Users Guide
To validate the software image on the ash drive after the image is transferred to the system, but before you install the image, use the
verify {md5 | sha256} [ flash://]img-file [hash-value] command in EXEC mode.
• md5: MD5 message-digest algorithm
• sha256: SHA256 Secure Hash Algorithm
• flash: (Optional) Species the ash drive. The default uses the ash drive. You can enter the image le name.
• hash-value: (Optional). Specify the relevant hash published on iSupport.
• img-file: Enter the name of the Dell Networking software image le to validate
Examples: Without Entering the Hash Value for Verication
MD5
Dell# verify md5 flash://FTOS-SE-9.5.0.0.bin
MD5 hash for FTOS-SE-9.5.0.0.bin: 275ceb73a4f3118e1d6bcf7d75753459
SHA256
Dell# verify sha256 flash://FTOS-SE-9.5.0.0.bin
SHA256 hash for FTOS-SE-9.5.0.0.bin:
e6328c06faf814e6899ceead219afbf9360e986d692988023b749e6b2093e933
Examples: Entering the Hash Value for Verication
MD5
Dell# verify md5 flash://FTOS-SE-9.5.0.0.bin 275ceb73a4f3118e1d6bcf7d75753459
MD5 hash VERIFIED for FTOS-SE-9.5.0.0.bin
SHA256
Dell# verify sha256 flash://FTOS-SE-9.5.0.0.bin
e6328c06faf814e6899ceead219afbf9360e986d692988023b749e6b2093e933
SHA256 hash VERIFIED for FTOS-SE-9.5.0.0.bin
Using HTTP for File Transfers
Stating with Release 9.3(0.1), you can use HTTP to copy les or conguration details to a remote server. To transfer les to an external
server, use the copy source-le-url http://host[:port]/le-path command.
Enter the following source-le-url keywords and information:
• To copy a le from the internal FLASH, enter ash:// followed by the lename.
• To copy the running conguration, enter the keyword running-cong.
• To copy the startup conguration, enter the keyword startup-cong.
• To copy a le on the USB device, enter usbash:// followed by the lename.
In the Dell Networking OS release 9.8(0.0), HTTP services support the VRF-aware functionality. If you want the HTTP server to use a VRF
table that is attached to an interface, congure that HTTP server to use a specic routing table. You can use the ip http vrf command
to inform the HTTP server to use a specic routing table. After you congure this setting, the VRF table is used to look up the destination
address.
NOTE
: To enable HTTP to be VRF-aware, as a prerequisite you must rst dene the
VRF.
You can specify either the management VRF or a nondefault VRF to
congure the VRF awareness setting.
When you specify the management VRF, the copy operation that is used to transfer les to and from an HTTP server utilizes the VRF table
corresponding to the Management VRF to look up the destination. When you specify a nondefault VRF, the VRF table corresponding to
that nondefault VRF is used to look up the HTTP server.
58
Getting Started