The software described in this documentation is either in Extended Support or Sustaining Support. See for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.

2.1.2 Continuing the Installation

Having located the full installation media, the installation continues.

  1. In the Storage Devices Selection window, select one of the following options:

    Basic Storage Devices

    The installer automatically detects any locally attached storage devices, and displays the Storage Device Warning window that asks you to choose whether to discard or keep existing data on those devices.

    Specialized Storage Devices

    The installer displays the Storage Devices Selection window with tabs for each of the supported device types. You can select the devices on which to install the operating system in addition to any drives that the system should mount automatically. To configure iSCSI or FCoE connections, click Add Advanced Target. You can filter storage devices by WWID or by a combination of port, target, and LUN.

    Click Next to display the Set Hostname window.

  2. Enter the host name of the system as either as a single name or as a fully-qualified domain name (FQDN), for example, If you use the Dynamic Host Configuration Protocol (DHCP) to provide network settings, enter a single name and allow DHCP to assign the domain name.


    The following procedure in this step assumes that your system is connected to a wired IPv4 network.

    If you require the system to have network access during installation, click Configure Network to display the Network Connections window:

    1. Select the tab corresponding to the network interface type, for example, Wired.

    2. Select the network interface that you want to configure, for example eth0, and click Edit.

      The Editing System window appears with the following tabs:


      Allows you to specify the MAC address and MTU for the network adapter.

      802.1x Security

      Allows you to configure 802.1X port-based network access control (PNAC) if required. You can select TLS (transport layer security), FAST (Flexible Authentication via Secure Tunneling), Tunneled TLS, or Protected EAP (Protected Extensible Authentication Protocol or PEAP) as the authentication method. To configure one of the methods, provide the identify, certification, and private key information.

      IPv4 Settings

      Allows you to configure IP settings for IPv4.

      IPv6 Settings

      Allows you to configure IP settings for IPv6.

    3. In the Editing System window, select the IPv4 Settings tab.

    4. Ensure that the Connect automatically check box is selected so that the system enables the connection at boot time.

    5. Select either Automatic (DHCP) or Manual as the method for obtaining settings.

      If you select Automatic (DHCP), enter the DCHP client ID, if required, and click Apply.

      If you select Manual, enter values for the IP address, network mask, gateway, and DNS parameters, and click Apply.

    Click Next to display the Time Zone Selection window.

  3. Select a time zone by clicking the map or selecting from the drop-down list. Choose a country and city that are in the same time zone as your system. You need to specify a time zone even if you intend to use the Network Time Protocol (NTP).


    Only deselect the System clock uses UTC check box if the system is an Oracle Linux and Microsoft Windows dual-boot environment.

    After the installation is complete, you can use the graphical system-config-date command to change the time-zone setting, or you can copy a timezone file from the /usr/share/zoneinfo directory hierarchy over the existing /etc/localtime file. To enable or disable System clock uses UTC, set the third line of /etc/adjtime to UTC or LOCAL respectively.

    Click Next to display the Set Root Password window.

  4. Enter the root password in the Root Password and Confirm text fields, and click Next to display the Disk Partitioning window.


    The installer's password checking algorithm displays a warning if the password is weak. You can choose to override the warning.