1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
|
config ADK_KERNEL_NF_CONNTRACK_IPV4
prompt 'IPv4 connection tracking support (required for NAT)'
tristate
select ADK_KERNEL_NF_CONNTRACK
select ADK_KERNEL_NETFILTER_XT_MATCH_CONNTRACK
default m if ADK_PACKAGE_IPTABLES
default n
help
Connection tracking keeps a record of what packets have passed
through your machine, in order to figure out how they are related
into connections.
config ADK_KERNEL_IP_NF_CT_ACCT
bool 'Connection tracking flow accounting'
depends on ADK_KERNEL_NF_CONNTRACK
help
If this option is enabled, the connection tracking code will
keep per-flow packet and byte counters.
Those counters can be used for flow-based accounting or the
`connbytes' match.
config ADK_KERNEL_IP_NF_IPTABLES
tristate 'IP tables support (required for filtering/masq/NAT)'
select ADK_KERNEL_NETFILTER_XTABLES
default m if ADK_PACKAGE_IPTABLES
default n
help
iptables is a general, extensible packet identification framework.
The packet filtering and full NAT (masquerading, port forwarding,
etc) subsystems now use this: say `Y' or `M' here if you want to use
either of those.
config ADK_KERNEL_IP_NF_FILTER
tristate 'Packet Filtering'
depends on ADK_KERNEL_IP_NF_IPTABLES
default m if ADK_PACKAGE_IPTABLES
default n
help
Packet filtering defines a table `filter', which has a series of
rules for simple packet filtering at local input, forwarding and
local output. See the man page for iptables(8).
config ADK_KERNEL_NF_NAT
tristate
default n
help
The Full NAT option allows masquerading, port forwarding and other
forms of full Network Address Port Translation. It is controlled by
the `nat' table in iptables: see the man page for iptables(8).
config ADK_KERNEL_NF_NAT_IPV4
tristate 'Full NAT'
select ADK_KERNEL_NF_NAT
depends on ADK_KERNEL_IP_NF_IPTABLES
default m if ADK_PACKAGE_IPTABLES
default n
help
The Full NAT option allows masquerading, port forwarding and other
forms of full Network Address Port Translation. It is controlled by
the `nat' table in iptables: see the man page for iptables(8).
config ADK_KERNEL_IP_NF_TARGET_MASQUERADE
tristate 'MASQUERADE target support'
depends on ADK_KERNEL_NF_NAT
default m if ADK_PACKAGE_IPTABLES
default n
help
Masquerading is a special case of NAT: all outgoing connections are
changed to seem to come from a particular interface's address, and
if the interface goes down, those connections are lost. This is
only useful for dialup accounts with dynamic IP address (ie. your IP
address will be different on next dialup).
config ADK_KERNEL_IP_NF_TARGET_REJECT
tristate 'REJECT target support'
depends on ADK_KERNEL_IP_NF_FILTER
default m if ADK_PACKAGE_IPTABLES
default n
help
The REJECT target allows a filtering rule to specify that an ICMP
error should be issued in response to an incoming packet, rather
than silently being dropped.
config ADK_KERNEL_IP_NF_TARGET_ULOG
tristate 'ULOG target support (ipv4 only)'
depends on ADK_KERNEL_IP_NF_FILTER
help
This option enables the old IPv4-only "ipt_ULOG" implementation
which has been obsoleted by the new "nfnetlink_log" code (see
CONFIG_NETFILTER_NETLINK_LOG).
This option adds a `ULOG' target, which allows you to create rules in
any iptables table. The packet is passed to a userspace logging
daemon using netlink multicast sockets; unlike the LOG target
which can only be viewed through syslog.
The appropriate userspace logging daemon (ulogd) may be obtained from
<http://www.gnumonks.org/projects/ulogd/>
config ADK_KERNEL_IP_NF_TARGET_REDIRECT
tristate 'REDIRECT target support'
depends on ADK_KERNEL_NF_NAT
help
REDIRECT is a special case of NAT: all incoming connections are
mapped onto the incoming interface's address, causing the packets to
come to the local machine instead of passing through. This is
useful for transparent proxies.
config ADK_KERNEL_IP_NF_TARGET_NETMAP
tristate 'NETMAP target support'
depends on ADK_KERNEL_NF_NAT
help
NETMAP is an implementation of static 1:1 NAT mapping of network
addresses. It maps the network address part, while keeping the host
address part intact. It is similar to Fast NAT, except that
Netfilter's connection tracking doesn't work well with Fast NAT.
config ADK_KERNEL_IP_NF_MANGLE
tristate 'Packet mangling'
help
This option adds a `mangle' table to iptables: see the man page for
iptables(8). This table is used for various packet alterations
which can effect how the packet is routed.
config ADK_KERNEL_IP_NF_TARGET_ECN
tristate 'ECN target support'
depends on ADK_KERNEL_IP_NF_MANGLE
help
This option adds a `ECN' target, which can be used in the iptables mangle
table.
You can use this target to remove the ECN bits from the IPv4 header of
an IP packet. This is particularly useful, if you need to work around
existing ECN blackholes on the internet, but don't want to disable
ECN support in general.
|