Config.in.netfilter.core 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. # This file is part of the OpenADK project. OpenADK is copyrighted
  2. # material, please see the LICENCE file in the top-level directory.
  3. config ADK_WALDUX_KERNEL_NF_CONNTRACK
  4. tristate 'Netfilter connection tracking support'
  5. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  6. default n
  7. help
  8. Connection tracking keeps a record of what packets have passed
  9. through your machine, in order to figure out how they are related
  10. into connections.
  11. Layer 3 independent connection tracking is experimental scheme
  12. which generalize ip_conntrack to support other layer 3 protocols.
  13. menu "Netfilter connection tracking support for special protocols"
  14. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  15. config ADK_WALDUX_KERNEL_NF_CONNTRACK_MARK
  16. bool 'Connection mark tracking support'
  17. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  18. select ADK_WALDUX_KERNEL_IP_NF_MATCH_CONNMARK
  19. help
  20. This option enables support for connection marks, used by the
  21. `CONNMARK' target and `connmark' match. Similar to the mark value
  22. of packets, but this mark value is kept in the conntrack session
  23. instead of the individual packets.
  24. config ADK_WALDUX_KERNEL_NF_CONNTRACK_SECMARK
  25. bool 'Connection tracking security mark support'
  26. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  27. #FIXME select NETWORK_SECMARK
  28. help
  29. This option enables security markings to be applied to
  30. connections. Typically they are copied to connections from
  31. packets using the CONNSECMARK target and copied back from
  32. connections to packets with the same target, with the packets
  33. being originally labeled via SECMARK.
  34. config ADK_WALDUX_KERNEL_NF_CONNTRACK_FTP
  35. tristate 'FTP protocol support'
  36. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  37. help
  38. Tracking FTP connections is problematic: special helpers are
  39. required for tracking them, and doing masquerading and other forms
  40. of Network Address Translation on them.
  41. config ADK_WALDUX_KERNEL_NF_CONNTRACK_IRC
  42. tristate 'IRC protocol support'
  43. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  44. help
  45. There is a commonly-used extension to IRC called
  46. Direct Client-to-Client Protocol (DCC). This enables users to send
  47. files to each other, and also chat to each other without the need
  48. of a server. DCC Sending is used anywhere you send files over IRC,
  49. and DCC Chat is most commonly used by Eggdrop bots. If you are
  50. using NAT, this extension will enable you to send files and initiate
  51. chats. Note that you do NOT need this extension to get files or
  52. have others initiate chats, or everything else in IRC.
  53. config ADK_WALDUX_KERNEL_NF_CONNTRACK_NETBIOS_NS
  54. tristate 'NetBIOS name service protocol support'
  55. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  56. help
  57. NetBIOS name service requests are sent as broadcast messages from an
  58. unprivileged port and responded to with unicast messages to the
  59. same port. This make them hard to firewall properly because connection
  60. tracking doesn't deal with broadcasts. This helper tracks locally
  61. originating NetBIOS name service requests and the corresponding
  62. responses. It relies on correct IP address configuration, specifically
  63. netmask and broadcast address. When properly configured, the output
  64. of "ip address show" should look similar to this:
  65. $ ip -4 address show eth0
  66. 4: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
  67. inet 172.16.2.252/24 brd 172.16.2.255 scope global eth0
  68. config ADK_WALDUX_KERNEL_NF_CONNTRACK_TFTP
  69. tristate 'TFTP protocol support'
  70. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  71. help
  72. TFTP connection tracking helper, this is required depending
  73. on how restrictive your ruleset is.
  74. If you are using a tftp client behind -j SNAT or -j MASQUERADING
  75. you will need this.
  76. config ADK_WALDUX_KERNEL_NF_CONNTRACK_PPTP
  77. tristate 'PPTP protocol support'
  78. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  79. help
  80. This module adds support for PPTP (Point to Point Tunnelling
  81. Protocol, RFC2637) connection tracking and NAT.
  82. If you are running PPTP sessions over a stateful firewall or NAT
  83. box, you may want to enable this feature.
  84. Please note that not all PPTP modes of operation are supported yet.
  85. For more info, read top of the file
  86. net/ipv4/netfilter/ip_conntrack_pptp.c
  87. config ADK_WALDUX_KERNEL_NF_CONNTRACK_H323
  88. tristate 'H.323 protocol support'
  89. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  90. help
  91. H.323 is a VoIP signalling protocol from ITU-T. As one of the most
  92. important VoIP protocols, it is widely used by voice hardware and
  93. software including voice gateways, IP phones, Netmeeting, OpenPhone,
  94. Gnomemeeting, etc.
  95. With this module you can support H.323 on a connection tracking/NAT
  96. firewall.
  97. This module supports RAS, Fast Start, H.245 Tunnelling, Call
  98. Forwarding, RTP/RTCP and T.120 based audio, video, fax, chat,
  99. whiteboard, file transfer, etc. For more information, please
  100. visit http://nath323.sourceforge.net/.
  101. config ADK_WALDUX_KERNEL_NF_CONNTRACK_SIP
  102. tristate 'SIP protocol support'
  103. depends on ADK_WALDUX_KERNEL_NF_CONNTRACK
  104. help
  105. SIP is an application-layer control protocol that can establish,
  106. modify, and terminate multimedia sessions (conferences) such as
  107. Internet telephony calls. With the ip_conntrack_sip and
  108. the ip_nat_sip modules you can support the protocol on a connection
  109. tracking/NATing firewall.
  110. endmenu
  111. config ADK_WALDUX_KERNEL_NETFILTER_NETLINK_LOG
  112. tristate 'Netfilter LOG over NFNETLINK interface'
  113. help
  114. If this option is enabled, the kernel will include support
  115. for logging packets via NFNETLINK.
  116. menu "Netfilter target support"
  117. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_CHECKSUM
  118. tristate '"CHECKSUM" target support'
  119. select ADK_WALDUX_KERNEL_IP_NF_IPTABLES
  120. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  121. select ADK_WALDUX_KERNEL_IP_NF_MANGLE
  122. select ADK_WALDUX_KERNEL_NETFILTER_ADVANCED
  123. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_CLASSIFY
  124. tristate '"CLASSIFY" target support'
  125. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  126. help
  127. This option adds a `CLASSIFY' target, which enables the user to set
  128. the priority of a packet. Some qdiscs can use this value for
  129. classification, among these are:
  130. atm, cbq, dsmark, pfifo_fast, htb, prio
  131. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_CONNMARK
  132. tristate '"CONNMARK" target support'
  133. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  134. select ADK_WALDUX_KERNEL_NF_CONNTRACK
  135. help
  136. This option adds a `CONNMARK' target, which allows one to manipulate
  137. the connection mark value. Similar to the MARK target, but
  138. affects the connection mark value rather than the packet mark value.
  139. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_MARK
  140. tristate '"MARK" target support'
  141. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  142. help
  143. This option adds a `MARK' target, which allows you to create rules
  144. in the `mangle' table which alter the netfilter mark (nfmark) field
  145. associated with the packet prior to routing. This can change
  146. the routing method (see `Use netfilter MARK value as routing
  147. key') and can also be used by other subsystems to change their
  148. behavior.
  149. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_NFQUEUE
  150. tristate '"NFQUEUE" target support'
  151. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  152. help
  153. This target replaced the old obsolete QUEUE target.
  154. As opposed to QUEUE, it supports 65535 different queues,
  155. not just one.
  156. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_LOG
  157. tristate '"LOG" target support'
  158. depends on ADK_WALDUX_KERNEL_IP_NF_FILTER
  159. help
  160. This option adds a `LOG' target, which allows you to create rules in
  161. any iptables table which records the packet header to the syslog.
  162. config ADK_WALDUX_KERNEL_NETFILTER_XT_TARGET_TCPMSS
  163. tristate '"TCPMSS" target support'
  164. select ADK_WALDUX_KERNEL_NETFILTER_XTABLES
  165. endmenu