DELL 9.7(0.0) User Manual

Page of 1039
For a particular target where VRF is enabled, the show output is similar to the following:
Feature State
------------------------------
VRF        enabled
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time 
stamp and writes these messages to a dedicated trace log buffer.
The system generates a trace message for each executed command. No password information is saved 
to the file.
To view the command-history trace, use the show command-history command.
Example of the show command-history Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
Upgrading the Dell Networking OS
NOTE: To upgrade the Dell Networking operating software, refer to the Release Notes for the 
version you want to load on the switch.
Using Hashes to Validate Software Images
You can use the MD5 message-digest algorithm or SHA256 Secure Hash Algorithm to validate the 
software image on the flash drive, after the image has been transferred to the system, but before the 
image has been installed. The validation calculates a hash value of the downloaded image file on system’s 
flash drive, and, optionally, compares it to a Dell Networking published hash for that file.
The MD5 or SHA256 hash provides a method of validating that you have downloaded the original 
software.  Calculating the hash on the local image file, and comparing the result to the hash published for 
that file on iSupport, provides a high level of confidence that the local copy is exactly the same as the 
published software image. This validation procedure, and the verify {md5 | sha256} command to support 
it, can prevent the installation of corrupted or modified images.
The verify {md5 | sha256} command calculates and displays the hash of any file on the specified local 
flash drive.  You can compare the displayed hash against the appropriate hash published on i-Support. 
Optionally, the published hash can be included in the verify {md5 | sha256} command, which will display 
whether it matches the calculated hash of the indicated file.
To validate a software image:
Getting Started
53