Flash image verification, Flash image cli commands – Brocade FastIron Ethernet Switch Administration Guide User Manual
Page 91
Displaying the image versions installed in flash memory
Enter the show flash command to display the boot and flash images installed on the device. An
example of the command output is shown in
Displaying the boot image version running on the device
on page 90:
• The "Compressed Pri Code size" line lists the flash code version installed in the primary flash area.
• The "Compressed Sec Code size" line lists the flash code version installed in the secondary flash
area.
• The "Boot Monitor Image size" line lists the boot code version installed in flash memory. The device
does not have separate primary and secondary flash areas for the boot image. The flash memory
module contains only one boot image.
NOTE
To minimize the boot-monitor image size on FastIron devices, the ping and tftp operations performed
in the boot-monitor mode are restricted to copper ports on the FastIron Chassis management modules
and to the out-of-band management port on the FastIron stackable switches. The other copper or fiber
ports on these devices do not have the ability to ping or tftp from the boot-monitor mode.
Flash image verification
The Flash Image Verification feature allows you to verify boot images based on hash codes, and to
generate hash codes where needed. This feature lets you select from three data integrity verification
algorithms:
• MD5 - Message Digest algorithm (RFC 1321)
• SHA1 - US Secure Hash Algorithm (RFC 3174)
• CRC - Cyclic Redundancy Checksum algorithm
Flash image CLI commands
Use the following command syntax to verify the flash image:
Syntax: verify md5 | sha1 | crc32 ASCII string|primary|secondary[hash code]
• md5 - Generates a 16-byte hash code
• sha1 - Generates a 20-byte hash code
• crc32 - Generates a 4 byte checksum
• ascii string - A valid image filename
• primary - The primary boot image (primary.img)
• secondary - The secondary boot image (secondary.img)
• hash code - The hash code to verify
The following examples show how the verify command can be used in a variety of circumstances.
To generate an MD5 hash value for the secondary image, enter the following command.
device#verify md5 secondary
device#.........................Done
Size = 2044830, MD5 01c410d6d153189a4a5d36c955653862
To generate a SHA-1 hash value for the secondary image, enter the following command.
device#verify sha secondary
device#.........................Done
Size = 2044830, SHA1 49d12d26552072337f7f5fcaef4cf4b742a9f525
Displaying the image versions installed in flash memory
FastIron Ethernet Switch Administration Guide
91
53-1003075-02