Cari di RHE Linux 
    Red Hat Enterprise Linux Manual
Daftar Isi
(Sebelumnya) 1 : Chapter 15. Configuring La ...1 : 16.12. Assign Storage Devi ... (Berikutnya)

Installation Guide

Chapter 16. Installing using anaconda

This chapter describes an installation using the graphical user interface of anaconda.

16.1. The Text Mode Installation Program User Interface

While text mode installations are not explicitly documented, those using the text mode installation program can easily follow the GUI installation instructions. However, because text mode presents you with a simpler, more streamlined installation process, certain options that are available in graphical mode are not also available in text mode. These differences are noted in the description of the installation process in this guide, and include:
  • configuring advanced storage methods such as LVM, RAID, FCoE, zFCP, and iSCSI.
  • customizing the partition layout
  • customizing the bootloader layout
  • selecting packages during installation
  • configuring the installed system with firstboot

16.2. The Graphical Installation Program User Interface

If you have used a graphical user interface (GUI) before, you are already familiar with this process; use your mouse to navigate the screens, click buttons, or enter text fields.
You can also navigate through the installation using the keyboard. The Tab key allows you to move around the screen, the Up and Down arrow keys to scroll through lists, + and - keys expand and collapse lists, while Space and Enter selects or removes from selection a highlighted item. You can also use the Alt+X key command combination as a way of clicking on buttons or making other screen selections, where X is replaced with any underlined letter appearing within that screen.
If you would like to use a graphical installation with a system that does not have that capability, such as a partitioned system, you can use VNC or display forwarding. Both the VNC and display forwarding options require an active network during the installation and the use of boot time arguments. For more information on available boot time options, refer to Chapter 28, Boot Options

Note

If you do not wish to use the GUI installation program, the text mode installation program is also available. To start the text mode installation program, use the following command at the yaboot: prompt:
linux text
Refer to Section 14.1, "The Boot Menu" for a description of the Red Hat Enterprise Linux boot menu and to Section 15.1, "The Text Mode Installation Program User Interface" for a brief overview of text mode installation instructions.
It is highly recommended that installs be performed using the GUI installation program. The GUI installation program offers the full functionality of the Red Hat Enterprise Linux installation program, including LVM configuration which is not available during a text mode installation.
Users who must use the text mode installation program can follow the GUI installation instructions and obtain all needed information.

16.3. A Note about Linux Virtual Consoles

This information only applies to users of non-partitioned System p systems using a video card as their console. Users of partitioned System p systems should skip to Section 16.4, "Using the HMC vterm".
The Red Hat Enterprise Linux installation program offers more than the dialog boxes of the installation process. Several kinds of diagnostic messages are available to you, as well as a way to enter commands from a shell prompt. The installation program displays these messages on five virtual consoles, among which you can switch using a single keystroke combination.
A virtual console is a shell prompt in a non-graphical environment, accessed from the physical machine, not remotely. Multiple virtual consoles can be accessed simultaneously.
These virtual consoles can be helpful if you encounter a problem while installing Red Hat Enterprise Linux. Messages displayed on the installation or system consoles can help pinpoint a problem. Refer to Table 16.1, "Console, Keystrokes, and Contents" for a listing of the virtual consoles, keystrokes used to switch to them, and their contents.
Generally, there is no reason to leave the default console (virtual console #6) for graphical installations unless you are attempting to diagnose installation problems.

Table 16.1. Console, Keystrokes, and Contents

consolekeystrokescontents
1ctrl+alt+f1installation dialog
2ctrl+alt+f2shell prompt
3ctrl+alt+f3install log (messages from installation program)
4ctrl+alt+f4system-related messages
5ctrl+alt+f5other messages
6ctrl+alt+f6x graphical display

16.4. Using the HMC vterm

The HMC vterm is the console for any partitioned IBM System p. This is opened by right clicking on the partition on the HMC, and then selecting Open Terminal Window. Only a single vterm can be connected to the console at one time and there is no console access for partitioned system besides the vterm. This often is referred to as a 'virtual console', but is different from the virtual consoles in Section 16.3, "A Note about Linux Virtual Consoles" .

16.5. Welcome to Red Hat Enterprise Linux

The Welcome screen does not prompt you for any input.
Welcome to Red Hat Enterprise Linux 6
Click on the Next button to continue.

16.6. Language Selection

Using your mouse, select the language (for example, U.S. English) you would prefer to use for the installation and as the system default (refer to the figure below).
Once you have made your selection, click Next to continue.
Language Configuration
Language selection screen

Figure 16.1. Language Configuration


16.7. Keyboard Configuration

Using your mouse, select the correct layout type (for example, U.S. English) for the keyboard you would prefer to use for the installation and as the system default (refer to Figure 16.2, "Keyboard Configuration").
Once you have made your selection, click Next to continue.
Keyboard Configuration
Keyboard configuration screen

Figure 16.2. Keyboard Configuration


Note

To change your keyboard layout type after you have completed the installation, use the Keyboard Configuration Tool.
Type the system-config-keyboard command in a shell prompt to launch the Keyboard Configuration Tool. If you are not root, it prompts you for the root password to continue.

16.8. Storage Devices

You can install Red Hat Enterprise Linux on a large variety of storage devices. This screen allows you to select either basic or specialized storage devices.
Storage devices
Screen to select basic or specialized storage devices

Figure 16.3. Storage devices


Basic Storage Devices
Select Basic Storage Devices to install Red Hat Enterprise Linux on the following storage devices:
  • hard drives or solid-state drives connected directly to the local system.
Specialized Storage Devices
Select Specialized Storage Devices to install Red Hat Enterprise Linux on the following storage devices:
  • Storage area networks (SANs)
  • Direct access storage devices (DASDs)
  • Firmware RAID devices
  • Multipath devices
Use the Specialized Storage Devices option to configure Internet Small Computer System Interface (iSCSI) and FCoE (Fiber Channel over Ethernet) connections.
If you select Basic Storage Devices, anaconda automatically detects the local storage attached to the system and does not require further input from you. Proceed to Section 16.9, "Setting the Hostname".

16.8.1.  The Storage Devices Selection Screen

The storage devices selection screen displays all storage devices to which anaconda has access.
Select storage devices - Basic devices
The Basic Devices tab

Figure 16.4. Select storage devices - Basic devices


Select storage devices - Multipath Devices
The Multipath Devices tab

Figure 16.5. Select storage devices - Multipath Devices


Select storage devices - Other SAN Devices
The Other SAN Devices tab

Figure 16.6. Select storage devices - Other SAN Devices


Devices are grouped under the following tabs:
Basic Devices
Basic storage devices directly connected to the local system, such as hard disk drives and solid-state drives.
Firmware RAID
Storage devices attached to a firmware RAID controller.
Multipath Devices
Storage devices accessible through more than one path, such as through multiple SCSI controllers or Fiber Channel ports on the same system.

Important - device serial numbers must be 16 or 32 characters

The installer only detects multipath storage devices with serial numbers that are 16 or 32 characters in length.
Other SAN Devices
Any other devices available on a storage area network (SAN).
If you do need to configure iSCSI or FCoE storage, click Add Advanced Target and refer to Section 16.8.1.1, " Advanced Storage Options ".
The storage devices selection screen also contains a Search tab that allows you to filter storage devices either by their World Wide Identifier (WWID) or by the port, target, or logical unit number (LUN) at which they are accessed.
The Storage Devices Search Tab
The tab contains a drop-down menu to select between searching by port, target, and LUN (with corresponding text boxes for these values) and searching by WWID (with a corresponding text box for this value).

Figure 16.7. The Storage Devices Search Tab


The tab contains a drop-down menu to select searching by port, target, WWID, or LUN (with corresponding text boxes for these values). Searching by WWID or LUN requires additional values in the corresponding text box.
Each tab presents a list of devices detected by anaconda, with information about the device to help you to identify it. A small drop-down menu marked with an icon is located to the right of the column headings. This menu allows you to select the types of data presented on each device. For example, the menu on the Multipath Devices tab allows you to specify any of WWID, Capacity, Vendor, Interconnect, and Paths to include among the details presented for each device. Reducing or expanding the amount of information presented might help you to identify particular devices.
Selecting Columns
The drop-down menu in its expanded state

Figure 16.8. Selecting Columns


Each device is presented on a separate row, with a checkbox to its left. Click the checkbox to make a device available during the installation process, or click the radio button at the left of the column headings to select or deselect all the devices listed in a particular screen. Later in the installation process, you can choose to install Red Hat Enterprise Linux onto any of the devices selected here, and can choose to automatically mount any of the other devices selected here as part of the installed system.
Note that the devices that you select here are not automatically erased by the installation process. Selecting a device on this screen does not, in itself, place data stored on the device at risk. Note also that any devices that you do not select here to form part of the installed system can be added to the system after installation by modifying the /etc/fstab file.

Important - chain loading

Any storage devices that you do not select on this screen are hidden from anaconda entirely. To chain load the Red Hat Enterprise Linux boot loader from a different boot loader, select all the devices presented in this screen.
when you have selected the storage devices to make available during installation, click Next and proceed to Section 16.13, "Initializing the Hard Disk"

16.8.1.1.  Advanced Storage Options

From this screen you can configure an iSCSI (SCSI over TCP/IP) target or FCoE (Fibre channel over ethernet) SAN (storage area network). Refer to Appendix B, ISCSI disks for an introduction to iSCSI.
Advanced Storage Options
Advanced Storage Options.

Figure 16.9. Advanced Storage Options


16.8.1.1.1. Select and configure a network interface
If a network interface is not already active on the system, anaconda must activate one through which to connect to the storage devices. If your system has only a single network interface, anaconda automatically activates it. However, if your system has more than one network interface available, anaconda prompts you with the Select network interface dialog to choose one to use during installation.
Select network interface
The Select network interface dialog.

Figure 16.10. Select network interface


  1. Select an interface from the drop-down menu.
  2. Click OK.
Anaconda activates the interface that you selected, then starts NetworkManager to allow you to configure the interface.
Network Connections
Configuring network connections.

Figure 16.11. Network Connections


For details of how to use NetworkManager, refer to Section 16.9, "Setting the Hostname"
16.8.1.1.2. Configure iSCSI parameters
To use iSCSI storage devices for the installation, anaconda must be able to discover them as iSCSI targets and be able to create an iSCSI session to access them. Each of these steps might require a username and password for CHAP (Challenge Handshake Authentication Protocol) authentication. Additionally, you can configure an iSCSI target to authenticate the iSCSI initiator on the system to which the target is attached (reverse CHAP), both for discovery and for the session. Used together, CHAP and reverse CHAP are called mutual CHAP or two-way CHAP. Mutual CHAP provides the greatest level of security for iSCSI connections, particularly if the username and password are different for CHAP authentication and reverse CHAP authentication.
Repeat the iSCSI discovery and iSCSI login steps as many times as necessary to add all required iSCSI storage. However, you cannot change the name of the iSCSI initiator after you attempt discovery for the first time. To change the iSCSI initiator name, you must restart the installation.

Procedure 16.1. iSCSI discovery

Use the iSCSI Discovery Details dialog to provide anaconda with the information that it needs to discover the iSCSI target.
The iSCSI Discovery Details dialog
The iSCSI Discovery Details dialog. It shows an example target IP address of 192.168.0.108 and an example iSCSI initiator name of iqn.1994-05.com.domain:01b1b85d.

Figure 16.12. The iSCSI Discovery Details dialog


  1. Enter the IP address of the iSCSI target in the Target IP Address field.
  2. Provide a name in the iSCSI Initiator Name field for the iSCSI initiator in iSCSI qualified name (IQN) format.
    A valid IQN contains:
    • the string iqn. (note the period)
    • a date code that specifies the year and month in which your organization's Internet domain or subdomain name was registered, represented as four digits for the year, a dash, and two digits for the month, followed by a period. For example, represent September 2010 as 2010-09.
    • your organization's Internet domain or subdomain name, presented in reverse order with the top-level domain first. For example, represent the subdomain storage.example.com as com.example.storage
    • a colon followed by a string that uniquely identifies this particular iSCSI initiator within your domain or subdomain. For example, :diskarrays-sn-a8675309.
    A complete IQN therefore resembles: iqn.2010-09.storage.example.com:diskarrays-sn-a8675309, and anaconda pre-populates the iSCSI Initiator Name field with a name in this format to help you with the structure.
    For more information on IQNs, refer to 3.2.6. iSCSI Names in RFC 3720 - Internet Small Computer Systems Interface (iSCSI) available from http://tools.ietf.org/html/rfc3720#section-3.2.6 and 1. iSCSI Names and Addresses in RFC 3721 - Internet Small Computer Systems Interface (iSCSI) Naming and Discovery available from http://tools.ietf.org/html/rfc3721#section-1.
  3. Use the drop-down menu to specify the type of authentication to use for iSCSI discovery:
    iSCSI discovery authentication
    The three types of discovery authentication available: no credentials, CHAP pair, and CHAP pair and a reverse pair.

    Figure 16.13. iSCSI discovery authentication


    • no credentials
    • CHAP pair
    • CHAP pair and a reverse pair
    • If you selected CHAP pair as the authentication type, provide the username and password for the iSCSI target in the CHAP Username and CHAP Password fields.
      CHAP pair
      The iSCSI Discovery Details dialog with CHAP pair selected as the authentication type. Fields are displayed for username and password.

      Figure 16.14. CHAP pair


    • If you selected CHAP pair and a reverse pair as the authentication type, provide the username and password for the iSCSI target in the CHAP Username and CHAP Password field and the username and password for the iSCSI initiator in the Reverse CHAP Username and Reverse CHAP Password fields.
      CHAP pair and a reverse pair
      The iSCSI Discovery Details dialog with CHAP pair and a reverse pair selected as the authentication type. Fields are displayed for CHAP username, CHAP password, reverse CHAP username, and reverse CHAP password.

      Figure 16.15. CHAP pair and a reverse pair


  4. Click Start Discovery. Anaconda attempts to discover an iSCSI target based on the information that you provided. If discovery succeeds, the iSCSI Discovered Nodes dialog presents you with a list of all the iSCSI nodes discovered on the target.
  5. Each node is presented with a checkbox beside it. Click the checkboxes to select the nodes to use for installation.
    The iSCSI Discovered Nodes dialog
    The iSCSI Discovered Nodes dialog displays a list of nodes with checkboxes beside them. This example shows only a single node, discovered at iqn.2009-02.com.example:for.all.

    Figure 16.16. The iSCSI Discovered Nodes dialog


  6. Click Login to initiate an iSCSI session.

Procedure 16.2. Starting an iSCSI session

Use the iSCSI Nodes Login dialog to provide anaconda with the information that it needs to log into the nodes on the iSCSI target and start an iSCSI session.
The iSCSI Nodes Login dialog
The iSCSI Nodes Login dialog.

Figure 16.17. The iSCSI Nodes Login dialog


  1. Use the drop-down menu to specify the type of authentication to use for the iSCSI session:
    iSCSI session authentication
    The three types of session authentication available: no credentials, CHAP pair, and CHAP pair and a reverse pair, plus the option to use the same credentials that were used for iSCSI discovery.

    Figure 16.18. iSCSI session authentication


    • no credentials
    • CHAP pair
    • CHAP pair and a reverse pair
    • Use the credentials from the discovery step
    If your environment uses the same type of authentication and same username and password for iSCSI discovery and for the iSCSI session, select Use the credentials from the discovery step to reuse these credentials.
    • If you selected CHAP pair as the authentication type, provide the username and password for the iSCSI target in the CHAP Username and CHAP Password fields.
      CHAP pair
      The iSCSI Node Login dialog with CHAP pair selected as the authentication type. Fields are displayed for username and password.

      Figure 16.19. CHAP pair


    • If you selected CHAP pair and a reverse pair as the authentication type, provide the username and password for the iSCSI target in the CHAP Username and CHAP Password fields and the username and password for the iSCSI initiator in the Reverse CHAP Username and Reverse CHAP Password fields.
      CHAP pair and a reverse pair
      The iSCSI Node Login dialog with CHAP pair and a reverse pair selected as the authentication type. Fields are displayed for CHAP username, CHAP password, reverse CHAP username, and reverse CHAP password.

      Figure 16.20. CHAP pair and a reverse pair


  2. Click Login. Anaconda attempts to log into the nodes on the iSCSI target based on the information that you provided. The iSCSI Login Results dialog presents you with the results.
    The iSCSI Login Results dialog
    The iSCSI Login Results dialog displays a list of attached nodes. This example shows only a single node attached, iqn.2009-02.com.example:for.all.

    Figure 16.21. The iSCSI Login Results dialog


  3. Click OK to continue.
16.8.1.1.3.  Configure FCoE Parameters
To configure an FCoE SAN, select Add FCoE SAN and click Add Drive.
On the menu that appears in the next dialog box, select the network interface that is connected to your FCoE switch and click Add FCoE Disk(s).
Configure FCoE Parameters
Configure FCoE Parameters

Figure 16.22. Configure FCoE Parameters


Data Center Bridging (DCB) is a set of enhancements to the Ethernet protocols designed to increase the efficiency of Ethernet connections in storage networks and clusters. Enable or disable the installer's awareness of DCB with the checkbox in this dialog. This should only be set for networking interfaces that require a host-based DCBX client. Configurations on interfaces that implement a hardware DCBX client should leave this checkbox empty.
Auto VLAN indicates whether VLAN discovery should be performed. If this box is checked, then the FIP VLAN discovery protocol will run on the Ethernet interface once the link configuration has been validated. If they are not already configured, network interfaces for any discovered FCoE VLANs will be automatically created and FCoE instances will be created on the VLAN interfaces.

16.9. Setting the Hostname

Setup prompts you to supply a host name for this computer, either as a fully-qualified domain name (FQDN) in the format hostname.domainname or as a short host name in the format hostname. Many networks have a Dynamic Host Configuration Protocol (DHCP) service that automatically supplies connected systems with a domain name. To allow the DHCP service to assign the domain name to this machine, specify the short host name only.

Valid Hostnames

You may give your system any name provided that the full hostname is unique. The hostname may include letters, numbers and hyphens.
Setting the hostname
Setting the hostname

Figure 16.23. Setting the hostname


If your Red Hat Enterprise Linux system is connected directly to the Internet, you must pay attention to additional considerations to avoid service interruptions or risk action by your upstream service provider. A full discussion of these issues is beyond the scope of this document.

Modem Configuration

The installation program does not configure modems. Configure these devices after installation with the Network utility. The settings for your modem are specific to your particular Internet Service Provider (ISP).

16.9.1. Edit Network Connections

Important - Manual configuration is often needed

When a Red Hat Enterprise Linux 6 installation boots for the first time, it activates any network interfaces that you configured during the installation process. However, the installer does not prompt you to configure network interfaces on some common installation paths, for example, when you install Red Hat Enterprise Linux from a DVD to a local hard drive.
When you install Red Hat Enterprise Linux from a local installation source to a local storage device, be sure to configure at least one network interface manually if you require network access when the system boots for the first time. You will need to select the Connect automatically option manually when editing the connection.

Note

To change your network configuration after you have completed the installation, use the Network Administration Tool.
Type the system-config-network command in a shell prompt to launch the Network Administration Tool. If you are not root, it prompts you for the root password to continue.
The Network Administration Tool is now deprecated and will be replaced by NetworkManager during the lifetime of Red Hat Enterprise Linux 6.
To configure a network connection manually, click the button Configure Network. The Network Connections dialog appears that allows you to configure wired, wireless, mobile broadband, InfiniBand, VPN, DSL, VLAN, and bonded connections for the system using the NetworkManager tool. A full description of all configurations possible with NetworkManager is beyond the scope of this guide. This section only details the most typical scenario of how to configure wired connections during installation. Configuration of other types of network is broadly similar, although the specific parameters that you must configure are necessarily different.
Network Connections
Configuring network connections.

Figure 16.24. Network Connections


To add a new connection, click Add and select a connection type from the menu. To modify an existing connection, select it in the list and click Edit. In either case, a dialog box appears with a set of tabs that is appropriate to the particular connection type, as described below. To remove a connection, select it in the list and click Delete.
When you have finished editing network settings, click Apply to save the new configuration. If you reconfigured a device that was already active during installation, you must restart the device to use the new configuration - refer to Section 9.7.1.6, "Restart a network device".

16.9.1.1. Options common to all types of connection

Certain configuration options are common to all connection types.
Specify a name for the connection in the Connection name name field.
Select Connect automatically to start the connection automatically when the system boots.
When NetworkManager runs on an installed system, the Available to all users option controls whether a network configuration is available system-wide or not. During installation, ensure that Available to all users remains selected for any network interface that you configure.

16.9.1.2. The Wired tab

Use the Wired tab to specify or change the media access control (MAC) address for the network adapter, and either set the maximum transmission unit (MTU, in bytes) that can pass through the interface.
The Wired tab
The Wired tab

Figure 16.25. The Wired tab


16.9.1.3. The 802.1x Security tab

Use the 802.1x Security tab to configure 802.1X port-based network access control (PNAC). Select Use 802.1X security for this connection to enable access control, then specify details of your network. The configuration options include:
Authentication
Choose one of the following methods of authentication:
  • TLS for Transport Layer Security
  • Tunneled TLS for Tunneled Transport Layer Security, otherwise known as TTLS, or EAP-TTLS
  • Protected EAP (PEAP) for Protected Extensible Authentication Protocol
Identity
Provide the identity of this server.
User certificate
Browse to a personal X.509 certificate file encoded with Distinguished Encoding Rules (DER) or Privacy Enhanced Mail (PEM).
CA certificate
Browse to a X.509 certificate authority certificate file encoded with Distinguished Encoding Rules (DER) or Privacy Enhanced Mail (PEM).
Private key
Browse to a private key file encoded with Distinguished Encoding Rules (DER), Privacy Enhanced Mail (PEM), or the Personal Information Exchange Syntax Standard (PKCS#12).
Private key password
The password for the private key specified in the Private key field. Select Show password to make the password visible as you type it.
The 802.1x Security tab
The 802.1x Security tab

Figure 16.26. The 802.1x Security tab


16.9.1.4. The IPv4 Settings tab

Use the IPv4 Settings tab tab to configure the IPv4 parameters for the previously selected network connection.
Use the Method drop-down menu to specify which settings the system should attempt to obtain from a Dynamic Host Configuration Protocol (DHCP) service running on the network. Choose from the following options:
Automatic (DHCP)
IPv4 parameters are configured by the DHCP service on the network.
Automatic (DHCP) addresses only
The IPv4 address, netmask, and gateway address are configured by the DHCP service on the network, but DNS servers and search domains must be configured manually.
Manual
IPv4 parameters are configured manually for a static configuration.
Link-Local Only
A link-local address in the 169.254/16 range is assigned to the interface.
Shared to other computers
The system is configured to provide network access to other computers. The interface is assigned an address in the 10.42.x.1/24 range, a DHCP server and DNS server are started, and the interface is connected to the default network connection on the system with network address translation (NAT).
Disabled
IPv4 is disabled for this connection.
If you selected a method that requires you to supply manual parameters, enter details of the IP address for this interface, the netmask, and the gateway in the Addresses field. Use the Add and Delete buttons to add or remove addresses. Enter a comma-separated list of DNS servers in the DNS servers field, and a comma-separated list of domains in the Search domains field for any domains that you want to include in name server lookups.
Optionally, enter a name for this network connection in the DHCP client ID field. This name must be unique on the subnet. When you assign a meaningful DHCP client ID to a connection, it is easy to identify this connection when troubleshooting network problems.
Deselect the Require IPv4 addressing for this connection to complete check box to allow the system to make this connection on an IPv6-enabled network if IPv4 configuration fails but IPv6 configuration succeeds.
The IPv4 Settings tab
The IPv4 Settings tab

Figure 16.27. The IPv4 Settings tab


16.9.1.4.1. Editing IPv4 routes
Red Hat Enterprise Linux configures a number of routes automatically based on the IP addresses of a device. To edit additional routes, click the Routes button. The Editing IPv4 routes dialog appears.
The Editing IPv4 Routes dialog
The Editing IPv4 Routes dialog

Figure 16.28. The Editing IPv4 Routes dialog


Click Add to add the IP address, netmask, gateway address, and metric for a new static route.
Select Ignore automatically obtained routes to make the interface use only the routes specified for it here.
Select Use this connection only for resources on its network to restrict connections only to the local network.

16.9.1.5. The IPv6 Settings tab

Use the IPv6 Settings tab tab to configure the IPv6 parameters for the previously selected network connection.
Use the Method drop-down menu to specify which settings the system should attempt to obtain from a Dynamic Host Configuration Protocol (DHCP) service running on the network. Choose from the following options:
Ignore
IPv6 is ignored for this connection.
Automatic
NetworkManager uses router advertisement (RA) to create an automatic, stateless configuration.
Automatic, addresses only
NetworkManager uses RA to create an automatic, stateless configuration, but DNS servers and search domains are ignored and must be configured manually.
Automatic, DHCP only
NetworkManager does not use RA, but requests information from DHCPv6 directly to create a stateful configuration.
Manual
IPv6 parameters are configured manually for a static configuration.
Link-Local Only
A link-local address with the fe80::/10 prefix is assigned to the interface.
If you selected a method that requires you to supply manual parameters, enter details of the IP address for this interface, the netmask, and the gateway in the Addresses field. Use the Add and Delete buttons to add or remove addresses. Enter a comma-separated list of DNS servers in the DNS servers field, and a comma-separated list of domains in the Search domains field for any domains that you want to include in name server lookups.
Optionally, enter a name for this network connection in the DHCP client ID field. This name must be unique on the subnet. When you assign a meaningful DHCP client ID to a connection, it is easy to identify this connection when troubleshooting network problems.
Deselect the Require IPv6 addressing for this connection to complete check box to allow the system to make this connection on an IPv4-enabled network if IPv6 configuration fails but IPv4 configuration succeeds.
The IPv6 Settings tab
The IPv6 Settings tab

Figure 16.29. The IPv6 Settings tab


16.9.1.5.1. Editing IPv6 routes
Red Hat Enterprise Linux configures a number of routes automatically based on the IP addresses of a device. To edit additional routes, click the Routes button. The Editing IPv6 routes dialog appears.
The Editing IPv6 Routes dialog
The Editing IPv6 Routes dialog

Figure 16.30. The Editing IPv6 Routes dialog


Click Add to add the IP address, netmask, gateway address, and metric for a new static route.
Select Use this connection only for resources on its network to restrict connections only to the local network.

16.9.1.6. Restart a network device

If you reconfigured a network that was already in use during installation, you must disconnect and reconnect the device in anaconda for the changes to take effect. Anaconda uses interface configuration (ifcfg) files to communicate with NetworkManager. A device becomes disconnected when its ifcfg file is removed, and becomes reconnected when its ifcfg file is restored, as long as ONBOOT=yes is set. Refer to the Red Hat Enterprise Linux 6 Deployment Guide available from https://access.redhat.com/knowledge/docs/ for more information about interface configuration files.
  1. Press Ctrl+Alt+F2 to switch to virtual terminal tty2.
  2. Move the interface configuration file to a temporary location:
    mv /etc/sysconfig/network-scripts/ifcfg-device_name /tmp
    where device_name is the device that you just reconfigured. For example, ifcfg-eth0 is the ifcfg file for eth0.
    The device is now disconnected in anaconda.
  3. Open the interface configuration file in the vi editor:
    vi /tmp/ifcfg-device_name
  4. Verify that the interface configuration file contains the line ONBOOT=yes. If the file does not already contain the line, add it now and save the file.
  5. Exit the vi editor.
  6. Move the interface configuration file back to the /etc/sysconfig/network-scripts/ directory:
    mv /tmp/ifcfg-device_name /etc/sysconfig/network-scripts/
    The device is now reconnected in anaconda.
  7. Press Ctrl+Alt+F6 to return to anaconda.

16.10. Time Zone Configuration

Set your time zone by selecting the city closest to your computer's physical location. Click on the map to zoom in to a particular geographical region of the world.
From here there are two ways for you to select your time zone:
  • Using your mouse, click on the interactive map to select a specific city (represented by a yellow dot). A red X appears indicating your selection.
  • You can also scroll through the list at the bottom of the screen to select your time zone. Using your mouse, click on a location to highlight your selection.
Configuring the Time Zone
Time zone configuration screen.

Figure 16.31. Configuring the Time Zone


If Red Hat Enterprise Linux is the only operating system on your computer, select System clock uses UTC. The system clock is a piece of hardware on your computer system. Red Hat Enterprise Linux uses the timezone setting to determine the offset between the local time and UTC on the system clock. This behavior is standard for systems that use UNIX, Linux, and similar operating systems.
Click Next to proceed.

Note

To change your time zone configuration after you have completed the installation, use the Time and Date Properties Tool.
Type the system-config-date command in a shell prompt to launch the Time and Date Properties Tool. If you are not root, it prompts you for the root password to continue.
To run the Time and Date Properties Tool as a text-based application, use the command timeconfig.

16.11. Set the Root Password

Setting up a root account and password is one of the most important steps during your installation. The root account is used to install packages, upgrade RPMs, and perform most system maintenance. Logging in as root gives you complete control over your system.

Note

The root user (also known as the superuser) has complete access to the entire system; for this reason, logging in as the root user is best done only to perform system maintenance or administration.
Root Password
Setting your root password.

Figure 16.32. Root Password


Use the root account only for system administration. Create a non-root account for your general use and use the su command to change to root only when you need to perform tasks that require superuser authorization. These basic rules minimize the chances of a typo or an incorrect command doing damage to your system.

Note

To become root, type su - at the shell prompt in a terminal window and then press Enter. Then, enter the root password and press Enter.
The installation program prompts you to set a root password[7] for your system. . You cannot proceed to the next stage of the installation process without entering a root password.
The root password must be at least six characters long; the password you type is not echoed to the screen. You must enter the password twice; if the two passwords do not match, the installation program asks you to enter them again.
You should make the root password something you can remember, but not something that is easy for someone else to guess. Your name, your phone number, qwerty, password, root, 123456, and anteater are all examples of bad passwords. Good passwords mix numerals with upper and lower case letters and do not contain dictionary words: Aard387vark or 420BMttNT, for example. Remember that the password is case-sensitive. If you write down your password, keep it in a secure place. However, it is recommended that you do not write down this or any password you create.

Choose your own password

Do not use one of the example passwords offered in this manual. Using one of these passwords could be considered a security risk.
To change your root password after you have completed the installation, use the Root Password Tool.
Type the system-config-users command in a shell prompt to launch the User Manager, a powerful user management and configuration tool. If you are not root, it prompts you for the root password to continue.
Enter the root password into the Root Password field. Red Hat Enterprise Linux displays the characters as asterisks for security. Type the same password into the Confirm field to ensure it is set correctly. After you set the root password, select Next to proceed.
(Sebelumnya) 1 : Chapter 15. Configuring La ...1 : 16.12. Assign Storage Devi ... (Berikutnya)