Skip to main content

Cornell University

Win/Unix Client and a Unix Server

Transfer files between a Win/Unix Client and a Unix Server.

This article applies to: Managed Servers

On This Page

Note: This page outlines secure methods for transferring files between a Windows or Unix client and a Unix server. If you are transferring files between other systems, please see the File Transfer page to find the secure method that's right for your needs.
Recommended File Transfer Options
SFTP/SCP (Always encrypted) FTP over SSL (FTPS) (Always encrypted) Microsoft File Sharing (SMB/CIFS)
Win/Unix Client & Unix Server X

What is SFTP/SCP? (Okay to use to transfer confidential data)

SFTP (Secure File Transfer Protocol) is a file transfer protocol similar to FPT but with additional security (both commands and data are encrypted). The SFTP client talks to the SSH daemon on the server. When you use SFTP, you can transfer files and also perform some simple file and directory commands such as listing files and changing directories.

SCP (Secure Copy Protocol) is a secure file transfer protocol. The SCP client talks to the SSH daemon on the server. It is used only for transferring files. To use SCP, you must know the exact directory tree of the destination location.

Client Setup

No additional setup is required.

Transfer Files using SFTP

  1. At the command prompt, enter:
    sftp userid@server_name.
  2. For example, sftp
    You may be prompted to enter your password.

  3. After connecting to the server, you can use standard commands including cd, dir, get, and put.
  4. To transfer files to the server, enter:
    put june06extract

Transfer Files using SCP

  1. At the command prompt, enter:
    scp source_file_name

    For example, scp june06extract

Unattended File Transfers

If you want run an unattended server to server file transfer, see Unattended Server to Server File Transfers: Unix to Unix.


To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.