
Example of the
show command-history
Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
[12/5 10:57:13]: CMD-(CLI):boot system rpm0 primary flash://FTOS-CB-1.1.1.2E2.bin
Upgrading Dell Networking OS
NOTE: To upgrade Dell Networking Operating System (OS), refer to the Release Notes for the version you want to load
on the system.
Using Hashes to Verify Software Images Before Installation
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the flash
drive, after the image has been transferred to the system, but before the image has been installed. The validation calculates a hash
value of the downloaded image file on system’s flash drive, and
,
optionally
,
compares it to a Dell Networking published hash for that
file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on
the local image file, and comparing the result to the hash published for that file on iSupport, provides a high level of confidence that
the local copy is exactly the same as the published software image. This validation procedure, and the
verify
{
md5
|
sha256
}
command to support it, can prevent the installation of corrupted or modified images.
The
verify
{
md5
|
sha256
} command calculates and displays the hash of any file on the specified local flash drive. You can compare
the displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included in the
verify
{
md5
|
sha256
} command, which will display whether it matches the calculated hash of the indicated file.
To validate a software image:
1.
Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The published
hash for that file is displayed next to the software image file on the iSupport page.
2.
Go on to the Dell Networking system and copy the software image to the flash drive, using the
copy
command.
3.
Run the
verify
{
md5
|
sha256
} [
flash
://]
img-file
[
hash-value
] command. For example,
verify sha256 flash://FTOS-
SE-9.5.0.0.bin
4.
Compare the generated hash value to the expected hash value published on the iSupport page.
To validate the software image on the flash drive after the image has been transferred to the system, but before the image has been
installed, use the
verify
{
md5
|
sha256
} [
flash
://]
img-file
[
hash-value
] command in EXEC mode.
•
md5
: MD5 message-digest algorithm
•
sha256
: SHA256 Secure Hash Algorithm
•
flash:
(Optional) Specifies the flash drive. The default is to use the flash drive. You can just enter the image file name.
•
hash-value
: (Optional). Specify the relevant hash published on i-Support.
•
img-file
: Enter the name
of
the Dell Networking
software
image file to validate
Examples: Without Entering the Hash Value for Verification
56
Getting Started
Содержание S4048-ON
Страница 1: ...Dell Configuration Guide for the S4048 ON System 9 9 0 0 ...
Страница 146: ...Figure 14 BFD Three Way Handshake State Changes 146 Bidirectional Forwarding Detection BFD ...
Страница 477: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 477 ...
Страница 480: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command 480 Link Aggregation Control Protocol LACP ...
Страница 481: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 481 ...
Страница 522: ...Figure 87 Configuring Interfaces for MSDP 522 Multicast Source Discovery Protocol MSDP ...
Страница 523: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 523 ...
Страница 524: ...Figure 89 Configuring PIM in Multiple Routing Domains 524 Multicast Source Discovery Protocol MSDP ...
Страница 528: ...Figure 91 MSDP Default Peer Scenario 1 528 Multicast Source Discovery Protocol MSDP ...
Страница 529: ...Figure 92 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 529 ...
Страница 530: ...Figure 93 MSDP Default Peer Scenario 3 530 Multicast Source Discovery Protocol MSDP ...
Страница 633: ...Policy based Routing PBR 633 ...
Страница 777: ...Figure 119 Single and Double Tag TPID Match Service Provider Bridging 777 ...
Страница 778: ...Figure 120 Single and Double Tag First byte TPID Match 778 Service Provider Bridging ...