Administrator Guide

Table Of Contents
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes
these messages to a dedicated trace log buffer.
The system generates a trace message for each executed command. No password information is saved to the file.
To view the command-history trace, use the show command-history command.
Example of the show command-history Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
[12/5 10:57:13]: CMD-(CLI):boot system rpm0 primary flash://FTOS-CB-1.1.1.2E2.bin
Upgrading Dell Networking OS
NOTE: To upgrade Dell Networking Operating System (OS), refer to the Release Notes for the version you want to load on
the system.
Using HTTP for File Transfers
Stating with Release 9.3(0.1), you can use HTTP to copy files or configuration details to a remote server. Use the copy
source-file-url http://host[:port]/file-path command to transfer files to an external server.
Enter the following source-file-url keywords and information:
To copy a file from the internal FLASH, enter flash:// followed by the filename.
To copy the running configuration, enter the keyword running-config.
To copy the startup configuration, enter the keyword startup-config.
To copy a file on the external FLASH, enter usbflash:// followed by the filename.
Using Hashes to Validate Software Images
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the flash
drive, after the image has been transferred to the system, but before the image has been installed. The validation calculates
a hash value of the downloaded image file on systems flash drive, and, optionally, compares it to a Dell Networking published
hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the
hash on the local image file, and comparing the result to the hash published for that file on iSupport, provides a high level
of confidence that the local copy is exactly the same as the published software image. This validation procedure, and the
verify {md5 | sha256} command to support it, can prevent the installation of corrupted or modified images.
The verify {md5 | sha256} command calculates and displays the hash of any file on the specified local flash drive. You can
compare the displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included
in the verify {md5 | sha256} command, which will display whether it matches the calculated hash of the indicated file.
To validate a software image:
1. Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The published
hash for that file is displayed next to the software image file on the iSupport page.
2. Go on to the Dell Networking system and copy the software image to the flash drive, using the copy command.
Getting Started
45