Administrator Guide

You are placed in the boot-line interface (BLI) at the BOOT_USER # prompt.
Press any key
3. Assign the new location of the image to be used when the system reloads.
To boot from flash partition A:
BOOT_USER # boot change primary
boot device : flash
file name : systema
BOOT_USER #
To boot from flash partition B:
BOOT_USER # boot change primary
boot device : flash
file name : systemb
BOOT_USER #
To boot from the network:
BOOT_USER # boot change primary
boot device : tftp
file name : FTOS-SI-9-5-0-169.bin
Server IP address : 10.16.127.35
BOOT_USER #
4. Assign an IP address and network mask to the Management Ethernet interface.
BOOT_USER # interface management ethernet ip address ip_address_with_mask
For example, 10.16.150.106/16.
5. Assign an IP address as the default gateway for the system.
default-gateway gateway_ip_address
For example, 10.16.150.254.
6. The environment variables are auto saved.
7. Reload the system.
BOOT_USER # reload
Using Hashes to Verify Software Images Before
Installation
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the flash
drive, after the image has been transferred to the system, but before the image has been installed. The validation calculates a
hash value of the downloaded image file on systems flash drive, and, optionally, compares it to a Dell Networking published
hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the
hash on the local image file, and comparing the result to the hash published for that file on iSupport, provides a high level of
confidence that the local copy is exactly the same as the published software image. This validation procedure, and the
verify {md5 | sha256} command to support it, can prevent the installation of corrupted or modified images.
The verify {md5 | sha256} command calculates and displays the hash of any file on the specified local flash drive. You can
compare the displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included
in the verify {md5 | sha256} command, which will display whether it matches the calculated hash of the indicated file.
To validate a software image:
1. Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The published
hash for that file is displayed next to the software image file on the iSupport page.
78
Switch Management