scp(1)
NAME
       scp - secure copy (remote file copy program)
SYNOPSIS
       scp  [-12346BCpqrv]  [-c cipher] [-F ssh_config] [-i identity_file] [-l
       limit] [-o ssh_option] [-P port] [-S program] [[user@]host1:]file1  ...
       [[user@]host2:]file2
DESCRIPTION
       scp  copies  files between hosts on a network.  It uses ssh(1) for data
       transfer, and uses the same authentication and provides the same  secu-
       rity  as ssh(1).  scp will ask for passwords or passphrases if they are
       needed for authentication.
       File names may contain a user and host specification to  indicate  that
       the  file  is  to be copied to/from that host.  Local file names can be
       made explicit using absolute or relative pathnames to avoid scp  treat-
       ing  file  names containing `:' as host specifiers.  Copies between two
       remote hosts are also permitted.
       The options are as follows:
       -1     Forces scp to use protocol 1.
       -2     Forces scp to use protocol 2.
       -3     Copies between two remote  hosts  are  transferred  through  the
              local  host.   Without  this  option the data is copied directly
              between the two remote hosts.  Note that  this  option  disables
              the progress meter.
       -4     Forces scp to use IPv4 addresses only.
       -6     Forces scp to use IPv6 addresses only.
       -B     Selects   batch   mode   (prevents   asking   for  passwords  or
              passphrases).
       -C     Compression enable.  Passes the -C flag to ssh(1) to enable com-
              pression.
       -c cipher
              Selects  the  cipher  to  use  for encrypting the data transfer.
              This option is directly passed to ssh(1).
       -F ssh_config
              Specifies an alternative per-user configuration  file  for  ssh.
              This option is directly passed to ssh(1).
       -i identity_file
              Selects  the file from which the identity (private key) for pub-
              lic key authentication is read.  This option is directly  passed
              to ssh(1).
       -l limit
              Limits the used bandwidth, specified in Kbit/s.
       -o ssh_option
              Can  be  used  to  pass  options  to  ssh  in the format used in
              ssh_config(5).  This is useful for specifying options for  which
              there is no separate scp command-line flag.  For full details of
              the  options  listed  below,  and  their  possible  values,  see
              ssh_config(5).
       AddressFamily
       BatchMode
       BindAddress
       CanonicalDomains
       CanonicalizeFallbackLocal
       CanonicalizeHostname
       CanonicalizeMaxDots
       CanonicalizePermittedCNAMEs
       CertificateFile
       ChallengeResponseAuthentication
       CheckHostIP
       Cipher
       Ciphers
       Compression
       CompressionLevel
       ConnectionAttempts
       ConnectTimeout
       ControlMaster
       ControlPath
       ControlPersist
       GlobalKnownHostsFile
       GSSAPIAuthentication
       GSSAPIDelegateCredentials
       HashKnownHosts
       Host
       HostbasedAuthentication
       HostbasedKeyTypes
       HostKeyAlgorithms
       HostKeyAlias
       HostName
       IdentitiesOnly
       IdentityAgent
       IdentityFile
       IPQoS
       KbdInteractiveAuthentication
       KbdInteractiveDevices
       KexAlgorithms
       LogLevel
       MACs
       NoHostAuthenticationForLocalhost
       NumberOfPasswordPrompts
       PasswordAuthentication
       PKCS11Provider
       Port
       PreferredAuthentications
       Protocol
       ProxyCommand
       ProxyJump
       PubkeyAcceptedKeyTypes
       PubkeyAuthentication
       RekeyLimit
       RhostsRSAAuthentication
       RSAAuthentication
       SendEnv
       ServerAliveInterval
       ServerAliveCountMax
       StrictHostKeyChecking
       TCPKeepAlive
       UpdateHostKeys
       UsePrivilegedPort
       User
       UserKnownHostsFile
       VerifyHostKeyDNS
       -P port
              Specifies  the port to connect to on the remote host.  Note that
              this option is written with a capital `P', because -p is already
              reserved for preserving the times and modes of the file.
       -p     Preserves  modification  times, access times, and modes from the
              original file.
       -q     Quiet mode: disables the progress meter as well as  warning  and
              diagnostic messages from ssh(1).
       -r     Recursively copy entire directories.  Note that scp follows sym-
              bolic links encountered in the tree traversal.
       -S program
              Name of program to use for the encrypted connection.   The  pro-
              gram must understand ssh(1) options.
       -v     Verbose mode.  Causes scp and ssh(1) to print debugging messages
              about their progress.  This is helpful in debugging  connection,
              authentication, and configuration problems.
EXIT STATUS
       Ex -std scp
SEE ALSO
       sftp(1),  ssh(1),  ssh-add(1),  ssh-agent(1),  ssh-keygen(1),  ssh_con-
       fig(5), sshd(8)
HISTORY
       scp is based on the rcp program in Bx source code from the  Regents  of
       the University of California.
AUTHORS
       Timo Rinne <Mt tri@iki.fi>
       Tatu Ylonen <Mt ylo@cs.hut.fi>
                                 July 16 2016                           SCP(1)
Man(1) output converted with
man2html