Network Configuration

If you have an installed network adapter, you are asked for network configuration details, as already shown in Figure 1.18. Fedora can be set to automatically configure networking upon booting. Note that you can also configure networking following installation, using Fedora's system-config-network graphical network administration tool (see Chapter 10, 'Managing Users,' for details about using these tools).

NOTE

If the Linux kernel finds more than one network interface installed on your computer, you might be asked to configure a second ethernet device. This might be the case, for example, if you are installing Fedora on a computer that serves as a gateway or fire wall. If you configure more than one ethernet device, the device named eth0 is the first active interface when you start Fedora.

You can choose to have your interface information automatically set with DHCP. Otherwise, especially if you are configuring a DHCP server, manually enter an IP address, hostname, or gateway address (such as for a router), along with DNS information if you click the Edit button listed by the interface (such as eth0 in the example). After making your selection, click Next to continue.

Setting the Time Zone

You are next shown a Time Zone Selection dialog (see Figure 1.19). There are two 'clocks,' or times, when using a PC: the hardware clock, maintained by hardware in the computer and a backup battery; and the system time, set upon booting and used by the Linux kernel. It is important to keep the two times accurate and in synchronization because automated system administration might need to take place at critical times. Many computer installations use computers with hardware clocks set to GMT, which stands for Greenwich mean time. The more modern designation is UTC or coordinated universal time. The Linux system time is set relative to this time and the default time zone, such as eastern standard time, which is -5 hours of UTC.

Setting the computer's hardware clock to UTC (GMT) has the advantage of allowing the Linux system time to be easily set relative to the geographic position of the computer and resident time zone (such as a Linux laptop user who would like to create files or send electronic mail with correct time stamps, and who has traveled from New York to Tokyo).

TIP

Read the man page for the hwclock command to learn how to keep a running Linux system synchronized with a PC's hardware clock.

Choose your time configuration, and then click Next.

FIGURE 1.19 Select your time zone.

Creating a Root Password and User Accounts

You are next asked to enter a root operator password, as shown in Figure 1.20. Type in a password, press Tab or Enter, and then type it again to make sure that it is verified. The password, which is case sensitive, should be at least eight characters (or more) and consist of letters and numbers. Note that the password is not echoed back to the display. Your root password is important because you need it to perform any system administration or user management with Fedora.

FIGURE 1.20 Type in, and do not forget, your root password.

CAUTION

Do not forget your system's BIOS, boot loader, or root passwords! Some equipment, such as notebook computers, might require factory replacement of motherboard components if the owner forgets the BIOS password. The BIOS settings on most desktop PCs can usually be reset via a jumper or removal and insertion of the motherboard battery. If you forget your boot loader password, use a boot disk (perhaps created during installation as shown later on in this chapter) or boot to a rescue mode by using your Fedora disc and reset the root password, using the passwd command.

When finished, click Next to continue with software package selection for your new server.

NOTE

You can create a root account only during a Fedora install. You will have to create user accounts after booting, using a command-line program (such as adduser) or the graphical system-config- users client. Create an account for yourself and any additional users. Usernames traditionally consist of the first letter of a person's first name and then the last name. For example, Tom Denning would have a username of tdenning. Do not forget to enter a password for any new user! If you create a user without a creating a password, the new user will not be able to log in.

You should create at least one user for your server in addition to the root operator. This is for security purposes and to avoid logging in as root, either through the keyboard at the server or remotely over the network. The default shell and home directory settings should remain set at the defaults, which are the Bourne Again SHell (bash) and the /home directory.

See Chapter 4, 'Command-Line Quick Start,' for how to become the root user or run root commands as a regular user. See Chapter 10 for details on managing users.

TIP

Good passwords are essential for system security. However, some people still rely on passwords as simple as admin. This is asking for trouble, and we would encourage you to create a strong password made up of letters, numbers, and even punctuation. It can be difficult to create a password that is easily memorable and that includes punctuation, but it can be simpler than you think. For instance, George Nedeff may want to use his full name as a password, but that would be easy to crack. What he could do is use punctuation and numbers to replace similar letters in his name, such as G30rg3n3defF. This is a very strong password, and not easily broken, but at the same time it is very easy to remember.

Software Selection and Installation

Fedora enables you to select three predefined options for the installation package manifest. For this example, we're just going to use Office and Productivity, but if you are going to explore the chapters in the latter third of this book, you will need Software Development, and you will definitely need Web Server if you are going to use what you learn in Chapter 17. This screen is shown in Figure 1.21.

Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×