Administrator Guide
You can download the release notes of your platform at https://www.force10networks.com. Use your login ID to log in to the website.
Using HTTP for File Transfers
Stating with Release 9.3(0.1), you can use HTTP to copy files or configuration details to a remote server. To transfer files to an external 
server, use the copy source-file-url http://host[:port]/file-path command.
Enter the following source-file-url keywords and information:
• To copy a file from the internal FLASH, enter flash:// followed by the filename.
• To copy the running configuration, enter the keyword running-config.
• To copy the startup configuration, enter the keyword startup-config.
• To copy a file on the USB device, enter usbflash:// followed by the filename.
In the Dell EMC Networking OS release 9.8(0.0), HTTP services support the VRF-aware functionality. If you want the HTTP server to use 
a VRF table that is attached to an interface, configure that HTTP server to use a specific routing table. You can use the ip http vrf 
command to inform the HTTP server to use a specific routing table. After you configure this setting, the VRF table is used to look up the 
destination address.
NOTE:
 To enable HTTP to be VRF-aware, as a prerequisite you must first define the VRF.
You can specify either the management VRF or a nondefault VRF to configure the VRF awareness setting.
When you specify the management VRF, the copy operation that is used to transfer files to and from an HTTP server utilizes the VRF 
table corresponding to the Management VRF to look up the destination. When you specify a nondefault VRF, the VRF table corresponding 
to that nondefault VRF is used to look up the HTTP server.
However, these changes are backward-compatible and do not affect existing behavior; meaning, you can still use the ip http 
source- interface command to communicate with a particular interface even if no VRF is configured on that interface
NOTE:
 If the HTTP service is not VRF-aware, then it uses the global routing table to perform the look-up.
To enable an HTTP client to look up the VRF table corresponding to either management VRF or any nondefault VRF, use the ip http 
vrf command in CONFIGURATION mode.
• Configure an HTTP client with a VRF that is used to connect to the HTTP server.
CONFIGURATION MODE
DellEMC(conf)#ip http vrf {management | <vrf-name>}
Verify Software Images Before Installation
To validate the software image on the flash drive, you can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm, 
after the image is transferred to the system but before the image is installed. The validation calculates a hash value of the downloaded 
image file on system’s flash drive, and
, optionally, compares it to a Dell EMC Networking published hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash on the 
local image file and comparing the result to the hash published for that file on iSupport provides a high level of confidence that the local 
copy is exactly the same as the published software image. This validation procedure, and the verify {md5 | sha256} command to 
support it, prevents the installation of corrupted or modified images.
The verify {md5 | sha256} command calculates and displays the hash of any file on the specified local flash drive. You can 
compare the displayed hash against the appropriate hash published on iSupport. Optionally, you can include the published hash in the 
verify {md5 | sha256} command, which displays whether it matches the calculated hash of the indicated file.
To validate a software image:
1. Download Dell EMC Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The published hash 
for that file displays next to the software image file on the iSupport page.
2. Go on to the Dell EMC Networking system and copy the software image to the flash drive, using the copy command.
3. Run the verify {md5 | sha256} [ flash://]img-file [hash-value] command. For example, verify sha256 
flash://FTOS-SE-9.5.0.0.bin
4. Compare the generated hash value to the expected hash value published on the iSupport page.
To validate the software image on the flash drive after the image is transferred to the system, but before you install the image, use the 
verify {md5 | sha256} [ flash://]img-file [hash-value] command in EXEC mode.
• md5: MD5 message-digest algorithm
Getting Started
51










