Administrator Guide
!
3998 bytes successfully copied
DellS#dir
Directory of usbflash:
1 drwx 4096 Jan 01 1980 00:00:00 +00:00 .
2 drwx 2048 May 02 2012 07:05:06 +00:00 ..
3 -rwx 1272 Apr 29 2011 16:15:14 +00:00 startup-config
4 -rwx 3998
May 11 2011 23:36:12 +00:00 test
View the Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes these
messages to a dedicated trace log buer.
The system generates a trace message for each executed command. No password information is saved to the le.
To view the command-history trace, use the show command-history command.
Example of the show command-history Command
Dell#show command-history
[5/18 21:58:32]: CMD-(TEL0):[enable]by admin from vty0 (10.11.68.5)
[5/18 21:58:48]: CMD-(TEL0):[configure]by admin from vty0 (10.11.68.5)
- Repeated 1 time.
[5/18 21:58:57]: CMD-(TEL0):[interface port-channel 1]by admin from vty0 (10.11.68.5)
[5/18 21:59:9]: CMD-(TEL0):[show config]by admin from vty0 (10.11.68.5)
[5/18 22:4:32]: CMD-(TEL0):[exit]by admin from vty0 (10.11.68.5)
[5/18 22:4:41]: CMD-(TEL0):[show interfaces port-channel brief]by admin from vty0
(10.11.68.5)
Using HTTP for File Transfers
Stating with Release 9.3(0.1), you can use HTTP to copy les or conguration details to a remote server. Use the copy source-le-
url http://host[:port]/le-path command to transfer les to an external server.
Enter the following source-le-url keywords and information:
• To copy a le from the internal FLASH, enter ash:// followed by the lename.
• To copy the running conguration, enter the keyword running-cong.
• To copy the startup conguration, enter the keyword startup-cong.
• To copy a le on the external FLASH, enter usbash:// followed by the lename.
Upgrading and Downgrading the Dell Networking OS
NOTE: To upgrade the Dell Networking OS, refer to the Release Notes for the version you want to load on the system.
Using Hashes to Validate Software Images
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the ash
drive, after the image has been transferred to the system, but before the image has been installed. The validation calculates a hash
value of the downloaded image le on system’s ash drive, and, optionally, compares it to a Dell Networking published hash for that
le.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on
the local image le, and comparing the result to the hash published for that le on iSupport, provides a high level of condence that
Getting Started
53