Config.in.netfilter.ip4 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138
  1. config ADK_KERNEL_NF_NAT
  2. tristate
  3. config ADK_KERNEL_NF_NAT_IPV4
  4. tristate
  5. config ADK_KERNEL_IP_NF_IPTABLES
  6. tristate 'IP tables support'
  7. select ADK_KERNEL_NETFILTER_XTABLES
  8. default m if ADK_PACKAGE_IPTABLES
  9. default n
  10. help
  11. iptables is a general, extensible packet identification framework.
  12. The packet filtering and full NAT (masquerading, port forwarding,
  13. etc) subsystems now use this: say `Y' or `M' here if you want to use
  14. either of those.
  15. config ADK_KERNEL_IP_NF_FILTER
  16. tristate 'IP Packet Filtering table support'
  17. depends on ADK_KERNEL_IP_NF_IPTABLES
  18. default m if ADK_PACKAGE_IPTABLES
  19. default n
  20. help
  21. Packet filtering defines a table `filter', which has a series of
  22. rules for simple packet filtering at local input, forwarding and
  23. local output.
  24. config ADK_KERNEL_IP_NF_NAT
  25. tristate 'IP NAT table support'
  26. select ADK_KERNEL_NETFILTER_XT_NAT
  27. select ADK_KERNEL_NF_NAT
  28. select ADK_KERNEL_NF_NAT_IPV4
  29. depends on ADK_KERNEL_IP_NF_IPTABLES
  30. default m if ADK_PACKAGE_IPTABLES
  31. default n
  32. help
  33. config ADK_KERNEL_IP_NF_MANGLE
  34. tristate 'IP Packet mangling table support'
  35. depends on ADK_KERNEL_IP_NF_IPTABLES
  36. default n
  37. help
  38. This option adds a `mangle' table to iptables: see the man page for
  39. iptables(8). This table is used for various packet alterations
  40. which can effect how the packet is routed.
  41. config ADK_KERNEL_NF_CONNTRACK_IPV4
  42. tristate 'IP connection tracking support (required for NAT)'
  43. select ADK_KERNEL_NF_CONNTRACK
  44. select ADK_KERNEL_NETFILTER_XT_MATCH_CONNTRACK
  45. default m if ADK_PACKAGE_IPTABLES
  46. default n
  47. help
  48. Connection tracking keeps a record of what packets have passed
  49. through your machine, in order to figure out how they are related
  50. into connections.
  51. config ADK_KERNEL_IP_NF_CT_ACCT
  52. bool 'Connection tracking flow accounting'
  53. depends on ADK_KERNEL_NF_CONNTRACK
  54. help
  55. If this option is enabled, the connection tracking code will
  56. keep per-flow packet and byte counters.
  57. Those counters can be used for flow-based accounting or the
  58. `connbytes' match.
  59. menu "IP target support"
  60. config ADK_KERNEL_IP_NF_TARGET_MASQUERADE
  61. tristate 'MASQUERADE target support'
  62. depends on ADK_KERNEL_NF_NAT
  63. default m if ADK_PACKAGE_IPTABLES
  64. default n
  65. help
  66. Masquerading is a special case of NAT: all outgoing connections are
  67. changed to seem to come from a particular interface's address, and
  68. if the interface goes down, those connections are lost. This is
  69. only useful for dialup accounts with dynamic IP address (ie. your IP
  70. address will be different on next dialup).
  71. config ADK_KERNEL_IP_NF_TARGET_REJECT
  72. tristate 'REJECT target support'
  73. depends on ADK_KERNEL_IP_NF_FILTER
  74. default m if ADK_PACKAGE_IPTABLES
  75. default n
  76. help
  77. The REJECT target allows a filtering rule to specify that an ICMP
  78. error should be issued in response to an incoming packet, rather
  79. than silently being dropped.
  80. config ADK_KERNEL_IP_NF_TARGET_ULOG
  81. tristate 'ULOG target support'
  82. depends on ADK_KERNEL_IP_NF_FILTER
  83. help
  84. This option enables the old IPv4-only "ipt_ULOG" implementation
  85. which has been obsoleted by the new "nfnetlink_log" code (see
  86. CONFIG_NETFILTER_NETLINK_LOG).
  87. This option adds a `ULOG' target, which allows you to create rules in
  88. any iptables table. The packet is passed to a userspace logging
  89. daemon using netlink multicast sockets; unlike the LOG target
  90. which can only be viewed through syslog.
  91. The appropriate userspace logging daemon (ulogd) may be obtained from
  92. <http://www.gnumonks.org/projects/ulogd/>
  93. config ADK_KERNEL_IP_NF_TARGET_REDIRECT
  94. tristate 'REDIRECT target support'
  95. depends on ADK_KERNEL_NF_NAT
  96. help
  97. REDIRECT is a special case of NAT: all incoming connections are
  98. mapped onto the incoming interface's address, causing the packets to
  99. come to the local machine instead of passing through. This is
  100. useful for transparent proxies.
  101. config ADK_KERNEL_IP_NF_TARGET_NETMAP
  102. tristate 'NETMAP target support'
  103. depends on ADK_KERNEL_NF_NAT
  104. help
  105. NETMAP is an implementation of static 1:1 NAT mapping of network
  106. addresses. It maps the network address part, while keeping the host
  107. address part intact. It is similar to Fast NAT, except that
  108. Netfilter's connection tracking doesn't work well with Fast NAT.
  109. config ADK_KERNEL_IP_NF_TARGET_ECN
  110. tristate 'ECN target support'
  111. depends on ADK_KERNEL_IP_NF_MANGLE
  112. help
  113. This option adds a `ECN' target, which can be used in the iptables mangle
  114. table.
  115. You can use this target to remove the ECN bits from the IPv4 header of
  116. an IP packet. This is particularly useful, if you need to work around
  117. existing ECN blackholes on the internet, but don't want to disable
  118. ECN support in general.
  119. endmenu