Config.in.netfilter.ip4 5.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. config ADK_KERNEL_NF_CONNTRACK_IPV4
  2. bool 'IPv4 connection tracking support (required for NAT)'
  3. select ADK_KERNEL_NF_CONNTRACK
  4. default m if ADK_PACKAGE_IPTABLES
  5. default n
  6. help
  7. Connection tracking keeps a record of what packets have passed
  8. through your machine, in order to figure out how they are related
  9. into connections.
  10. config ADK_KERNEL_IP_NF_CT_ACCT
  11. bool 'Connection tracking flow accounting'
  12. depends on ADK_KERNEL_NF_CONNTRACK
  13. help
  14. If this option is enabled, the connection tracking code will
  15. keep per-flow packet and byte counters.
  16. Those counters can be used for flow-based accounting or the
  17. `connbytes' match.
  18. config ADK_KERNEL_IP_NF_IPTABLES
  19. tristate 'IP tables support (required for filtering/masq/NAT)'
  20. select ADK_KERNEL_NETFILTER_XTABLES
  21. default m if ADK_PACKAGE_IPTABLES
  22. default n
  23. help
  24. iptables is a general, extensible packet identification framework.
  25. The packet filtering and full NAT (masquerading, port forwarding,
  26. etc) subsystems now use this: say `Y' or `M' here if you want to use
  27. either of those.
  28. config ADK_KERNEL_IP_NF_FILTER
  29. tristate 'Packet Filtering'
  30. depends on ADK_KERNEL_IP_NF_IPTABLES
  31. default m if ADK_PACKAGE_IPTABLES
  32. default n
  33. help
  34. Packet filtering defines a table `filter', which has a series of
  35. rules for simple packet filtering at local input, forwarding and
  36. local output. See the man page for iptables(8).
  37. config ADK_KERNEL_FULL_NAT
  38. tristate "Meta package for Full NAT"
  39. select ADK_KERNEL_NF_NAT if ADK_KERNEL_VERSION_3_4_87
  40. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_10_37
  41. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_11_10
  42. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_12_18
  43. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_13_11
  44. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_14_4
  45. select ADK_KERNEL_NF_NAT_IPV4 if ADK_KERNEL_VERSION_3_15_RC5
  46. default m if ADK_PACKAGE_IPTABLES
  47. default n
  48. config ADK_KERNEL_NF_NAT
  49. tristate 'Full NAT'
  50. depends on ADK_KERNEL_IP_NF_IPTABLES
  51. depends on ADK_KERNEL_VERSION_3_4_87
  52. default m if ADK_PACKAGE_IPTABLES
  53. default n
  54. help
  55. The Full NAT option allows masquerading, port forwarding and other
  56. forms of full Network Address Port Translation. It is controlled by
  57. the `nat' table in iptables: see the man page for iptables(8).
  58. config ADK_KERNEL_NF_NAT_IPV4
  59. tristate 'Full NAT'
  60. depends on ADK_KERNEL_IP_NF_IPTABLES
  61. depends on ADK_KERNEL_VERSION_3_10_37 \
  62. || ADK_KERNEL_VERSION_3_11_10 \
  63. || ADK_KERNEL_VERSION_3_12_18 \
  64. || ADK_KERNEL_VERSION_3_13_11 \
  65. || ADK_KERNEL_VERSION_3_14_4 \
  66. || ADK_KERNEL_VERSION_3_15_RC5
  67. default m if ADK_PACKAGE_IPTABLES
  68. default n
  69. help
  70. The Full NAT option allows masquerading, port forwarding and other
  71. forms of full Network Address Port Translation. It is controlled by
  72. the `nat' table in iptables: see the man page for iptables(8).
  73. config ADK_KERNEL_IP_NF_TARGET_MASQUERADE
  74. tristate 'MASQUERADE target support'
  75. depends on ADK_KERNEL_FULL_NAT
  76. default m if ADK_PACKAGE_IPTABLES
  77. default n
  78. help
  79. Masquerading is a special case of NAT: all outgoing connections are
  80. changed to seem to come from a particular interface's address, and
  81. if the interface goes down, those connections are lost. This is
  82. only useful for dialup accounts with dynamic IP address (ie. your IP
  83. address will be different on next dialup).
  84. config ADK_KERNEL_IP_NF_TARGET_REJECT
  85. tristate 'REJECT target support'
  86. depends on ADK_KERNEL_IP_NF_FILTER
  87. default m if ADK_PACKAGE_IPTABLES
  88. default n
  89. help
  90. The REJECT target allows a filtering rule to specify that an ICMP
  91. error should be issued in response to an incoming packet, rather
  92. than silently being dropped.
  93. config ADK_KERNEL_IP_NF_TARGET_ULOG
  94. tristate 'ULOG target support (ipv4 only)'
  95. depends on ADK_KERNEL_IP_NF_FILTER
  96. help
  97. This option enables the old IPv4-only "ipt_ULOG" implementation
  98. which has been obsoleted by the new "nfnetlink_log" code (see
  99. CONFIG_NETFILTER_NETLINK_LOG).
  100. This option adds a `ULOG' target, which allows you to create rules in
  101. any iptables table. The packet is passed to a userspace logging
  102. daemon using netlink multicast sockets; unlike the LOG target
  103. which can only be viewed through syslog.
  104. The appropriate userspace logging daemon (ulogd) may be obtained from
  105. <http://www.gnumonks.org/projects/ulogd/>
  106. config ADK_KERNEL_IP_NF_TARGET_REDIRECT
  107. tristate 'REDIRECT target support'
  108. depends on ADK_KERNEL_FULL_NAT
  109. help
  110. REDIRECT is a special case of NAT: all incoming connections are
  111. mapped onto the incoming interface's address, causing the packets to
  112. come to the local machine instead of passing through. This is
  113. useful for transparent proxies.
  114. config ADK_KERNEL_IP_NF_TARGET_NETMAP
  115. tristate 'NETMAP target support'
  116. depends on ADK_KERNEL_FULL_NAT
  117. help
  118. NETMAP is an implementation of static 1:1 NAT mapping of network
  119. addresses. It maps the network address part, while keeping the host
  120. address part intact. It is similar to Fast NAT, except that
  121. Netfilter's connection tracking doesn't work well with Fast NAT.
  122. config ADK_KERNEL_IP_NF_MANGLE
  123. tristate 'Packet mangling'
  124. depends on ADK_KERNEL_FULL_NAT
  125. help
  126. This option adds a `mangle' table to iptables: see the man page for
  127. iptables(8). This table is used for various packet alterations
  128. which can effect how the packet is routed.
  129. config ADK_KERNEL_IP_NF_TARGET_ECN
  130. tristate 'ECN target support'
  131. depends on ADK_KERNEL_IP_NF_MANGLE
  132. help
  133. This option adds a `ECN' target, which can be used in the iptables mangle
  134. table.
  135. You can use this target to remove the ECN bits from the IPv4 header of
  136. an IP packet. This is particularly useful, if you need to work around
  137. existing ECN blackholes on the internet, but don't want to disable
  138. ECN support in general.