Using Hashes To Verify Software Images Before Installation - Dell C9000 Series Networking Configuration Manual

Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

To boot from flash partition A:
BOOT_USER # boot change primary
boot device
file name
BOOT_USER #
To boot from flash partition B:
BOOT_USER # boot change primary
boot device
file name
BOOT_USER #
To boot from the network:
BOOT_USER # boot change primary
boot device
file name
Server IP address
BOOT_USER #
4
Assign an IP address and network mask to the Management Ethernet interface.
BOOT_USER # interface management ethernet ip address ip_address_with_mask
For example, 10.16.150.106/16.
5
Assign an IP address as the default gateway for the system.
default-gateway gateway_ip_address
For example, 10.16.150.254.
6
The environment variables are auto saved.
7
Reload the system.
BOOT_USER # reload
Using Hashes to Verify Software Images
Before Installation
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software
image on the flash drive, after the image has been transferred to the system, but before the image has been
installed. The validation calculates a hash value of the downloaded image file on system's flash drive, and,
optionally, compares it to a Dell Networking published hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software.
Calculating the hash on the local image file, and comparing the result to the hash published for that file on
iSupport, provides a high level of confidence that the local copy is exactly the same as the published software
image. This validation procedure, and the verify {md5 | sha256} command to support it, can prevent the
installation of corrupted or modified images.
:
flash
:
systema
:
flash
:
systemb
:
tftp
:
FTOS-SI-9-5-0-169.bin
:
10.16.127.35
Switch Management
91

Advertisement

Table of Contents
loading

Table of Contents