Configuration Guide User guide

FastIron Configuration Guide 75
53-1002494-02
Software versions installed and running on a device
NOTE
To minimize the boot-monitor image size on FastIron devices, the ping and tftp operations
performed in the boot-monitor mode are restricted to copper ports on the FastIron Chassis
management modules and to copper ports on the FastIron stackable switch combination
copper and fiber ports. The fiber ports on these devices do not have the ability to ping or tftp
from the boot-monitor mode.
Flash image verification
The Flash Image Verification feature allows you to verify boot images based on hash codes, and to
generate hash codes where needed. This feature lets you select from three data integrity
verification algorithms:
MD5 - Message Digest algorithm (RFC 1321)
SHA1 - US Secure Hash Algorithm (RFC 3174)
CRC - Cyclic Redundancy Checksum algorithm
Flash image CLI commands
Use the following command syntax to verify the flash image:
Syntax: verify md5 | sha1 | crc32 <ASCII string> | primary | secondary [<hash code>]
md5 – Generates a 16-byte hash code
sha1 – Generates a 20-byte hash code
crc32 – Generates a 4 byte checksum
ascii string – A valid image filename
primary – The primary boot image (primary.img)
secondary – The secondary boot image (secondary.img)
hash code – The hash code to verify
The following examples show how the verify command can be used in a variety of circumstances.
To generate an MD5 hash value for the secondary image, enter the following command.
Brocade#verify md5 secondary
Brocade#.........................Done
Size = 2044830, MD5 01c410d6d153189a4a5d36c955653862
To generate a SHA-1 hash value for the secondary image, enter the following command.
Brocade#verify sha secondary
Brocade#.........................Done
Size = 2044830, SHA1 49d12d26552072337f7f5fcaef4cf4b742a9f525
To generate a CRC32 hash value for the secondary image, enter the following command.
Brocade#verify crc32 secondary
Brocade#.........................Done
Size = 2044830, CRC32 b31fcbc0
To verify the hash value of a secondary image with a known value, enter the following commands.