Example of show feature output
For a particular target where VRF is enabled, the show output is similar to the following:
Feature State
------------------------
VRF Enabled
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes these
messages to a dedicated trace log buffer.
The system generates a trace message for each executed command. No password information is saved to the file.
To view the command-history trace, use the
show command-history
command.
Example of the
show command-history
Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
[12/5 10:57:13]: CMD-(CLI):boot system rpm0 primary flash://FTOS-CB-1.1.1.2E2.bin
Upgrading Dell Networking OS
NOTE:
To upgrade Dell Networking Operating System (OS), refer to the Release Notes for the version you want to load on the
system.
Verify Software Images Before Installation
To validate the software image on the flash drive, you can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm, after
the image is transferred to the system but before the image is installed. The validation calculates a hash value of the downloaded image file
on system’s flash drive, and
,
optionally
,
compares it to a Dell Networking published hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on the
local image file and comparing the result to the hash published for that file on iSupport provides a high level of confidence that the local
copy is exactly the same as the published software image. This validation procedure, and the
verify {md5 | sha256}
command to
support it, prevents the installation of corrupted or modified images.
The
verify {md5 | sha256}
command calculates and displays the hash of any file on the specified local flash drive. You can
compare the displayed hash against the appropriate hash published on iSupport. Optionally, you can include the published hash in the
verify {md5 | sha256}
command, which displays whether it matches the calculated hash of the indicated file.
To validate a software image:
1
Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The published hash for
that file displays next to the software image file on the iSupport page.
2
Go on to the Dell Networking system and copy the software image to the flash drive, using the
copy
command.
3
Run the
verify {md5 | sha256} [ flash://]img-file [
hash-value
]
command. For example,
verify sha256
flash://FTOS-SE-9.5.0.0.bin
4
Compare the generated hash value to the expected hash value published on the iSupport page.
Getting Started
57
Содержание S3048-ON
Страница 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Страница 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Страница 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Страница 241: ...Dell Control Plane Policing CoPP 241 ...
Страница 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Страница 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Страница 429: ...Figure 54 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 429 ...
Страница 432: ...Figure 56 Inspecting a LAG Port on BRAVO Using the show interface Command 432 Link Aggregation Control Protocol LACP ...
Страница 433: ...Figure 57 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 433 ...
Страница 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Страница 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Страница 479: ...Figure 75 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 479 ...
Страница 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Страница 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Страница 634: ...protocol spanning tree pvst no disable vlan 300 bridge priority 4096 634 Per VLAN Spanning Tree Plus PVST ...
Страница 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Страница 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...