Concept Guide

Upgrading Dell EMC Networking OS
To upgrade Dell EMC Networking Operating System (OS), refer to the Release Notes for the version you want to load on the system.
You can download the release notes of your platform at https://www.force10networks.com. Use your login ID to log in to the website.
Verify Software Images Before Installation
To validate the software image on the ash drive, you can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm, after
the image is transferred to the system but before the image is installed. The validation calculates a hash value of the downloaded image le
on system’s ash drive, and, optionally, compares it to a Dell EMC Networking published hash for that le.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on the
local image le and comparing the result to the hash published for that le on iSupport provides a high level of condence that the local
copy is exactly the same as the published software image. This validation procedure, and the verify {md5 | sha256} command to
support it, prevents the installation of corrupted or modied images.
The verify {md5 | sha256} command calculates and displays the hash of any le on the specied local ash drive. You can
compare the displayed hash against the appropriate hash published on iSupport. Optionally, you can include the published hash in the
verify {md5 | sha256} command, which displays whether it matches the calculated hash of the indicated le.
To validate a software image:
1 Download Dell EMC Networking OS software image le from the iSupport page to the local (FTP or TFTP) server. The published hash
for that le displays next to the software image le on the iSupport page.
2 Go on to the Dell EMC Networking system and copy the software image to the ash drive, using the copy command.
3 Run the verify {md5 | sha256} [ flash://]img-file [hash-value] command. For example, verify sha256
flash://FTOS-SE-9.5.0.0.bin
4 Compare the generated hash value to the expected hash value published on the iSupport page.
To validate the software image on the ash drive after the image is transferred to the system, but before you install the image, use the
verify {md5 | sha256} [ flash://]img-file [hash-value] command in EXEC mode.
md5: MD5 message-digest algorithm
sha256: SHA256 Secure Hash Algorithm
flash: (Optional) Species the ash drive. The default uses the ash drive. You can enter the image le name.
hash-value: (Optional). Specify the relevant hash published on iSupport.
img-file: Enter the name of the Dell EMC Networking software image le to validate
Examples: Without Entering the Hash Value for Verication
MD5
DellEMC# verify md5 flash:file-name
SHA256
DellEMC# verify sha256 flash://file-name
Examples: Entering the Hash Value for Verication
62
Getting Started