Config.in.netfilter.ip4 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. config ADK_KPACKAGE_KMOD_NF_CONNTRACK_IPV4
  2. bool 'IPv4 connection tracking support (required for NAT)'
  3. select ADK_KPACKAGE_KMOD_NF_CONNTRACK
  4. help
  5. Connection tracking keeps a record of what packets have passed
  6. through your machine, in order to figure out how they are related
  7. into connections.
  8. config ADK_KPACKAGE_KMOD_IP_NF_CT_ACCT
  9. bool 'Connection tracking flow accounting'
  10. depends on ADK_KPACKAGE_KMOD_NF_CONNTRACK
  11. help
  12. If this option is enabled, the connection tracking code will
  13. keep per-flow packet and byte counters.
  14. Those counters can be used for flow-based accounting or the
  15. `connbytes' match.
  16. config ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  17. tristate 'IP tables support (required for filtering/masq/NAT)'
  18. select ADK_KERNEL_NETFILTER_XTABLES
  19. help
  20. iptables is a general, extensible packet identification framework.
  21. The packet filtering and full NAT (masquerading, port forwarding,
  22. etc) subsystems now use this: say `Y' or `M' here if you want to use
  23. either of those.
  24. config ADK_KPACKAGE_KMOD_IP_NF_FILTER
  25. tristate 'Packet Filtering'
  26. depends on ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  27. help
  28. Packet filtering defines a table `filter', which has a series of
  29. rules for simple packet filtering at local input, forwarding and
  30. local output. See the man page for iptables(8).
  31. config ADK_KPACKAGE_KMOD_FULL_NAT
  32. tristate "Meta package for Full NAT"
  33. select ADK_KPACKAGE_KMOD_NF_NAT if ADK_KERNEL_VERSION_3_4_87
  34. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_10_37
  35. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_11_10
  36. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_12_18
  37. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_13_11
  38. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_14_3
  39. select ADK_KPACKAGE_KMOD_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_15_RC4
  40. config ADK_KPACKAGE_KMOD_NF_NAT
  41. tristate 'Full NAT'
  42. depends on ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  43. depends on ADK_KERNEL_VERSION_3_4_87
  44. help
  45. The Full NAT option allows masquerading, port forwarding and other
  46. forms of full Network Address Port Translation. It is controlled by
  47. the `nat' table in iptables: see the man page for iptables(8).
  48. config ADK_KPACKAGE_KMOD_NF_NAT_IPV4
  49. tristate 'Full NAT'
  50. depends on ADK_KPACKAGE_KMOD_IP_NF_IPTABLES
  51. depends on ADK_KERNEL_VERSION_3_10_37 \
  52. || ADK_KERNEL_VERSION_3_11_10 \
  53. || ADK_KERNEL_VERSION_3_12_18 \
  54. || ADK_KERNEL_VERSION_3_13_11 \
  55. || ADK_KERNEL_VERSION_3_14_3 \
  56. || ADK_KERNEL_VERSION_3_15_RC4
  57. help
  58. The Full NAT option allows masquerading, port forwarding and other
  59. forms of full Network Address Port Translation. It is controlled by
  60. the `nat' table in iptables: see the man page for iptables(8).
  61. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_MASQUERADE
  62. tristate 'MASQUERADE target support'
  63. depends on ADK_KPACKAGE_KMOD_FULL_NAT
  64. help
  65. Masquerading is a special case of NAT: all outgoing connections are
  66. changed to seem to come from a particular interface's address, and
  67. if the interface goes down, those connections are lost. This is
  68. only useful for dialup accounts with dynamic IP address (ie. your IP
  69. address will be different on next dialup).
  70. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REJECT
  71. tristate 'REJECT target support'
  72. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  73. help
  74. The REJECT target allows a filtering rule to specify that an ICMP
  75. error should be issued in response to an incoming packet, rather
  76. than silently being dropped.
  77. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ULOG
  78. tristate 'ULOG target support (ipv4 only)'
  79. depends on ADK_KPACKAGE_KMOD_IP_NF_FILTER
  80. help
  81. This option enables the old IPv4-only "ipt_ULOG" implementation
  82. which has been obsoleted by the new "nfnetlink_log" code (see
  83. CONFIG_NETFILTER_NETLINK_LOG).
  84. This option adds a `ULOG' target, which allows you to create rules in
  85. any iptables table. The packet is passed to a userspace logging
  86. daemon using netlink multicast sockets; unlike the LOG target
  87. which can only be viewed through syslog.
  88. The appropriate userspace logging daemon (ulogd) may be obtained from
  89. <http://www.gnumonks.org/projects/ulogd/>
  90. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_REDIRECT
  91. tristate 'REDIRECT target support'
  92. depends on ADK_KPACKAGE_KMOD_FULL_NAT
  93. help
  94. REDIRECT is a special case of NAT: all incoming connections are
  95. mapped onto the incoming interface's address, causing the packets to
  96. come to the local machine instead of passing through. This is
  97. useful for transparent proxies.
  98. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_NETMAP
  99. tristate 'NETMAP target support'
  100. depends on ADK_KPACKAGE_KMOD_FULL_NAT
  101. help
  102. NETMAP is an implementation of static 1:1 NAT mapping of network
  103. addresses. It maps the network address part, while keeping the host
  104. address part intact. It is similar to Fast NAT, except that
  105. Netfilter's connection tracking doesn't work well with Fast NAT.
  106. config ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  107. tristate 'Packet mangling'
  108. depends on ADK_KPACKAGE_KMOD_FULL_NAT
  109. help
  110. This option adds a `mangle' table to iptables: see the man page for
  111. iptables(8). This table is used for various packet alterations
  112. which can effect how the packet is routed.
  113. config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ECN
  114. tristate 'ECN target support'
  115. depends on ADK_KPACKAGE_KMOD_IP_NF_MANGLE
  116. help
  117. This option adds a `ECN' target, which can be used in the iptables mangle
  118. table.
  119. You can use this target to remove the ECN bits from the IPv4 header of
  120. an IP packet. This is particularly useful, if you need to work around
  121. existing ECN blackholes on the internet, but don't want to disable
  122. ECN support in general.