2.8.2. Configuring Network Interfaces
Next, a list of the network interfaces found on the computer is shown.
Select the interface to configure.
If an Ethernet interface is selected, the installer will skip ahead to the menu
shown in
Choose IPv4 Networking
.
If a wireless network interface is chosen, the system will instead scan for wireless access points:
Figure 36. Scanning for Wireless Access Points
Wireless networks are identified by a Service Set Identifier (SSID); a short, unique name given to each network.
SSIDs found during the scan are listed, followed by a description of the encryption types available for that network.
If the desired SSID does not appear in the list, select
Rescan
to scan again.
If the desired network still does not appear, check for problems with antenna connections or try moving the computer closer to the access point.
Rescan after each change is made.
Figure 37. Choosing a Wireless Network
Next, enter the encryption information for connecting to the selected wireless network.
WPA2 encryption is strongly recommended over older encryption types such as WEP, which offer little security.
If the network uses WPA2, input the password, also known as the Pre-Shared Key (PSK).
For security reasons, the characters typed into the input box are displayed as asterisks.
Next, choose whether or not an IPv4 address should be configured on the Ethernet or wireless interface:
There are two methods of IPv4 configuration.
DHCP will automatically configure the network interface correctly and should be used if the network provides a DHCP server.
Otherwise, the addressing information needs to be input manually as a static configuration.
|
|
Do not enter random network information as it will not work.
If a DHCP server is not available, obtain the information listed in
Required Network Information
from the network administrator or Internet service provider.
|
If a DHCP server is available, select
Yes
in the next menu to automatically configure the network interface.
The installer will appear to pause for a minute or so as it finds the DHCP server and obtains the addressing information for the system.
Figure 40. Choose IPv4 DHCP Configuration
If a DHCP server is not available, select
No
and input the following addressing information in this menu:
Figure 41. IPv4 Static Configuration
-
IP Address
- The IPv4 address assigned to this computer. The address must be unique and not already in use by another device on the local network.
-
Subnet Mask
- The subnet mask for the network.
-
Default Router
- The IP address of the network’s default gateway.
The next screen will ask if the interface should be configured for IPv6. If IPv6 is available and desired, choose
Yes
to select it.
Figure 42. Choose IPv6 Networking
IPv6 also has two methods of configuration.
StateLess Address AutoConfiguration (SLAAC) will automatically request the correct configuration information from a local router.
Refer to
rfc4862
for more information.
Static configuration requires manual entry of network information.
If an IPv6 router is available, select
Yes
in the next menu to automatically configure the network interface.
The installer will appear to pause for a minute or so as it finds the router and obtains the addressing information for the system.
Figure 43. Choose IPv6 SLAAC Configuration
If an IPv6 router is not available, select
No
and input the following addressing information in this menu:
Figure 44. IPv6 Static Configuration
-
IPv6 Address
- The IPv6 address assigned to this computer. The address must be unique and not already in use by another device on the local network.
-
Default Router
- The IPv6 address of the network’s default gateway.
The last network configuration menu is used to configure the Domain Name System (DNS) resolver, which converts hostnames to and from network addresses.
If DHCP or SLAAC was used to autoconfigure the network interface, the
Resolver Configuration
values may already be filled in.
Otherwise, enter the local network’s domain name in the
Search
field.
DNS #1
and
DNS #2
are the IPv4 and/or IPv6 addresses of the DNS servers.
At least one DNS server is required.
Figure 45. DNS Configuration
Once the interface is configured, select a mirror site that is located in the same region of the world as the computer on which FreeBSD is being installed.
Files can be retrieved more quickly when the mirror is close to the target computer, reducing installation time.
Figure 46. Choosing a Mirror
2.8.3. Setting the Time Zone
The next series of menus are used to determine the correct local time by selecting the geographic region, country, and time zone.
Setting the time zone allows the system to automatically correct for regional time changes, such as daylight savings time, and perform other time zone related functions properly.
The example shown here is for a machine located in the mainland time zone of Spain, Europe.
The selections will vary according to the geographical location.
Figure 47. Select a Region
The appropriate region is selected using the arrow keys and then pressing
Enter
.
Figure 48. Select a Country
Select the appropriate country using the arrow keys and press
Enter
.
Figure 49. Select a Time Zone
The appropriate time zone is selected using the arrow keys and pressing
Enter
.
Figure 50. Confirm Time Zone
Confirm the abbreviation for the time zone is correct.
The appropriate date is selected using the arrow keys and then pressing
Set Date
.
Otherwise, the date selection can be skipped by pressing
Skip
.
The appropriate time is selected using the arrow keys and then pressing
Set Time
.
Otherwise, the time selection can be skipped by pressing
Skip
.
2.8.6. Add Users
The next menu prompts to create at least one user account.
It is recommended to log into the system using a user account rather than as
root
.
When logged in as
root
, there are essentially no limits or protection on what can be done.
Logging in as a normal user is safer and more secure.
Select
Yes
to add new users.
Figure 55. Add User Accounts
Follow the prompts and input the requested information for the user account.
The example shown in
Enter User Information
creates the
asample
user account.
Figure 56. Enter User Information
Here is a summary of the information to input:
-
Username
- The name the user will enter to log in. A common convention is to use the first letter of the first name combined with the last name, as long as each username is unique for the system. The username is case sensitive and should not contain any spaces.
-
Full name
- The user’s full name. This can contain spaces and is used as a description for the user account.
-
Uid
- User ID. This is typically left blank so the system automatically assigns a value.
-
Login group
- The user’s group. This is typically left blank to accept the default.
-
Invite
user
into other groups?
- Additional groups to which the user will be added as a member. If the user needs administrative access, type
wheel
here.
-
Login class
- Typically left blank for the default.
-
Shell
- Type in one of the listed values to set the interactive shell for the user. Refer to
Shells
for more information about shells.
-
Home directory
- The user’s home directory. The default is usually correct.
-
Home directory permissions
- Permissions on the user’s home directory. The default is usually correct.
-
Use password-based authentication?
- Typically
yes
so that the user is prompted to input their password at login.
-
Use an empty password?
- Typically
no
as empty or blank passwords are insecure.
-
Use a random password?
- Typically
no
so that the user can set their own password in the next prompt.
-
Enter password
- The password for this user. Typed-in characters will not be shown on the screen.
-
Enter password again
- The password must be typed again for verification.
-
Lock out the account after creation?
- Typically
no
so that the user can log in.
After entering all the details, a summary is shown for review.
If a mistake was made, enter
no
to correct it.
Once everything is correct, enter
yes
to create the new user.
Figure 57. Exit User and Group Management
If there are more users to add, answer the
Add another user?
question with
yes
.
Enter
no
to finish adding users and continue the installation.
2.8.7. Final Configuration
After everything has been installed and configured, a final chance is provided to modify settings.
Figure 58. Final Configuration
Use this menu to make any changes or to do any additional configuration before completing the installation.
Once configuration is complete, select
Exit
.
Figure 59. Manual Configuration
bsdinstall will prompt for any additional configuration that needs to be done before rebooting into the new system.
Select
Yes
to exit to a shell within the new system or
No
to proceed to the last step of the installation.
Figure 60. Complete the Installation
If further configuration or special setup is needed, select
Live CD
to boot the install media into Live CD mode.
If the installation is complete, select
Reboot
to reboot the computer and start the new FreeBSD system.
Do not forget to remove the FreeBSD install media or the computer might boot from it again.
As FreeBSD boots, informational messages are displayed.
After the system finishes booting, a login prompt is displayed.
At the
login:
prompt, enter the username added during the installation.
Avoid logging in as
root
.
Refer to
The Superuser Account
for instructions on how to become the superuser when administrative access is needed.
The messages that appear during boot can be reviewed by pressing
Scroll-Lock
to turn on the scroll-back buffer.
The
PgUp
,
PgDn
, and arrow keys can be used to scroll back through the messages.
When finished, press
Scroll-Lock
again to unlock the display and return to the console.
To review these messages once the system has been up for some time, type
less /var/run/dmesg.boot
from a command prompt.
Press
q
to return to the command line after viewing.
If sshd was enabled in
Selecting Additional Services to Enable
, the first boot might be a bit slower as the system generates SSH host keys.
Subsequent boots will be faster.
The fingerprints of the keys are then displayed as in the following example:
Generating public/private rsa1 key pair.
Your identification has been saved in /etc/ssh/ssh_host_key.
Your public key has been saved in /etc/ssh/ssh_host_key.pub.
The key fingerprint is:
10:a0:f5:af:93:ae:a3:1a:b2:bb:3c:35:d9:5a:b3:f3 root@machine3.example.com
The key's randomart image is:
+--[RSA1 1024]----+
| o.. |
| o . . |
| . o |
| o |
| o S |
| + + o |
|o . + * |
|o+ ..+ . |
|==o..o+E |
+-----------------+
Generating public/private dsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_dsa_key.
Your public key has been saved in /etc/ssh/ssh_host_dsa_key.pub.
The key fingerprint is:
7e:1c:ce:dc:8a:3a:18:13:5b:34:b5:cf:d9:d1:47:b2 root@machine3.example.com
The key's randomart image is:
+--[ DSA 1024]----+
| .. . .|
| o . . + |
| . .. . E .|
| . . o o . . |
| + S = . |
| + . = o |
| + . * . |
| . . o . |
| .o. . |
+-----------------+
Starting sshd.
Refer to
OpenSSH
for more information about fingerprints and SSH.
FreeBSD does not install a graphical environment by default.
Refer to
The X Window System
for more information about installing and configuring a graphical window manager.
Proper shutdown of a FreeBSD computer helps protect data and hardware from damage.
Do not turn off the power before the system has been properly shut down!
If the user is a member of the
wheel
group, become the superuser by typing
su
at the command line and entering the
root
password.
Then, type
shutdown -p now
and the system will shut down cleanly, and, if the hardware supports it, turn itself off.