Home > Articles > Operating Systems, Server > Linux/UNIX/Open Source

Installing Fedora 5

This chapter is from the book

This chapter is from the book

Step-by-Step Installation

This section provides a basic step-by-step installation of Fedora from DVD. There are many different ways to proceed with an install, and the installer can provide a graphical or text-based interface in a variety of modes.

This example installation prepares a computer for general duties as a server, perhaps to host a File Transfer Protocol site, a web server using Apache, or Session Message Block (SMB) services using Samba.

Before you begin, you should ensure that your computer is not connected to the Internet. Although you can use the installer to set up network protection during the install, it is best to check your system settings after any install and before opening up any public services (see the section "firstboot Configuration" later in this chapter).

Starting the Install

To get started, insert the DVD into your drive and reboot your computer. You first see a boot screen that offers a variety of options for booting (see Figure 3.1). Options may be passed to the Linux install kernel by typing special keywords at the boot prompt. Note that the install kernel is different from the kernel that is installed on your system during installation!

03fig02.jpg

Figure 3.1 Select an installation option in this first Fedora boot screen.

The basic options most often used are

  • <ENTER> Starts the install using a graphical interface. The graphical interface supports a mouse and offers check boxes and text fields for choosing software, configuring options, and entering information.
  • linux text Starts the install using a graphical text interface.

To install using a text-based interface (used for our example), type linux text and press Enter; otherwise, just press Enter to start the install.

Several function keys can be used at this first boot screen to cycle through four help screens providing additional install information. Use these function keys at the boot prompt to jump to different screens describing alternative installation options and modes:

  • Pressing F1 returns to the initial boot screen.
  • Pressing F2 details some boot options.
  • Pressing F3 gives general installation information (described next in this chapter).
  • Pressing F4 describes how to pass kernel video arguments, useful for configuring video hardware to support a graphical install at a specific resolution (such as 800-by-600 pixels).
  • Pressing F5 describes Fedora's rescue mode.

Some of the options you can use at the boot prompt include

  • linux noprobe Disables probing of the system's hardware.
  • linux mediacheck Verifies the integrity of one or more install CD-ROMs or DVD.
  • linux rescue Boots to single-user mode with a root operator prompt, disabling X, multitasking, and networking; this option can be used if you need to reconfigure your boot loader or to rescue data from your system.
  • linux dd Uses a driver disk (a floppy image) and possibly one or more kernel arguments (such as linux mem=512M expert) to enable certain types of hardware, such as networking cards.
  • linux askmethod Prompts for the type of install to perform, such as over a network.
  • linux updates Starts an installation update.
  • memtest86 Starts a cyclical, intensive series of memory tests of your PC's RAM.
  • linux nofb Starts a graphical installation, but does not use a frame buffer (helpful with problematic or unsupported video).
  • linux resolution=width x height Installs using a graphical display of width-byheight pixels (such as resolution=800x600), which can help match older or less capable display monitors and video cards.

The F4 screen lists options that can be used at the boot prompt to set a specific resolution for the installation. For example, this is done by typing linux resolution= at the boot prompt, along with an option such as "800x600" . Other options, such as optional arguments for kernel modules (in order to properly configure or initialize hardware) may be passed to the install kernel if you use the noprobe option.

After you press Enter, the installer's kernel loads, and you're asked (in a text-based screen) if you would like to perform a media check of your installation media, as shown in Figure 3.2.

03fig01.jpg

Figure 3.2 You can check your CD-ROM or DVD media before installing Fedora.

This check can take quite some time (depending on the speed of your optical drive), but can ensure the integrity of the CD-ROM/DVD's contents, as an md5sum value is embedded on each CD-ROM and DVD. This check can help foil installation of malicious software from CD-ROMs and DVDs with tampered contents. The check can also be helpful to make sure that the CD-ROM or DVD you are using works on your PC and in your optical drive. To perform the check, choose OK; otherwise, use the Tab key to navigate to the Skip button and press Enter to choose it.

After checking your CD-ROM or DVD or even skipping the check, the display clears. The Fedora installer, Anaconda, loads, and you are presented with a graphical welcome screen as shown in Figure 3.3. The installer should recognize your PC's graphics hardware and mouse. You can then click on the Release Notes button to get detailed information about Fedora, along with tips on hardware requirements and how to perform various installs.

03fig03.jpg

Figure 3.3 Read Release Notes before installing Fedora.

If your pointing device (mouse) is not recognized, you can press Alt+R to "press" the Release Notes button. Similarly, you can click Alt+H to hide text shown on the left side of the screen, but you should take a minute to read the frame's contents.

Click Next (or press Alt+N) to continue, and the installer asks you to select one of 31 different languages for the installation, as shown in Figure 3.4.

03fig04.jpg

Figure 3.4 Select a language to use when installing Fedora.

You can navigate the installer's dialogs (during a text-based or graphical install) using the Tab key. You can scroll through lists using your cursor keys. Note that you can now step backward through the install by using a Back button. Select a language and click the Next button.

You'll then be asked to select a keyboard for the install, as shown in Figure 3.5.

03fig05.jpg

Figure 3.5 Select a default keyboard to use when installing and using Fedora.

Scroll to the appropriate keyboard option. You use this option to configure the install to support one of 53 different language keyboards. Click Next after making your selection.

If your PC's monitor was not detected, you might be asked to select your model from 132 different manufacturers. In rare instances, you might have to specify your monitor's exact horizontal and vertical frequencies. This can happen with older displays.

If an existing Linux install is detected, you will be asked whether you want to upgrade and reinstall; otherwise, you are asked to partition your disk to make room for Fedora, as shown in Figure 3.6.

03fig06.jpg

Figure 3.6 Select how you want to partition your drive.

Partitioning Your Hard Drive

For the moment, select Create Custom Layout and click Next to move to the screen shown in Figure 3.7. You could, however, opt to delete all partitions (including Windows partitions) on the drive, remove only Linux partitions on the drive, or use only unallocated space. If you choose one of these three, you get a default layout that uses logical volume management. This is a special type of partitioning that makes disk partitions much easier to work with.

03fig07.jpg

Figure 3.7 Fedora's powerful partitioning tool allows you to create a partition scheme unique to your requirements.

In this example, we look at creating a partition table that spans two physical disks. To get started click the New button to bring up the screen shown in Figure 3.8. First of all we need to create a small partition that has the mount point /boot. This is to enable Fedora to actually boot and needs to be a maximum of only about 150MB in size. Make sure that only the first disk is ticked (hda in our example) and select /boot from the drop-down mount point menu. Finally change the size of the partition to 150MB and click the OK button to create our first partition.

03fig08.jpg

Figure 3.8 Make sure to create your boot partition; otherwise all your good work will be in vain!

Now we need to create our physical volumes that will allow Fedora to combine them into a logical volume. Click the New button again to bring up the same window as Figure 3.8, but this time we want to change the file system type to Physical Volume (LVM). Make sure that only one drive is ticked, and finally select the option Fill to Maximum Allowable Size to instruct Fedora to use all available space. Once you have done this, click OK and repeat this for the second drive, and again if you have more than two drives.

When you have created the physical volumes, you now need to bind them together through a logical volume. Click the LVM button in the partitioner's main window to bring up the LVM options (see Figure 3.9). You can give your logical volume group a more meaningful name than VolGroup00, but you must ensure that there are no spaces in the name. Next you can choose a physical extent size for your volumes, or rather the size of chunks that the disks will be "cut up into." Unless you really have a specific need to change this setting, you should leave it at 32.

03fig09.jpg

Figure 3.9 Harness the flexibility of logical volumes through Fedora's easy-to-use utility.

Now you need to create your partitions within your logical volume group, and you do this as you would any other Linux distribution, making sure that you at least have a / partition and a swap partition. In our example, click the Add button to be taken to the Make Logical Volume screen (see Figure 3.10) where you can specify a mount point, file system type, volume name (again no spaces), and finally the size of the partition.

03fig10.jpg

Figure 3.10 Use this screen to define the logical volumes that make up your logical group.

You have to create at least two partitions: the / partition and the swap partition. However, you can add several mount points depending on your specific requirements. Some users find it helpful to create a separate /home partition, which we do in our example. As you add each logical volume, it appears in the main LVM Group options screen (refer to Figure 3.9). When you are finished, click the OK button to return to the main partition screen, which should look similar to Figure 3.11.

03fig11.jpg

Figure 3.11 The completed masterpiece. It is worthwhile spending extra time to get the best partition layout for your requirements.

Now you are ready to proceed to the next screen by clicking the Next button.

Choosing, Configuring, and Installing the Boot Loader

After you accept the partitioning scheme, a screen appears asking you to select a boot loader for booting Fedora (see Figure 3.12). This screen also enables you to choose not to use a boot loader (when booting from removable media, a commercial boot utility, a DOS partition, or over a network), and the ability to boot other operating systems if you have configured a dual-boot system. Review "The Boot Loader," previously in this chapter, for more information on making this choice.

03fig12.jpg

Figure 3.12 Select whether you want to use a boot loader and configure other boot options.

Select the GRUB boot loader. GRUB is typically installed in the MBR of the first IDE hard drive in a PC. However, the boot loader can also be installed in the first sector of the Linux boot partition, or even not installed on the hard drive. Note that you can also backtrack through the install process to change any settings.

Note that you can assign a password for the boot loader. If you choose to use this option, you have to enter a password at the GRUB boot screen (see the section "Logging In and Shutting Down" at the end of this chapter for information on graphical logins). Carefully note the password! It does not have to be the same password used to log in, but if you password protect booting through your computer's BIOS and use a boot loader password here, you will subsequently need to enter three passwords (BIOS, boot loader, and login) to access Linux. Type in a password of at least eight characters twice (once on each line); then click OK or Cancel to exit the dialog.

If you click the Configure Advanced Boot Loader Options button, you are asked for arguments to pass to the Linux kernel before booting. Kernel arguments are used to enable or disable various features of Linux at boot time. If you install the source to the Linux kernel, you will find documentation about the more than 200 different kernel arguments in the file kernel-parameters.txt under the /usr/src/linux/Documentation directory.

Click Next to set your boot loader configuration. You then proceed to network interface configuration, as shown in Figure 3.13.

03fig13.jpg

Figure 3.13 Select or enter networking configuration information.

Network Configuration

If you have an installed network adapter, you are asked for network configuration details, as shown in Figure 3.13. Fedora can be set to automatically configure networking upon booting. Note that you can also configure networking following installation using Fedora's system-config-network graphical network administration tool (see Chapter 14, "Managing Users," for details about using these tools).

You can choose to have your interface information automatically set using DHCP. Otherwise, especially if you are configuring a DHCP server, manually enter an IP address, hostname, or gateway address (such as for a router), along with DNS information if you click the Edit button listed by the interface (such as eth0 in the example). After making your selection, click Next to continue.

Setting the Time Zone

You are next shown a Time Zone Selection dialog (see Figure 3.14). There are two "clocks," or times, when using a PC: the hardware clock, maintained by hardware in the computer and a backup battery; and the system time, set upon booting and used by the Linux kernel. It is important to keep the two times accurate and in synchronization because automated system administration might need to take place at critical times. Many computer installations use computers with hardware clocks set to GMT, which stands for Greenwich Mean Time. The more modern designation is UTC or Coordinated Universal Time. The Linux system time is then set relative to this time and the default time zone, such as Eastern Standard Time, which is -5 hours of UTC.

03fig14.jpg

Figure 3.14 Select your time zone.

Setting the computer's hardware clock to UTC (GMT) has the advantage of allowing the Linux system time to be easily set relative to the geographic position of the computer and resident time zone (such as a Linux laptop user who would like to create files or send electronic mail with correct timestamps, and who has traveled from New York to Tokyo). See Chapter 4, "Post-Installation Configuration," for details on setting the date and time for Linux.

Choose your time configuration, and then click Next.

Creating a Root Password and User Accounts

You are next asked to enter a root operator password, as shown in Figure 3.15. Type in a password, press Tab or Enter, and then type it again to make sure that it is verified. The password, which is case sensitive, should be at least eight characters (or more) and consist of letters and numbers. Note that the password is not echoed back to the display. Your root password is important because you need it to perform any system administration or user management with Fedora.

03fig15.jpg

Figure 3.15 Type in, and do not forget, your root password.

When finished, click Next to continue with software package selection for your new server.

Software Selection and Installation

Fedora 5 has radically overhauled its package selection and installation. In previous versions, you had the choice of installing one of five different installation classes, which would include packages specific to the ultimate end use of the computer. Now, however, Fedora asks you whether you want to install additional software on top of the base system, which is designed for general Internet usage. This screen is shown in Figure 3.16.

03fig16.jpg

Figure 3.16 Fedora's new and simplified package selection screen.

You can choose to install extra software for development, a web server and support for Xen virtualization. You are also able to specify whether you want to customize your package selection further by selecting the Customize Now button and clicking Next go to Figure 3.17. Otherwise, just click Next to land at the final screen.

03fig17.jpg

Figure 3.17 Specify the exact packages you want for your installation.

If you decide to customize your package choice, you will see a screen similar to Figure 3.17. On the left side are the generic categories that contain software. As you click on each category, a new set of package groups appears on the right side. Mark the check box against each package group to install the default packages associated with that group. If you want to specify additional packages within the group, click the optional packages button to see all the other packages available for the group. Select the ones that you require and click close to add them to your package list. After you finish selecting your packages, click Next to allow Fedora to scan for any dependency problems.

You finally arrive at the last screen before Fedora actually starts to install anything, so it is a good idea to take a deep breath and think about anything you might have forgotten. It is easy to go back to any stage of the installation process by clicking the Back button until you reach where you want to go.

When you are happy, click Next to allow Fedora to install the system. Now is a good time to make a cup of coffee because it can take up to an hour to install Fedora. As Fedora is installed, it tells you which package it is currently working on as well as an approximate time left for the installation, as shown in Figure 3.18.

03fig18.jpg

Figure 3.18 The Fedora installer formats your drive, and then installs selected software package groups.

If you are installing over a network or by DVD, take a break because the install proceeds unattended through the software installation. If you are installing Fedora using CDs, you might want to stay in eyesight of your computer because you will have to change CDs throughout the installation.

Finishing the Install

You are done! Click the Exit button, and the installer ejects any inserted media and reboots. The GRUB boot loader presents a boot prompt as shown in Figure 3.19.

03fig19.jpg

Figure 3.19 Boot Fedora with GRUB by pressing the Enter key or waiting 10 seconds.

If you have set a GRUB password, press the P key, type your password, and press Enter. If you do nothing for five seconds, or press Enter, either boot loader boots Linux.

firstboot Configuration

Although the vast majority of configuration is done during the actual installation, Fedora allows you to choose some more options before you log in for the first time. When you boot Fedora, it loads firstboot, which is the utility responsible for personalizing your computer. It asks you a few straightforward questions and the end result is that you are able to log in to Fedora.

The first screen welcomes you to firstboot and you should click Next to start. The next screen asks whether you accept the GPL under which Fedora is released. If you agree with the license, click the Yes button and then click Next.

Firewall configuration is up next (see Figure 3.20), and you should always have your firewall enabled. Sensibly Fedora defaults to this, but it also asks you whether you want to allow access to specific ports to allow services to run. Depending on your requirements, you might want to select one or more of the boxes. You can also enter in specific ports and the protocol (tcp or udp), although you should be aware that the more services or ports you allow access to, the less secure your system becomes as it opens up more opportunities for attack.

03fig21.jpg

Figure 3.20 The firewall is a key part of your defense against would-be crackers. When you are happy with your selection, click the Next button to start configuring SELinux.

SELinux allows a much more detailed security policy, and is still in development. Introduced in Fedora Core 2, SELinux is an NSA initiative to provide Linux with an indepth mandatory access control system that compartmentalizes the system. Basically, if an intruder gets onto the system, and then SELinux limits the amount of damage that the intruder can cause.

You are able to select specific behavior according to your requirements, but unless you have a specific reason to change any of the default settings, just click the Next button to continue. The default settings provide a very secure system.

Following on from SELinux, Fedora gives you a chance to set-up your time and date settings. You already gave Fedora your location in the world, but this screen (see Figure 3.21) allows you to fine-tune your time and date, as well as opt to use the Network Time Protocol and get an accurate time from one of the many hundreds of time servers across the world.

03fig23.jpg

Figure 3.21 Never be late again by setting your system clock correctly.

When you have set your time correctly, click Next to go the Display screen. This screen (see Figure 3.22) is similar to the system-config-display package and allows you to define your monitor and specify color depth and resolution. Fedora usually does a good job at this, so you may not need to make any changes.

03fig24.jpg

Figure 3.22 Make sure that you are seeing the full picture with Fedora.

Clicking Next takes you to the System User screen (see Figure 3.23) and allows you to enter details for one user initially. You can enter the user's full name, username, and password (which you need to enter again to confirm) and also choose any other authentication settings such as use of Kerberos or NIS services. When you have completed firstboot, you can create other users using the system-config-users utility.

03fig25.jpg

Figure 3.23 Create your first user and assign a password.

The final stage after clicking Next is to test your sound setup (see Figure 3.24). Click the test button to hear a short sound clip that should verify that your soundcard has been successfully detected.

03fig26.jpg

Figure 3.24 Fedora determines your soundcard and allows you to fine-tune the volume.

Click the Next button and, finally, the Finish button to go straight to the login prompt as shown in Figure 3.25. Here you should log in as the user you created during firstboot; do not log in as root because you can cause some serious damage if you do not know what you are doing.

03fig27.jpg

Figure 3.25 Enter your username and password to log in to Fedora.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020