Config.in.netfilter.ip4 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136
  1. config ADK_KERNEL_NF_CONNTRACK_IPV4
  2. prompt 'IPv4 connection tracking support (required for NAT)'
  3. tristate
  4. select ADK_KERNEL_NF_CONNTRACK
  5. select ADK_KERNEL_NETFILTER_XT_MATCH_CONNTRACK
  6. default m if ADK_PACKAGE_IPTABLES
  7. default n
  8. help
  9. Connection tracking keeps a record of what packets have passed
  10. through your machine, in order to figure out how they are related
  11. into connections.
  12. config ADK_KERNEL_IP_NF_CT_ACCT
  13. bool 'Connection tracking flow accounting'
  14. depends on ADK_KERNEL_NF_CONNTRACK
  15. help
  16. If this option is enabled, the connection tracking code will
  17. keep per-flow packet and byte counters.
  18. Those counters can be used for flow-based accounting or the
  19. `connbytes' match.
  20. config ADK_KERNEL_IP_NF_IPTABLES
  21. tristate 'IP tables support (required for filtering/masq/NAT)'
  22. select ADK_KERNEL_NETFILTER_XTABLES
  23. default m if ADK_PACKAGE_IPTABLES
  24. default n
  25. help
  26. iptables is a general, extensible packet identification framework.
  27. The packet filtering and full NAT (masquerading, port forwarding,
  28. etc) subsystems now use this: say `Y' or `M' here if you want to use
  29. either of those.
  30. config ADK_KERNEL_IP_NF_FILTER
  31. tristate 'Packet Filtering'
  32. depends on ADK_KERNEL_IP_NF_IPTABLES
  33. default m if ADK_PACKAGE_IPTABLES
  34. default n
  35. help
  36. Packet filtering defines a table `filter', which has a series of
  37. rules for simple packet filtering at local input, forwarding and
  38. local output. See the man page for iptables(8).
  39. config ADK_KERNEL_NF_NAT
  40. tristate
  41. default n
  42. help
  43. The Full NAT option allows masquerading, port forwarding and other
  44. forms of full Network Address Port Translation. It is controlled by
  45. the `nat' table in iptables: see the man page for iptables(8).
  46. config ADK_KERNEL_NF_NAT_IPV4
  47. tristate 'Full NAT'
  48. select ADK_KERNEL_NF_NAT
  49. depends on ADK_KERNEL_IP_NF_IPTABLES
  50. default m if ADK_PACKAGE_IPTABLES
  51. default n
  52. help
  53. The Full NAT option allows masquerading, port forwarding and other
  54. forms of full Network Address Port Translation. It is controlled by
  55. the `nat' table in iptables: see the man page for iptables(8).
  56. config ADK_KERNEL_IP_NF_TARGET_MASQUERADE
  57. tristate 'MASQUERADE target support'
  58. depends on ADK_KERNEL_NF_NAT
  59. default m if ADK_PACKAGE_IPTABLES
  60. default n
  61. help
  62. Masquerading is a special case of NAT: all outgoing connections are
  63. changed to seem to come from a particular interface's address, and
  64. if the interface goes down, those connections are lost. This is
  65. only useful for dialup accounts with dynamic IP address (ie. your IP
  66. address will be different on next dialup).
  67. config ADK_KERNEL_IP_NF_TARGET_REJECT
  68. tristate 'REJECT target support'
  69. depends on ADK_KERNEL_IP_NF_FILTER
  70. default m if ADK_PACKAGE_IPTABLES
  71. default n
  72. help
  73. The REJECT target allows a filtering rule to specify that an ICMP
  74. error should be issued in response to an incoming packet, rather
  75. than silently being dropped.
  76. config ADK_KERNEL_IP_NF_TARGET_ULOG
  77. tristate 'ULOG target support (ipv4 only)'
  78. depends on ADK_KERNEL_IP_NF_FILTER
  79. help
  80. This option enables the old IPv4-only "ipt_ULOG" implementation
  81. which has been obsoleted by the new "nfnetlink_log" code (see
  82. CONFIG_NETFILTER_NETLINK_LOG).
  83. This option adds a `ULOG' target, which allows you to create rules in
  84. any iptables table. The packet is passed to a userspace logging
  85. daemon using netlink multicast sockets; unlike the LOG target
  86. which can only be viewed through syslog.
  87. The appropriate userspace logging daemon (ulogd) may be obtained from
  88. <http://www.gnumonks.org/projects/ulogd/>
  89. config ADK_KERNEL_IP_NF_TARGET_REDIRECT
  90. tristate 'REDIRECT target support'
  91. depends on ADK_KERNEL_NF_NAT
  92. help
  93. REDIRECT is a special case of NAT: all incoming connections are
  94. mapped onto the incoming interface's address, causing the packets to
  95. come to the local machine instead of passing through. This is
  96. useful for transparent proxies.
  97. config ADK_KERNEL_IP_NF_TARGET_NETMAP
  98. tristate 'NETMAP target support'
  99. depends on ADK_KERNEL_NF_NAT
  100. help
  101. NETMAP is an implementation of static 1:1 NAT mapping of network
  102. addresses. It maps the network address part, while keeping the host
  103. address part intact. It is similar to Fast NAT, except that
  104. Netfilter's connection tracking doesn't work well with Fast NAT.
  105. config ADK_KERNEL_IP_NF_MANGLE
  106. tristate 'Packet mangling'
  107. help
  108. This option adds a `mangle' table to iptables: see the man page for
  109. iptables(8). This table is used for various packet alterations
  110. which can effect how the packet is routed.
  111. config ADK_KERNEL_IP_NF_TARGET_ECN
  112. tristate 'ECN target support'
  113. depends on ADK_KERNEL_IP_NF_MANGLE
  114. help
  115. This option adds a `ECN' target, which can be used in the iptables mangle
  116. table.
  117. You can use this target to remove the ECN bits from the IPv4 header of
  118. an IP packet. This is particularly useful, if you need to work around
  119. existing ECN blackholes on the internet, but don't want to disable
  120. ECN support in general.