Technical data

FastIron Ethernet Switch Administration Guide 75
53-1002637-02
Software versions installed and running on a device
3
Displaying the image versions installed in flash memory
Enter the show flash command to display the boot and flash images installed on the device. An
example of the command output is shown in “Displaying the boot image version running on the
device” on page 74:
The “Compressed Pri Code size” line lists the flash code version installed in the primary flash
area.
The “Compressed Sec Code size” line lists the flash code version installed in the secondary
flash area.
The “Boot Monitor Image size” line lists the boot code version installed in flash memory. The
device does not have separate primary and secondary flash areas for the boot image. The
flash memory module contains only one boot image.
NOTE
To minimize the boot-monitor image size on FastIron devices, the ping and tftp operations
performed in the boot-monitor mode are restricted to copper ports on the FastIron Chassis
management modules and to copper ports on the FastIron stackable switch combination
copper and fiber ports. The fiber ports on these devices do not have the ability to ping or tftp
from the boot-monitor mode.
Flash image verification
The Flash Image Verification feature allows you to verify boot images based on hash codes, and to
generate hash codes where needed. This feature lets you select from three data integrity
verification algorithms:
MD5 - Message Digest algorithm (RFC 1321)
SHA1 - US Secure Hash Algorithm (RFC 3174)
CRC - Cyclic Redundancy Checksum algorithm
Flash image CLI commands
Use the following command syntax to verify the flash image:
Syntax: verify md5 | sha1 | crc32 ASCII string | primary | secondary [hash code]
md5 – Generates a 16-byte hash code
sha1 – Generates a 20-byte hash code
crc32 – Generates a 4 byte checksum
ascii string – A valid image filename
primary – The primary boot image (primary.img)
secondary – The secondary boot image (secondary.img)
hash code – The hash code to verify
The following examples show how the verify command can be used in a variety of circumstances.
To generate an MD5 hash value for the secondary image, enter the following command.