When you specify the management VRF, the copy operation that is used to transfer files to and from anHTTP server utilizes the VRF table corresponding to the Management VRF to look up the destination.When you specify a nondefault VRF, the VRF table corresponding to that nondefault VRF is used to lookup the HTTP server.However, these changes are backward-compatible and do not affect existing behavior; meaning, you canstill use the ip http source- interface command to communicate with a particular interface evenif no VRF is configured on that interfaceNOTE: If the HTTP service is not VRF-aware, then it uses the global routing table to perform thelook-up.To enable an HTTP client to look up the VRF table corresponding to either management VRF or anynondefault VRF, use the ip http vrf command in CONFIGURATION mode.• Configure an HTTP client with a VRF that is used to connect to the HTTP server.CONFIGURATION MODEDell(conf)#ip http vrf {management | <vrf-name>}Using Hashes to Verify Software Images BeforeInstallationYou can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate thesoftware image on the flash drive, after the image has been transferred to the system, but before theimage has been installed. The validation calculates a hash value of the downloaded image file on system’sflash drive, and, optionally, compares it to a Dell Networking published hash for that file.The MD5 or SHA256 hash provides a method of validating that you have downloaded the originalsoftware. Calculating the hash on the local image file, and comparing the result to the hash published forthat file on iSupport, provides a high level of confidence that the local copy is exactly the same as thepublished software image. This validation procedure, and the verify {md5 | sha256} command to supportit, can prevent the installation of corrupted or modified images.The verify {md5 | sha256} command calculates and displays the hash of any file on the specified localflash drive. You can compare the displayed hash against the appropriate hash published on i-Support.Optionally, the published hash can be included in the verify {md5 | sha256} command, which will displaywhether it matches the calculated hash of the indicated file.To validate a software image:1. Download Dell Networking OS software image file from the iSupport page to the local (FTP or TFTP)server. The published hash for that file is displayed next to the software image file on the iSupportpage.2. Go on to the Dell Networking system and copy the software image to the flash drive, using the copycommand.3. Run the verify {md5 | sha256} [ flash://]img-file [hash-value] command. For example, verify sha256flash://FTOS-SE-9.5.0.0.bin4. Compare the generated hash value to the expected hash value published on the iSupport page.Getting Started 55