WinSCP/PuTTY Setup (Windows)



WinSCP is an SCP client for windows implementing the SSH protocol from PuTTY.

WinSCP can be downloaded here.

Upon startup:


1. Add a New Site and set:

  • File protocol to SCP
  • Enter in Host Name: or
  • Enter your NeSI Linux username into User name: (Password optional)


5. Open Advanced Settings.


6. Navigate to Connection > Tunnel and set:

  • Enable "Connect through SSH tunnel".
  • Under "Host name:" enter
  • Under "User name:" enter your username.
  • Optionally, enter your password in the "Password:" box.

10. OK > Save

Setup for PuTTY Terminal

The default WinSCP terminal lacks much functionality. We highly recommend you use the PuTTY terminal instead.

1. Download PuTTY here and install.

2.In WinSCP open 'Tools > Preferences'


3. Under Integration > Applications enable Remember session password and pass it to PuTTY



Setup for Xming (Optional)

Xming is an X server for Windows allowing graphical interface with the HPC and can be downloaded here.

1. Install Xming following the prompts. (Make sure 'Normal PuTTY Link SSH Client' is selected).

2. Under Integration > Applications and add -X after PuTTY/Terminal client path.


3. Restart your session.


In order for X11 forwarding to work you must have an Xming server running before connecting to the HPC.


Files can be dragged, dropped and modified in the WinSCP GUI just like in any windows file system.


putTerm.png Will open a PuTTY terminal. Assuming you followed the steps setting up PuTTY, this should automatically enter in your details.

winTerm.png Will open the default WinSCP terminal. While the functionality is identical to any other terminal the interface is slightly abstracted, with a separate window for input and command history drop-down.

winAdd.png Type here to change directory. The GUI doesn't follow your current terminal directory like MobaXterm so must be changed manually. (Recommend making this larger as the default is very hard to type in).

winBook.png Bookmark current directory.


As WinSCP uses multiple tunnels for file transfer you will be required to authenticate again on your first file operation of the session. The second prompt for your second-factor token can be skipped, just as with login authentication.

What Next?

Was this article helpful?
1 out of 1 found this helpful