1023 in binary option is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP ports can also be forwarded over the secure channel. Forces ssh to try protocol version 1 only.
Forces ssh to try protocol version 2 only. Forces ssh to use IPv4 addresses only. Forces ssh to use IPv6 addresses only. Enables forwarding of the authentication agent connection.
This can also be specified on a per-host basis in a configuration file. Agent forwarding should be enabled with caution. Disables forwarding of the authentication agent connection. Only useful on systems with more than one address. Compression is desirable on modem lines and other slow connections, but will only slow down things on fast networks. Selects the cipher specification for encrypting the session. Protocol version 1 allows specification of a single cipher.
The supported values are “3des”, “blowfish”, and “des”. It is believed to be secure. Specifies a local “dynamic” application-level port forwarding. Whenever a connection is made to this port, the connection is forwarded over the secure channel, and the application protocol is then used to determine where to connect to from the remote machine.
Sm on or by enclosing the address in square brackets. Only the superuser can forward privileged ports. The escape character is only recognized at the beginning of a line. Setting the character to “none” disables any escapes and makes the session fully transparent.