Service Manual

For a particular target where VRF is enabled, the show output is similar to the following:
Feature State
------------------------------
VRF enabled
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes these
messages to a dedicated trace log buer.
The system generates a trace message for each executed command. No password information is saved to the le.
To view the command-history trace, use the show command-history command.
Example of the show command-history Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
[12/5 10:57:13]: CMD-(CLI):boot system rpm0 primary flash://FTOS-CB-1.1.1.2E2.bin
Upgrading Dell Networking OS
NOTE: To upgrade Dell Networking Operating System (OS), refer to the Release Notes for the version you want to load
on the system.
Using Hashes to Validate Software Images
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the ash
drive, after the image has been transferred to the system, but before the image has been installed. The validation calculates a hash
value of the downloaded image le on system’s ash drive, and, optionally, compares it to a Dell Networking published hash for that
le.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on
the local image le, and comparing the result to the hash published for that le on iSupport, provides a high level of condence that
the local copy is exactly the same as the published software image. This validation procedure, and the verify {md5 | sha256}
command to support it, can prevent the installation of corrupted or modied images.
The verify {md5 | sha256} command calculates and displays the hash of any le on the specied local ash drive. You can compare
the displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included in the
verify {md5 | sha256} command, which will display whether it matches the calculated hash of the indicated le.
To validate a software image:
1. Download Dell Networking OS software image le from the iSupport page to the local (FTP or TFTP) server. The published
hash for that le is displayed next to the software image le on the iSupport page.
2. Go on to the Dell Networking system and copy the software image to the ash drive, using the copy command.
3. Run the verify {md5 | sha256} [ ash://]img-le [hash-value] command. For example, verify sha256 ash://FTOS-
SE-9.5.0.0.bin
4. Compare the generated hash value to the expected hash value published on the iSupport page.
Getting Started
53