1 \cfg{man-identity}{plink}{1}{2004-03-24}{PuTTY tool suite}{PuTTY tool suite}
3 \H{plink-manpage} Man page for Plink
5 \S{plink-manpage-name} NAME
7 \cw{plink} \- PuTTY link, command line network connection tool
9 \S{plink-manpage-synopsis} SYNOPSIS
11 \c plink [options] [user@]host [command]
12 \e bbbbb iiiiiii iiiib iiii iiiiiii
14 \S{plink-manpage-description} DESCRIPTION
16 \cw{plink} is a network connection tool supporting several protocols.
18 \S{plink-manpage-options} OPTIONS
20 The command-line options supported by \cw{plink} are:
24 \dd Show version information and exit.
28 \dd Display the fingerprints of the PuTTY PGP Master Keys and exit,
29 to aid in verifying new files released by the PuTTY team.
33 \dd Show verbose messages.
35 \dt \cw{-load} \e{session}
37 \dd Load settings from saved session.
41 \dd Force use of SSH protocol (default).
45 \dd Force use of Telnet protocol.
49 \dd Force use of rlogin protocol.
57 \dd Connect to port \e{port}.
61 \dd Set remote username to \e{user}.
65 \dd Read remote command(s) from local file \e{path}.
69 \dd Disable interactive prompts.
71 \dt \cw{-pw} \e{password}
73 \dd Set remote password to \e{password}. \e{CAUTION:} this will likely
74 make the password visible to other users of the local machine (via
75 commands such as \q{\c{w}}).
77 \dt \cw{\-L} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
79 \dd Set up a local port forwarding: listen on \e{srcport} (or
80 \e{srcaddr}:\e{srcport} if specified), and forward any connections
81 over the SSH connection to the destination address
82 \e{desthost}:\e{destport}. Only works in SSH.
84 \dt \cw{\-R} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
86 \dd Set up a remote port forwarding: ask the SSH server to listen on
87 \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and to
88 forward any connections back over the SSH connection where the
89 client will pass them on to the destination address
90 \e{desthost}:\e{destport}. Only works in SSH.
92 \dt \cw{\-D} [\e{srcaddr}:]\e{srcport}
94 \dd Set up dynamic port forwarding. The client listens on
95 \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and
96 implements a SOCKS server. So you can point SOCKS-aware applications
97 at this port and they will automatically use the SSH connection to
98 tunnel all their connections. Only works in SSH.
102 \dd Enable X11 forwarding.
106 \dd Disable X11 forwarding (default).
110 \dd Enable agent forwarding.
114 \dd Disable agent forwarding (default).
118 \dd Enable pty allocation (default if a command is NOT specified).
122 \dd Disable pty allocation (default if a command is specified).
126 \dd Force use of SSH protocol version 1.
130 \dd Force use of SSH protocol version 2.
134 \dd Enable SSH compression.
138 \dd Private key file for authentication.
142 \dd Remote command is SSH subsystem (SSH-2 only).
146 \dd Don't start a remote command or shell at all (SSH-2 only).
148 \S{plink-manpage-more-information} MORE INFORMATION
150 For more information on plink, it's probably best to go and look at
151 the manual on the PuTTY web page:
153 \W{http://www.chiark.greenend.org.uk/~sgtatham/putty/}\cw{http://www.chiark.greenend.org.uk/~sgtatham/putty/}
155 \S{plink-manpage-bugs} BUGS
157 This man page isn't terribly complete. See the above web link for
158 better documentation.