![Dell S6000-ON Скачать руководство пользователя страница 55](http://html.mh-extra.com/html/dell/s6000-on/s6000-on_configuration-manual_84557055.webp)
When you specify the management VRF, the copy operation that is used to transfer files to and from an
HTTP server utilizes the VRF table corresponding to the Management VRF to look up the destination.
When you specify a nondefault VRF, the VRF table corresponding to that nondefault VRF is used to look
up the HTTP server.
However, these changes are backward-compatible and do not affect existing behavior; meaning, you can
still use the
ip http source- interface
command to communicate with a particular interface even
if no VRF is configured on that interface
NOTE: If the HTTP service is not VRF-aware, then it uses the global routing table to perform the
look-up.
To enable an HTTP client to look up the VRF table corresponding to either management VRF or any
nondefault VRF, use the
ip http vrf
command in CONFIGURATION mode.
• Configure an HTTP client with a VRF that is used to connect to the HTTP server.
CONFIGURATION MODE
Dell(conf)#ip http vrf {management | <
vrf-name
>}
Using Hashes to Verify Software Images Before
Installation
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the
software image on the flash drive, after the image has been transferred to the system, but before the
image has been installed. The validation calculates a hash value of the downloaded image file on system’s
flash drive, and
,
optionally
,
compares it to a Dell Networking published hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original
software. Calculating the hash on the local image file, and comparing the result to the hash published for
that file on iSupport, provides a high level of confidence that the local copy is exactly the same as the
published software image. This validation procedure, and the
verify
{
md5
|
sha256
} command to support
it, can prevent the installation of corrupted or modified images.
The
verify
{
md5
|
sha256
} command calculates and displays the hash of any file on the specified local
flash drive. You can compare the displayed hash against the appropriate hash published on i-Support.
Optionally, the published hash can be included in the
verify
{
md5
|
sha256
} command, which will display
whether it matches the calculated hash of the indicated file.
To validate a software image:
1.
Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP)
server. The published hash for that file is displayed next to the software image file on the iSupport
page.
2.
Go on to the Dell Networking system and copy the software image to the flash drive, using the
copy
command.
3.
Run the
verify
{
md5
|
sha256
} [
flash
://]
img-file
[
hash-value
] command. For example,
verify sha256
flash://FTOS-SE-9.5.0.0.bin
4.
Compare the generated hash value to the expected hash value published on the iSupport page.
Getting Started
55
Содержание S6000-ON
Страница 1: ...Dell Configuration Guide for the S6000 ON System 9 9 0 0 ...
Страница 505: ...Figure 60 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 505 ...
Страница 508: ...Figure 62 Inspecting a LAG Port on BRAVO Using the show interface Command 508 Link Aggregation Control Protocol LACP ...
Страница 509: ...Figure 63 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 509 ...
Страница 552: ...mac address table static multicast mac address vlan vlan id output range interface 552 Microsoft Network Load Balancing ...
Страница 557: ...Figure 80 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 557 ...
Страница 558: ...Figure 81 Configuring PIM in Multiple Routing Domains 558 Multicast Source Discovery Protocol MSDP ...
Страница 562: ...Figure 83 MSDP Default Peer Scenario 1 562 Multicast Source Discovery Protocol MSDP ...
Страница 563: ...Figure 84 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 563 ...
Страница 564: ...Figure 85 MSDP Default Peer Scenario 3 564 Multicast Source Discovery Protocol MSDP ...
Страница 665: ...Policy based Routing PBR 665 ...
Страница 672: ...ip pim bsr border Remove candidate RP advertisements clear ip pim rp mapping 672 PIM Sparse Mode PIM SM ...
Страница 818: ...Figure 110 Single and Double Tag TPID Match 818 Service Provider Bridging ...
Страница 819: ...Figure 111 Single and Double Tag First byte TPID Match Service Provider Bridging 819 ...
Страница 995: ...Figure 140 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 995 ...