Config.in.netfilter 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683
  1. menu "Netfilter (Firewall/Filtering)"
  2. config ADK_KERNEL_NETFILTER
  3. bool
  4. default n
  5. config ADK_KERNEL_NETFILTER_ADVANCED
  6. bool
  7. default n
  8. config ADK_KERNEL_BRIDGE_NETFILTER
  9. bool
  10. default n
  11. config ADK_KERNEL_NETFILTER_XTABLES
  12. bool
  13. select ADK_KERNEL_NETFILTER
  14. select ADK_KERNEL_NETFILTER_ADVANCED
  15. default n
  16. config ADK_KERNEL_NETFILTER_DEBUG
  17. bool
  18. default n
  19. config ADK_KERNEL_IP_NF_MATCH_LAYER7_DEBUG
  20. bool
  21. default n
  22. config ADK_KERNEL_IP_NF_TARGET_MIRROR
  23. tristate
  24. default n
  25. config ADK_KERNEL_IP_NF_NAT_SNMP_BASIC
  26. tristate
  27. default n
  28. config ADK_KERNEL_IP_NF_TARGET_DSCP
  29. tristate
  30. default n
  31. config ADK_KERNEL_IP_NF_TARGET_MARK
  32. tristate
  33. default n
  34. config ADK_KERNEL_IP_NF_TARGET_CLASSIFY
  35. tristate
  36. default n
  37. config ADK_KERNEL_IP_NF_TARGET_IMQ
  38. tristate
  39. default n
  40. config ADK_KERNEL_IP_NF_TARGET_CONNMARK
  41. tristate
  42. default n
  43. config ADK_KERNEL_IP_NF_ARPTABLES
  44. tristate
  45. default n
  46. config ADK_KERNEL_IP_NF_COMPAT_IPCHAINS
  47. tristate
  48. default n
  49. config ADK_KERNEL_IP_NF_COMPAT_IPFWADM
  50. tristate
  51. default n
  52. config ADK_KERNEL_IP6_NF_QUEUE
  53. tristate
  54. default n
  55. config ADK_KERNEL_IP6_NF_IPTABLES
  56. tristate
  57. default n
  58. config ADK_KERNEL_IP_ROUTE_FWMARK
  59. bool
  60. default n
  61. config ADK_KERNEL_IP_NF_QUEUE
  62. tristate
  63. default n
  64. config ADK_KERNEL_IP_NF_MATCH_TIME
  65. tristate
  66. default n
  67. config ADK_KERNEL_IP_NF_MATCH_CONDITION
  68. tristate
  69. default n
  70. config ADK_KERNEL_IP_NF_MATCH_DSCP
  71. tristate
  72. default n
  73. config ADK_KERNEL_IP_NF_MATCH_AH_ESP
  74. tristate
  75. default n
  76. config ADK_KERNEL_IP_NF_MATCH_LENGTH
  77. tristate
  78. default n
  79. config ADK_KERNEL_IP_NF_MATCH_HELPER
  80. tristate
  81. default n
  82. # cannot be ADK_KERNEL_IP_NF_MATCH_STATE because
  83. # netfilter is built as a module -> this'll always be
  84. # a module, too
  85. config ADK_KPACKAGE_KMOD_IP_NF_MATCH_STATE
  86. tristate
  87. select ADK_KPACKAGE_KMOD_NETFILTER_XT_MATCH_STATE
  88. default n
  89. config ADK_KPACKAGE_KMOD_NETFILTER_XT_MATCH_STATE
  90. tristate
  91. default n
  92. # cannot be ADK_KERNEL_IP_NF_MATCH_CONNTRACK because
  93. # netfilter is built as a module -> this'll always be
  94. # a module, too
  95. config ADK_KPACKAGE_KMOD_IP_NF_MATCH_CONNTRACK
  96. tristate
  97. default n
  98. config ADK_KERNEL_IP_NF_MATCH_CONNMARK
  99. tristate
  100. default n
  101. config ADK_KERNEL_IP_NF_MATCH_UNCLEAN
  102. tristate
  103. default n
  104. config ADK_KERNEL_IP_NF_MATCH_STRING
  105. tristate
  106. default n
  107. menu "Core Netfilter Configuration"
  108. config ADK_KPACKAGE_KMOD_NF_CONNTRACK
  109. tristate 'Netfilter connection tracking support'
  110. select ADK_KERNEL_NETFILTER_XTABLES
  111. help
  112. Connection tracking keeps a record of what packets have passed
  113. through your machine, in order to figure out how they are related
  114. into connections.
  115. Layer 3 independent connection tracking is experimental scheme
  116. which generalize ip_conntrack to support other layer 3 protocols.
  117. config ADK_KPACKAGE_KMOD_NETFILTER_XT_TARGET_CLASSIFY
  118. tristate '"CLASSIFY" target support'
  119. select ADK_KERNEL_NETFILTER_XTABLES
  120. help
  121. This option adds a `CLASSIFY' target, which enables the user to set
  122. the priority of a packet. Some qdiscs can use this value for
  123. classification, among these are:
  124. atm, cbq, dsmark, pfifo_fast, htb, prio
  125. config ADK_KPACKAGE_KMOD_NETFILTER_XT_TARGET_CONNMARK
  126. tristate '"CONNMARK" target support'
  127. select ADK_KERNEL_NETFILTER_XTABLES
  128. select ADK_KPACKAGE_KMOD_NF_CONNTRACK
  129. help
  130. This option adds a `CONNMARK' target, which allows one to manipulate
  131. the connection mark value. Similar to the MARK target, but
  132. affects the connection mark value rather than the packet mark value.
  133. config ADK_KPACKAGE_KMOD_NETFILTER_XT_TARGET_MARK
  134. tristate '"MARK" target support'
  135. select ADK_KERNEL_NETFILTER_XTABLES
  136. help
  137. This option adds a `MARK' target, which allows you to create rules
  138. in the `mangle' table which alter the netfilter mark (nfmark) field
  139. associated with the packet prior to routing. This can change
  140. the routing method (see `Use netfilter MARK value as routing
  141. key') and can also be used by other subsystems to change their
  142. behavior.
  143. config ADK_KPACKAGE_KMOD_NETFILTER_XT_TARGET_NFQUEUE
  144. tristate '"NFQUEUE" target support'
  145. select ADK_KERNEL_NETFILTER_XTABLES
  146. help
  147. This target replaced the old obsolete QUEUE target.
  148. As opposed to QUEUE, it supports 65535 different queues,
  149. not just one.
  150. config ADK_KPACKAGE_KMOD_NETFILTER_XT_TARGET_TCPMSS
  151. tristate 'TCPMSS target'
  152. select ADK_KERNEL_NETFILTER_XTABLES
  153. help
  154. endmenu
  155. menu "IP: Netfilter Configuration"
  156. config ADK_KPACKAGE_KMOD_NF_CONNTRACK_IPV4
  157. bool 'IPv4 connection tracking support (required for NAT)'
  158. select ADK_KPACKAGE_KMOD_NF_CONNTRACK
  159. help
  160. Connection tracking keeps a record of what packets have passed
  161. through your machine, in order to figure out how they are related
  162. into connections.
  163. config ADK_KPACKAGE_KMOD_IP_NF_CT_ACCT
  164. bool 'Connection tracking flow accounting'
  165. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  166. help
  167. If this option is enabled, the connection tracking code will
  168. keep per-flow packet and byte counters.
  169. Those counters can be used for flow-based accounting or the
  170. `connbytes' match.
  171. config ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK_MARK
  172. bool 'Connection mark tracking support'
  173. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  174. select ADK_KERNEL_IP_NF_MATCH_CONNMARK
  175. help
  176. This option enables support for connection marks, used by the
  177. `CONNMARK' target and `connmark' match. Similar to the mark value
  178. of packets, but this mark value is kept in the conntrack session
  179. instead of the individual packets.
  180. config ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK_SECMARK
  181. bool 'Connection tracking security mark support'
  182. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  183. #FIXME select NETWORK_SECMARK
  184. help
  185. This option enables security markings to be applied to
  186. connections. Typically they are copied to connections from
  187. packets using the CONNSECMARK target and copied back from
  188. connections to packets with the same target, with the packets
  189. being originally labeled via SECMARK.
  190. config ADK_KPACKAGE_KMOD_IP_NF_FTP
  191. tristate 'FTP protocol support'
  192. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  193. help
  194. Tracking FTP connections is problematic: special helpers are
  195. required for tracking them, and doing masquerading and other forms
  196. of Network Address Translation on them.
  197. config ADK_KPACKAGE_KMOD_IP_NF_IRC
  198. tristate 'IRC protocol support'
  199. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  200. help
  201. There is a commonly-used extension to IRC called
  202. Direct Client-to-Client Protocol (DCC). This enables users to send
  203. files to each other, and also chat to each other without the need
  204. of a server. DCC Sending is used anywhere you send files over IRC,
  205. and DCC Chat is most commonly used by Eggdrop bots. If you are
  206. using NAT, this extension will enable you to send files and initiate
  207. chats. Note that you do NOT need this extension to get files or
  208. have others initiate chats, or everything else in IRC.
  209. config ADK_KPACKAGE_KMOD_IP_NF_NETBIOS_NS
  210. tristate 'NetBIOS name service protocol support (EXPERIMENTAL)'
  211. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  212. help
  213. NetBIOS name service requests are sent as broadcast messages from an
  214. unprivileged port and responded to with unicast messages to the
  215. same port. This make them hard to firewall properly because connection
  216. tracking doesn't deal with broadcasts. This helper tracks locally
  217. originating NetBIOS name service requests and the corresponding
  218. responses. It relies on correct IP address configuration, specifically
  219. netmask and broadcast address. When properly configured, the output
  220. of "ip address show" should look similar to this:
  221. $ ip -4 address show eth0
  222. 4: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
  223. inet 172.16.2.252/24 brd 172.16.2.255 scope global eth0
  224. config ADK_KPACKAGE_KMOD_IP_NF_TFTP
  225. tristate 'TFTP protocol support'
  226. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  227. help
  228. TFTP connection tracking helper, this is required depending
  229. on how restrictive your ruleset is.
  230. If you are using a tftp client behind -j SNAT or -j MASQUERADING
  231. you will need this.
  232. config ADK_KPACKAGE_KMOD_IP_NF_AMANDA
  233. tristate 'Amanda backup protocol support'
  234. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  235. #FIXME TEXTSEARCH && TEXTSEARCH_KMP
  236. help
  237. If you are running the Amanda backup package <http://www.amanda.org/>
  238. on this machine or machines that will be MASQUERADED through this
  239. machine, then you may want to enable this feature. This allows the
  240. connection tracking and natting code to allow the sub-channels that
  241. Amanda requires for communication of the backup data, messages and
  242. index.
  243. config ADK_KPACKAGE_KMOD_IP_NF_PPTP
  244. tristate 'PPTP protocol support'
  245. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  246. help
  247. This module adds support for PPTP (Point to Point Tunnelling
  248. Protocol, RFC2637) connection tracking and NAT.
  249. If you are running PPTP sessions over a stateful firewall or NAT
  250. box, you may want to enable this feature.
  251. Please note that not all PPTP modes of operation are supported yet.
  252. For more info, read top of the file
  253. net/ipv4/netfilter/ip_conntrack_pptp.c
  254. config ADK_KPACKAGE_KMOD_IP_NF_H323
  255. tristate 'H.323 protocol support (EXPERIMENTAL)'
  256. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  257. help
  258. H.323 is a VoIP signalling protocol from ITU-T. As one of the most
  259. important VoIP protocols, it is widely used by voice hardware and
  260. software including voice gateways, IP phones, Netmeeting, OpenPhone,
  261. Gnomemeeting, etc.
  262. With this module you can support H.323 on a connection tracking/NAT
  263. firewall.
  264. This module supports RAS, Fast Start, H.245 Tunnelling, Call
  265. Forwarding, RTP/RTCP and T.120 based audio, video, fax, chat,
  266. whiteboard, file transfer, etc. For more information, please
  267. visit http://nath323.sourceforge.net/.
  268. config ADK_KPACKAGE_KMOD_IP_NF_SIP
  269. tristate 'SIP protocol support (EXPERIMENTAL)'
  270. depends on ADK_KPACKAGE_KMOD_IP_NF_CONNTRACK
  271. help
  272. SIP is an application-layer control protocol that can establish,
  273. modify, and terminate multimedia sessions (conferences) such as
  274. Internet telephony calls. With the ip_conntrack_sip and
  275. the ip_nat_sip modules you can support the protocol on a connection
  276. tracking/NATing firewall.
  277. config ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  278. tristate 'IP tables support (required for filtering/masq/NAT)'
  279. select ADK_KERNEL_NETFILTER_XTABLES
  280. help
  281. iptables is a general, extensible packet identification framework.
  282. The packet filtering and full NAT (masquerading, port forwarding,
  283. etc) subsystems now use this: say `Y' or `M' here if you want to use
  284. either of those.
  285. config ADK_KPACKAGE_KMOD_IP_NF_FILTER
  286. tristate 'Packet Filtering'
  287. depends on ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  288. help
  289. Packet filtering defines a table `filter', which has a series of
  290. rules for simple packet filtering at local input, forwarding and
  291. local output. See the man page for iptables(8).
  292. config ADK_KPACKAGE_KMOD_NF_NAT
  293. tristate 'Full NAT'
  294. depends on ADK_KPACKAGE_KMOD_NF_IP_IPTABLES
  295. help
  296. The Full NAT option allows masquerading, port forwarding and other
  297. forms of full Network Address Port Translation. It is controlled by
  298. the `nat' table in iptables: see the man page for iptables(8).
  299. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_MASQUERADE
  300. tristate 'MASQUERADE target support'
  301. depends on ADK_KPACKAGE_KMOD_NF_NAT
  302. help
  303. Masquerading is a special case of NAT: all outgoing connections are
  304. changed to seem to come from a particular interface's address, and
  305. if the interface goes down, those connections are lost. This is
  306. only useful for dialup accounts with dynamic IP address (ie. your IP
  307. address will be different on next dialup).
  308. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REJECT
  309. tristate 'REJECT target support'
  310. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  311. help
  312. The REJECT target allows a filtering rule to specify that an ICMP
  313. error should be issued in response to an incoming packet, rather
  314. than silently being dropped.
  315. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_LOG
  316. tristate 'LOG target support'
  317. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  318. help
  319. This option adds a `LOG' target, which allows you to create rules in
  320. any iptables table which records the packet header to the syslog.
  321. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ULOG
  322. tristate 'ULOG target support (ipv4 only)'
  323. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  324. help
  325. This option enables the old IPv4-only "ipt_ULOG" implementation
  326. which has been obsoleted by the new "nfnetlink_log" code (see
  327. CONFIG_NETFILTER_NETLINK_LOG).
  328. This option adds a `ULOG' target, which allows you to create rules in
  329. any iptables table. The packet is passed to a userspace logging
  330. daemon using netlink multicast sockets; unlike the LOG target
  331. which can only be viewed through syslog.
  332. The appropriate userspace logging daemon (ulogd) may be obtained from
  333. <http://www.gnumonks.org/projects/ulogd/>
  334. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REDIRECT
  335. tristate 'REDIRECT target support'
  336. depends on ADK_KPACKAGE_KMOD_NF_NAT
  337. help
  338. REDIRECT is a special case of NAT: all incoming connections are
  339. mapped onto the incoming interface's address, causing the packets to
  340. come to the local machine instead of passing through. This is
  341. useful for transparent proxies.
  342. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_NETMAP
  343. tristate 'NETMAP target support'
  344. depends on ADK_KPACKAGE_KMOD_NF_NAT
  345. help
  346. NETMAP is an implementation of static 1:1 NAT mapping of network
  347. addresses. It maps the network address part, while keeping the host
  348. address part intact. It is similar to Fast NAT, except that
  349. Netfilter's connection tracking doesn't work well with Fast NAT.
  350. config ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  351. tristate 'Packet mangling'
  352. depends on ADK_KPACKAGE_KMOD_NF_NAT
  353. help
  354. This option adds a `mangle' table to iptables: see the man page for
  355. iptables(8). This table is used for various packet alterations
  356. which can effect how the packet is routed.
  357. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ECN
  358. tristate 'ECN target support'
  359. depends on ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  360. help
  361. This option adds a `ECN' target, which can be used in the iptables mangle
  362. table.
  363. You can use this target to remove the ECN bits from the IPv4 header of
  364. an IP packet. This is particularly useful, if you need to work around
  365. existing ECN blackholes on the internet, but don't want to disable
  366. ECN support in general.
  367. endmenu
  368. menu "Ethernet bridge firewalling"
  369. config ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  370. tristate 'Ethernet Bridge tables (ebtables) support'
  371. select ADK_KERNEL_BRIDGE_NETFILTER
  372. help
  373. ebtables is a general, extensible frame/packet identification
  374. framework. Say 'Y' or 'M' here if you want to do Ethernet
  375. filtering/NAT/brouting on the Ethernet bridge.
  376. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_BROUTE
  377. tristate "ebt: broute table support"
  378. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  379. help
  380. The ebtables broute table is used to define rules that decide between
  381. bridging and routing frames, giving Linux the functionality of a
  382. brouter. See the man page for ebtables(8) and examples on the ebtables
  383. website.
  384. To compile it as a module, choose M here. If unsure, say N.
  385. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_T_FILTER
  386. tristate "ebt: filter table support"
  387. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  388. help
  389. The ebtables filter table is used to define frame filtering rules at
  390. local input, forwarding and local output. See the man page for
  391. ebtables(8).
  392. To compile it as a module, choose M here. If unsure, say N.
  393. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_T_NAT
  394. tristate "ebt: nat table support"
  395. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  396. help
  397. The ebtables nat table is used to define rules that alter the MAC
  398. source address (MAC SNAT) or the MAC destination address (MAC DNAT).
  399. See the man page for ebtables(8).
  400. To compile it as a module, choose M here. If unsure, say N.
  401. #
  402. # matches
  403. #
  404. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_802_3
  405. tristate "ebt: 802.3 filter support"
  406. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  407. help
  408. This option adds matching support for 802.3 Ethernet frames.
  409. To compile it as a module, choose M here. If unsure, say N.
  410. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_AMONG
  411. tristate "ebt: among filter support"
  412. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  413. help
  414. This option adds the among match, which allows matching the MAC source
  415. and/or destination address on a list of addresses. Optionally,
  416. MAC/IP address pairs can be matched, f.e. for anti-spoofing rules.
  417. To compile it as a module, choose M here. If unsure, say N.
  418. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_ARP
  419. tristate "ebt: ARP filter support"
  420. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  421. help
  422. This option adds the ARP match, which allows ARP and RARP header field
  423. filtering.
  424. To compile it as a module, choose M here. If unsure, say N.
  425. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_IP
  426. tristate "ebt: IP filter support"
  427. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  428. help
  429. This option adds the IP match, which allows basic IP header field
  430. filtering.
  431. To compile it as a module, choose M here. If unsure, say N.
  432. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_IP6
  433. tristate "ebt: IP6 filter support"
  434. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES && ADK_KPACKAGE_KMOD_IPV6
  435. help
  436. This option adds the IP6 match, which allows basic IPV6 header field
  437. filtering.
  438. To compile it as a module, choose M here. If unsure, say N.
  439. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_LIMIT
  440. tristate "ebt: limit match support"
  441. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  442. help
  443. This option adds the limit match, which allows you to control
  444. the rate at which a rule can be matched. This match is the
  445. equivalent of the iptables limit match.
  446. If you want to compile it as a module, say M here and read
  447. <file:Documentation/kbuild/modules.txt>. If unsure, say `N'.
  448. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_MARK
  449. tristate "ebt: mark filter support"
  450. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  451. help
  452. This option adds the mark match, which allows matching frames based on
  453. the 'nfmark' value in the frame. This can be set by the mark target.
  454. This value is the same as the one used in the iptables mark match and
  455. target.
  456. To compile it as a module, choose M here. If unsure, say N.
  457. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_PKTTYPE
  458. tristate "ebt: packet type filter support"
  459. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  460. help
  461. This option adds the packet type match, which allows matching on the
  462. type of packet based on its Ethernet "class" (as determined by
  463. the generic networking code): broadcast, multicast,
  464. for this host alone or for another host.
  465. To compile it as a module, choose M here. If unsure, say N.
  466. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_STP
  467. tristate "ebt: STP filter support"
  468. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  469. help
  470. This option adds the Spanning Tree Protocol match, which
  471. allows STP header field filtering.
  472. To compile it as a module, choose M here. If unsure, say N.
  473. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_VLAN
  474. tristate "ebt: 802.1Q VLAN filter support"
  475. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  476. help
  477. This option adds the 802.1Q vlan match, which allows the filtering of
  478. 802.1Q vlan fields.
  479. To compile it as a module, choose M here. If unsure, say N.
  480. #
  481. # targets
  482. #
  483. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_ARPREPLY
  484. tristate "ebt: arp reply target support"
  485. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  486. help
  487. This option adds the arp reply target, which allows
  488. automatically sending arp replies to arp requests.
  489. To compile it as a module, choose M here. If unsure, say N.
  490. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_DNAT
  491. tristate "ebt: dnat target support"
  492. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  493. help
  494. This option adds the MAC DNAT target, which allows altering the MAC
  495. destination address of frames.
  496. To compile it as a module, choose M here. If unsure, say N.
  497. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_MARK_T
  498. tristate "ebt: mark target support"
  499. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  500. help
  501. This option adds the mark target, which allows marking frames by
  502. setting the 'nfmark' value in the frame.
  503. This value is the same as the one used in the iptables mark match and
  504. target.
  505. To compile it as a module, choose M here. If unsure, say N.
  506. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_REDIRECT
  507. tristate "ebt: redirect target support"
  508. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  509. help
  510. This option adds the MAC redirect target, which allows altering the MAC
  511. destination address of a frame to that of the device it arrived on.
  512. To compile it as a module, choose M here. If unsure, say N.
  513. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_SNAT
  514. tristate "ebt: snat target support"
  515. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  516. help
  517. This option adds the MAC SNAT target, which allows altering the MAC
  518. source address of frames.
  519. To compile it as a module, choose M here. If unsure, say N.
  520. #
  521. # watchers
  522. #
  523. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_LOG
  524. tristate "ebt: log support"
  525. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  526. help
  527. This option adds the log watcher, that you can use in any rule
  528. in any ebtables table. It records info about the frame header
  529. to the syslog.
  530. To compile it as a module, choose M here. If unsure, say N.
  531. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_ULOG
  532. tristate "ebt: ulog support (OBSOLETE)"
  533. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  534. help
  535. This option enables the old bridge-specific "ebt_ulog" implementation
  536. which has been obsoleted by the new "nfnetlink_log" code (see
  537. CONFIG_NETFILTER_NETLINK_LOG).
  538. This option adds the ulog watcher, that you can use in any rule
  539. in any ebtables table. The packet is passed to a userspace
  540. logging daemon using netlink multicast sockets. This differs
  541. from the log watcher in the sense that the complete packet is
  542. sent to userspace instead of a descriptive text and that
  543. netlink multicast sockets are used instead of the syslog.
  544. To compile it as a module, choose M here. If unsure, say N.
  545. config ADK_KPACKAGE_KMOD_BRIDGE_EBT_NFLOG
  546. tristate "ebt: nflog support"
  547. depends on ADK_KPACKAGE_KMOD_BRIDGE_NF_EBTABLES
  548. help
  549. This option enables the nflog watcher, which allows to LOG
  550. messages through the netfilter logging API, which can use
  551. either the old LOG target, the old ULOG target or nfnetlink_log
  552. as backend.
  553. This option adds the nflog watcher, that you can use in any rule
  554. in any ebtables table.
  555. To compile it as a module, choose M here. If unsure, say N.
  556. endmenu
  557. source package/ipset/Config.in.kmod
  558. endmenu