Config.in.netfilter.ip4 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. config ADK_KPACKAGE_KMOD_NF_CONNTRACK_IPV4
  2. bool 'IPv4 connection tracking support (required for NAT)'
  3. select ADK_KPACKAGE_KMOD_NF_CONNTRACK
  4. help
  5. Connection tracking keeps a record of what packets have passed
  6. through your machine, in order to figure out how they are related
  7. into connections.
  8. config ADK_KPACKAGE_KMOD_IP_NF_CT_ACCT
  9. bool 'Connection tracking flow accounting'
  10. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  11. help
  12. If this option is enabled, the connection tracking code will
  13. keep per-flow packet and byte counters.
  14. Those counters can be used for flow-based accounting or the
  15. `connbytes' match.
  16. config ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK_MARK
  17. bool 'Connection mark tracking support'
  18. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  19. select ADK_KERNEL_IP_NF_MATCH_CONNMARK
  20. help
  21. This option enables support for connection marks, used by the
  22. `CONNMARK' target and `connmark' match. Similar to the mark value
  23. of packets, but this mark value is kept in the conntrack session
  24. instead of the individual packets.
  25. config ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK_SECMARK
  26. bool 'Connection tracking security mark support'
  27. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  28. #FIXME select NETWORK_SECMARK
  29. help
  30. This option enables security markings to be applied to
  31. connections. Typically they are copied to connections from
  32. packets using the CONNSECMARK target and copied back from
  33. connections to packets with the same target, with the packets
  34. being originally labeled via SECMARK.
  35. config ADK_KPACKAGE_KMOD_IP_NF_FTP
  36. tristate 'FTP protocol support'
  37. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  38. help
  39. Tracking FTP connections is problematic: special helpers are
  40. required for tracking them, and doing masquerading and other forms
  41. of Network Address Translation on them.
  42. config ADK_KPACKAGE_KMOD_IP_NF_IRC
  43. tristate 'IRC protocol support'
  44. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  45. help
  46. There is a commonly-used extension to IRC called
  47. Direct Client-to-Client Protocol (DCC). This enables users to send
  48. files to each other, and also chat to each other without the need
  49. of a server. DCC Sending is used anywhere you send files over IRC,
  50. and DCC Chat is most commonly used by Eggdrop bots. If you are
  51. using NAT, this extension will enable you to send files and initiate
  52. chats. Note that you do NOT need this extension to get files or
  53. have others initiate chats, or everything else in IRC.
  54. config ADK_KPACKAGE_KMOD_IP_NF_NETBIOS_NS
  55. tristate 'NetBIOS name service protocol support (EXPERIMENTAL)'
  56. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  57. help
  58. NetBIOS name service requests are sent as broadcast messages from an
  59. unprivileged port and responded to with unicast messages to the
  60. same port. This make them hard to firewall properly because connection
  61. tracking doesn't deal with broadcasts. This helper tracks locally
  62. originating NetBIOS name service requests and the corresponding
  63. responses. It relies on correct IP address configuration, specifically
  64. netmask and broadcast address. When properly configured, the output
  65. of "ip address show" should look similar to this:
  66. $ ip -4 address show eth0
  67. 4: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
  68. inet 172.16.2.252/24 brd 172.16.2.255 scope global eth0
  69. config ADK_KPACKAGE_KMOD_IP_NF_TFTP
  70. tristate 'TFTP protocol support'
  71. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  72. help
  73. TFTP connection tracking helper, this is required depending
  74. on how restrictive your ruleset is.
  75. If you are using a tftp client behind -j SNAT or -j MASQUERADING
  76. you will need this.
  77. config ADK_KPACKAGE_KMOD_IP_NF_AMANDA
  78. tristate 'Amanda backup protocol support'
  79. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  80. #FIXME TEXTSEARCH && TEXTSEARCH_KMP
  81. help
  82. If you are running the Amanda backup package <http://www.amanda.org/>
  83. on this machine or machines that will be MASQUERADED through this
  84. machine, then you may want to enable this feature. This allows the
  85. connection tracking and natting code to allow the sub-channels that
  86. Amanda requires for communication of the backup data, messages and
  87. index.
  88. config ADK_KPACKAGE_KMOD_IP_NF_PPTP
  89. tristate 'PPTP protocol support'
  90. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  91. help
  92. This module adds support for PPTP (Point to Point Tunnelling
  93. Protocol, RFC2637) connection tracking and NAT.
  94. If you are running PPTP sessions over a stateful firewall or NAT
  95. box, you may want to enable this feature.
  96. Please note that not all PPTP modes of operation are supported yet.
  97. For more info, read top of the file
  98. net/ipv4/netfilter/ip_conntrack_pptp.c
  99. config ADK_KPACKAGE_KMOD_IP_NF_H323
  100. tristate 'H.323 protocol support (EXPERIMENTAL)'
  101. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  102. help
  103. H.323 is a VoIP signalling protocol from ITU-T. As one of the most
  104. important VoIP protocols, it is widely used by voice hardware and
  105. software including voice gateways, IP phones, Netmeeting, OpenPhone,
  106. Gnomemeeting, etc.
  107. With this module you can support H.323 on a connection tracking/NAT
  108. firewall.
  109. This module supports RAS, Fast Start, H.245 Tunnelling, Call
  110. Forwarding, RTP/RTCP and T.120 based audio, video, fax, chat,
  111. whiteboard, file transfer, etc. For more information, please
  112. visit http://nath323.sourceforge.net/.
  113. config ADK_KPACKAGE_KMOD_IP_NF_SIP
  114. tristate 'SIP protocol support (EXPERIMENTAL)'
  115. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  116. help
  117. SIP is an application-layer control protocol that can establish,
  118. modify, and terminate multimedia sessions (conferences) such as
  119. Internet telephony calls. With the ip_conntrack_sip and
  120. the ip_nat_sip modules you can support the protocol on a connection
  121. tracking/NATing firewall.
  122. config ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  123. tristate 'IP tables support (required for filtering/masq/NAT)'
  124. select ADK_KERNEL_NETFILTER_XTABLES
  125. help
  126. iptables is a general, extensible packet identification framework.
  127. The packet filtering and full NAT (masquerading, port forwarding,
  128. etc) subsystems now use this: say `Y' or `M' here if you want to use
  129. either of those.
  130. config ADK_KPACKAGE_KMOD_IP_NF_FILTER
  131. tristate 'Packet Filtering'
  132. depends on ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  133. help
  134. Packet filtering defines a table `filter', which has a series of
  135. rules for simple packet filtering at local input, forwarding and
  136. local output. See the man page for iptables(8).
  137. config ADK_KPACKAGE_KMOD_NF_NAT
  138. tristate 'Full NAT'
  139. depends on ADK_KPACKAGE_KMOD_NF_IP_IPTABLES
  140. help
  141. The Full NAT option allows masquerading, port forwarding and other
  142. forms of full Network Address Port Translation. It is controlled by
  143. the `nat' table in iptables: see the man page for iptables(8).
  144. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_MASQUERADE
  145. tristate 'MASQUERADE target support'
  146. depends on ADK_KPACKAGE_KMOD_NF_NAT
  147. help
  148. Masquerading is a special case of NAT: all outgoing connections are
  149. changed to seem to come from a particular interface's address, and
  150. if the interface goes down, those connections are lost. This is
  151. only useful for dialup accounts with dynamic IP address (ie. your IP
  152. address will be different on next dialup).
  153. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REJECT
  154. tristate 'REJECT target support'
  155. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  156. help
  157. The REJECT target allows a filtering rule to specify that an ICMP
  158. error should be issued in response to an incoming packet, rather
  159. than silently being dropped.
  160. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_LOG
  161. tristate 'LOG target support'
  162. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  163. help
  164. This option adds a `LOG' target, which allows you to create rules in
  165. any iptables table which records the packet header to the syslog.
  166. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ULOG
  167. tristate 'ULOG target support (ipv4 only)'
  168. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  169. help
  170. This option enables the old IPv4-only "ipt_ULOG" implementation
  171. which has been obsoleted by the new "nfnetlink_log" code (see
  172. CONFIG_NETFILTER_NETLINK_LOG).
  173. This option adds a `ULOG' target, which allows you to create rules in
  174. any iptables table. The packet is passed to a userspace logging
  175. daemon using netlink multicast sockets; unlike the LOG target
  176. which can only be viewed through syslog.
  177. The appropriate userspace logging daemon (ulogd) may be obtained from
  178. <http://www.gnumonks.org/projects/ulogd/>
  179. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REDIRECT
  180. tristate 'REDIRECT target support'
  181. depends on ADK_KPACKAGE_KMOD_NF_NAT
  182. help
  183. REDIRECT is a special case of NAT: all incoming connections are
  184. mapped onto the incoming interface's address, causing the packets to
  185. come to the local machine instead of passing through. This is
  186. useful for transparent proxies.
  187. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_NETMAP
  188. tristate 'NETMAP target support'
  189. depends on ADK_KPACKAGE_KMOD_NF_NAT
  190. help
  191. NETMAP is an implementation of static 1:1 NAT mapping of network
  192. addresses. It maps the network address part, while keeping the host
  193. address part intact. It is similar to Fast NAT, except that
  194. Netfilter's connection tracking doesn't work well with Fast NAT.
  195. config ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  196. tristate 'Packet mangling'
  197. depends on ADK_KPACKAGE_KMOD_NF_NAT
  198. help
  199. This option adds a `mangle' table to iptables: see the man page for
  200. iptables(8). This table is used for various packet alterations
  201. which can effect how the packet is routed.
  202. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ECN
  203. tristate 'ECN target support'
  204. depends on ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  205. help
  206. This option adds a `ECN' target, which can be used in the iptables mangle
  207. table.
  208. You can use this target to remove the ECN bits from the IPv4 header of
  209. an IP packet. This is particularly useful, if you need to work around
  210. existing ECN blackholes on the internet, but don't want to disable
  211. ECN support in general.