Setup Guide
file name : systemb
BOOT_USER #
To boot from the network:
BOOT_USER # boot change primary
boot device : tftp
file name : FTOS-SI-9-5-0-169.bin
Server IP address : 10.16.127.35
BOOT_USER #
4 Assign an IP address and network mask to the Management Ethernet interface.
BOOT_USER # interface management ethernet ip address ip_address_with_mask
For example, 10.16.150.106/16.
5 Assign an IP address as the default gateway for the system.
default-gateway gateway_ip_address
For example, 10.16.150.254.
6 The environment variables are auto saved.
7 Reload the system.
BOOT_USER # reload
Using Hashes to Verify Software Images Before
Installation
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the ash drive, after
the image has been transferred to the system, but before the image has been installed. The validation calculates a hash value of the
downloaded image le on system’s ash drive, and, optionally, compares it to a Dell Networking published hash for that le.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on the
local image le, and comparing the result to the hash published for that le on iSupport, provides a high level of condence that the local
copy is exactly the same as the published software image. This validation procedure, and the verify {md5 | sha256} command to support
it, can prevent the installation of corrupted or modied images.
The verify {md5 | sha256} command calculates and displays the hash of any le on the specied local ash drive. You can compare the
displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included in the verify {md5 |
sha256} command, which will display whether it matches the calculated hash of the indicated le.
To validate a software image:
1 Download Dell Networking OS software image le from the iSupport page to the local (FTP or TFTP) server. The published hash for
that le is displayed next to the software image le on the iSupport page.
2 Go on to the Dell Networking system and copy the software image to the ash drive, using the copy command.
3 Run the verify {md5 | sha256} [ ash://]img-le [hash-value] command. For example, verify sha256 ash://FTOS-SE-9.5.0.0.bin
4 Compare the generated hash value to the expected hash value published on the iSupport page.
To validate the software image on the ash drive after the image has been transferred to the system, but before the image has been
installed, use the verify {md5 | sha256} [ ash://]img-le [hash-value] command in EXEC mode.
• md5: MD5 message-digest algorithm
• sha256: SHA256 Secure Hash Algorithm
• ash: (Optional) Species the ash drive. The default is to use the ash drive. You can just enter the image le name.
86
Switch Management