocating
622 one. These options are only meaningful if you are using SSH.
623
624 These options are equivalent to the \q{Don't allocate a
625 pseudo-terminal} checkbox in the SSH panel of the PuTTY
626 configuration box (see \k{config-ssh-pty}).
627
628 These options are not available in the file transfer tools PSCP and
629 PSFTP.
630
631 \S2{using-cmdline-compress} \I{-C-upper}\c{-C}: enable \i{compression}
632
633 The \c{-C} option enables compression of the data sent across the
634 network. This option is only meaningful if you are using SSH.
635
636 This option is equivalent to the \q{Enable compression} checkbox in
637 the SSH panel of the PuTTY configuration box (see
638 \k{config-ssh-comp}).
639
640 \S2{using-cmdline-sshprot} \i\c{-1} and \i\c{-2}: specify an \i{SSH
641 protocol version}
642
643 The \c{-1} and \c{-2} options force PuTTY to use version \I{SSH1}1
644 or version \I{SSH2}2 of the SSH protocol. These options are only
645 meaningful if you are using SSH.
646
647 These options are equivalent to selecting your preferred SSH
648 protocol version as \q{1 only} or \q{2 only} in the SSH panel of the
649 PuTTY configuration box (see \k{config-ssh-prot}).
650
651 \S2{using-cmdline-identity} \i\c{-i}: specify an SSH \i{private key}
652
653 The \c{-i} option allows you to specify the name of a private key
654 file in \c{*.PPK} format which PuTTY will use to authenticate with the
655 server. This option is only meaningful if you are using SSH.
656
657 For general information on \i{public-key authentication}, see
658 \k{pubkey}.
659
660 This option is equivalent to the \q{Private key file for
661 authentication} box in the Auth panel of the PuTTY configuration box
662 (see \k{config-ssh-privkey}).