The Perfect Server - Fedora 9 - Page 2

Choose your time zone:

Give root a password:

Next we do the partitioning. Select Remove Linux partitions on selected drives and create default layout. This will give you a small /boot partition and a large / partition which is fine for our purposes:

Select Write changes to disk:

The hard drive is being formatted:

Now we select the software we want to install. Uncheck Office and Productivity and check Software Development and Web server instead. Then check Customize now, and click on Next:

Now we must select the package groups we want to install. Select Editors, Text-based Internet, Development Libraries, Development Tools, DNS Name Server, FTP Server, Mail Server, MySQL Database, Server Configuration Tools, Web Server, Administration Tools, Base, Hardware Support, Java, System Tools (unselect all other package groups) and click on Next:

The installer checks the dependencies of the selected packages:

The installation begins. This will take a few minutes:

Finally, the installation is complete, and you can remove your DVD from the computer and reboot it:

After the reboot, you will see this screen. Select Firewall configuration and hit Run Tool:

I want to install ISPConfig at the end of this tutorial which comes with its own firewall. That's why I disable the default Fedora firewall now. Of course, you are free to leave it on and configure it to your needs (but then you shouldn't use any other firewall later on as it will most probably interfere with the Fedora firewall).

Hit OK afterwards:

Then leave the Choose a Tool window by selecting Quit:

Now, on to the configuration...

Share this page:

6 Comment(s)

Add comment


From: Anonymous at: 2009-01-05 14:30:25

Don't use the media test - it has bug in it and will drive you crazy reporting media errors when there are none. This type of problem gives Fedora a bad name. It's ridiculous. Other instructions tell you to be sure and use the media test, not to skip it. That goes to show you they don't know.

From: at: 2008-07-18 08:49:54

I would strongly recommened enabling SELinux.  SELinux is there for your protetion and comes highly recommneded by the Redhat Security team.  Mark Cox: team lead for the Red Hat Security Response explains why SELinux is beneficial here.

From: at: 2008-08-09 06:01:53

Just wanted to tell everyone as a novice Linux user the guide was very helpful. I installed Fedora 9 on an older system but it was a clean install. I would like to say that during the 'yum update' process depending upon a users setup the 'transaction test' can take a long time and not show any progress, so if you are a new Fedora/Linux user and are using this guide, when coming to this step please wait patiently because of my 451 updates, obviously there is a lot of data there to test, with no progress shown until the test is complete.

 -Thanks Again for the HOW-TO!


Fedora 9 installed on-

P4 2.2ghz 1 gig PC-3200 DDR

From: NetWebLogic at: 2008-10-02 14:41:45

If you run into the following error with

File "/usr/share/system-config-firewall/", line 29, in <module>
os.execv(argv[0], argv)
OSError: [Errno 2] No such file or directory

You can solve this by opening  /usr/share/system-config-firewall/

 and editing the following:

argv = [ "/usr/sbin/system-config-firewall-tui" ]
argv = [ "/usr/bin/system-config-firewall-tui" ]

And try again. That should work...

 Great Job on this article. Top Notch!

From: Plume at: 2009-03-15 05:53:16

Thanks you for all of your HowTo's, it's very helpfull to me to openup Linux.

I try to connect to my Fedora 9 server by SSH and met some difficulties

to config it. Could you include SSH to this tutorial?

From: Jason Roysdon at: 2008-11-16 04:48:42

I highly suggest adding to this guide rkhunter. It is a "root kit" hunter and is an absolute must for anyone connecting a server that the internet at large can access services on. Even with yum keeping things up to date, there are still vulnerabilities that come up that you might not get a patch for in time. You must have something like rkhunter to constantly check your system for root kits and to check the md5 signatures on key files.