Example of the show command-history CommandDell#show command-history[12/5 10:57:8]: CMD-(CLI):service password-encryption[12/5 10:57:12]: CMD-(CLI):hostname Force10[12/5 10:57:12]: CMD-(CLI):ip telnet server enable[12/5 10:57:12]: CMD-(CLI):line console 0[12/5 10:57:12]: CMD-(CLI):line vty 0 9[12/5 10:57:13]: CMD-(CLI):boot system rpm0 primary flash://FTOS-CB-1.1.1.2E2.binUpgrading Dell Networking OSNOTE: To upgrade Dell Networking Operating System (OS), refer to the Release Notes for the version you want to loadon the system.Using Hashes to Verify Software Images Before InstallationYou can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the software image on the flashdrive, after the image has been transferred to the system, but before the image has been installed. The validation calculates a hashvalue of the downloaded image file on system’s flash drive, and, optionally, compares it to a Dell Networking published hash for thatfile.The MD5 or SHA256 hash provides a method of validating that you have downloaded the original software. Calculating the hash onthe local image file, and comparing the result to the hash published for that file on iSupport, provides a high level of confidence thatthe local copy is exactly the same as the published software image. This validation procedure, and the verify {md5 | sha256}command to support it, can prevent the installation of corrupted or modified images.The verify {md5 | sha256} command calculates and displays the hash of any file on the specified local flash drive. You can comparethe displayed hash against the appropriate hash published on i-Support. Optionally, the published hash can be included in theverify {md5 | sha256} command, which will display whether it matches the calculated hash of the indicated file.To validate a software image:1. Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP) server. The publishedhash for that file is displayed next to the software image file on the iSupport page.2. Go on to the Dell Networking system and copy the software image to the flash drive, using the copy command.3. Run the verify {md5 | sha256} [ flash://]img-file [hash-value] command. For example, verify sha256 flash://FTOS-SE-9.5.0.0.bin4. Compare the generated hash value to the expected hash value published on the iSupport page.To validate the software image on the flash drive after the image has been transferred to the system, but before the image has beeninstalled, use the verify {md5 | sha256} [ flash://]img-file [hash-value] command in EXEC mode.• md5: MD5 message-digest algorithm• sha256: SHA256 Secure Hash Algorithm• flash: (Optional) Specifies the flash drive. The default is to use the flash drive. You can just enter the image file name.• hash-value: (Optional). Specify the relevant hash published on i-Support.• img-file: Enter the name of the Dell Networking software image file to validateExamples: Without Entering the Hash Value for Verification56 Getting Started