|
@@ -340,6 +340,18 @@ config NETFILTER_XT_TARGET_CONNMARK
|
|
|
<file:Documentation/kbuild/modules.txt>. The module will be called
|
|
|
ipt_CONNMARK.ko. If unsure, say `N'.
|
|
|
|
|
|
+config NETFILTER_XT_TARGET_CONNSECMARK
|
|
|
+ tristate '"CONNSECMARK" target support'
|
|
|
+ depends on NETFILTER_XTABLES && NF_CONNTRACK && NF_CONNTRACK_SECMARK
|
|
|
+ default m if NETFILTER_ADVANCED=n
|
|
|
+ help
|
|
|
+ The CONNSECMARK target copies security markings from packets
|
|
|
+ to connections, and restores security markings from connections
|
|
|
+ to packets (if the packets are not already marked). This would
|
|
|
+ normally be used in conjunction with the SECMARK target.
|
|
|
+
|
|
|
+ To compile it as a module, choose M here. If unsure, say N.
|
|
|
+
|
|
|
config NETFILTER_XT_TARGET_DSCP
|
|
|
tristate '"DSCP" and "TOS" target support'
|
|
|
depends on NETFILTER_XTABLES
|
|
@@ -371,18 +383,6 @@ config NETFILTER_XT_TARGET_MARK
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
-config NETFILTER_XT_TARGET_NFQUEUE
|
|
|
- tristate '"NFQUEUE" target Support'
|
|
|
- depends on NETFILTER_XTABLES
|
|
|
- depends on NETFILTER_ADVANCED
|
|
|
- help
|
|
|
- This target replaced the old obsolete QUEUE target.
|
|
|
-
|
|
|
- As opposed to QUEUE, it supports 65535 different queues,
|
|
|
- not just one.
|
|
|
-
|
|
|
- To compile it as a module, choose M here. If unsure, say N.
|
|
|
-
|
|
|
config NETFILTER_XT_TARGET_NFLOG
|
|
|
tristate '"NFLOG" target support'
|
|
|
depends on NETFILTER_XTABLES
|
|
@@ -395,6 +395,18 @@ config NETFILTER_XT_TARGET_NFLOG
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
+config NETFILTER_XT_TARGET_NFQUEUE
|
|
|
+ tristate '"NFQUEUE" target Support'
|
|
|
+ depends on NETFILTER_XTABLES
|
|
|
+ depends on NETFILTER_ADVANCED
|
|
|
+ help
|
|
|
+ This target replaced the old obsolete QUEUE target.
|
|
|
+
|
|
|
+ As opposed to QUEUE, it supports 65535 different queues,
|
|
|
+ not just one.
|
|
|
+
|
|
|
+ To compile it as a module, choose M here. If unsure, say N.
|
|
|
+
|
|
|
config NETFILTER_XT_TARGET_NOTRACK
|
|
|
tristate '"NOTRACK" target support'
|
|
|
depends on NETFILTER_XTABLES
|
|
@@ -459,18 +471,6 @@ config NETFILTER_XT_TARGET_SECMARK
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
-config NETFILTER_XT_TARGET_CONNSECMARK
|
|
|
- tristate '"CONNSECMARK" target support'
|
|
|
- depends on NETFILTER_XTABLES && NF_CONNTRACK && NF_CONNTRACK_SECMARK
|
|
|
- default m if NETFILTER_ADVANCED=n
|
|
|
- help
|
|
|
- The CONNSECMARK target copies security markings from packets
|
|
|
- to connections, and restores security markings from connections
|
|
|
- to packets (if the packets are not already marked). This would
|
|
|
- normally be used in conjunction with the SECMARK target.
|
|
|
-
|
|
|
- To compile it as a module, choose M here. If unsure, say N.
|
|
|
-
|
|
|
config NETFILTER_XT_TARGET_TCPMSS
|
|
|
tristate '"TCPMSS" target support'
|
|
|
depends on NETFILTER_XTABLES && (IPV6 || IPV6=n)
|
|
@@ -607,6 +607,21 @@ config NETFILTER_XT_MATCH_ESP
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
+config NETFILTER_XT_MATCH_HASHLIMIT
|
|
|
+ tristate '"hashlimit" match support'
|
|
|
+ depends on NETFILTER_XTABLES && (IP6_NF_IPTABLES || IP6_NF_IPTABLES=n)
|
|
|
+ depends on NETFILTER_ADVANCED
|
|
|
+ help
|
|
|
+ This option adds a `hashlimit' match.
|
|
|
+
|
|
|
+ As opposed to `limit', this match dynamically creates a hash table
|
|
|
+ of limit buckets, based on your selection of source/destination
|
|
|
+ addresses and/or ports.
|
|
|
+
|
|
|
+ It enables you to express policies like `10kpps for any given
|
|
|
+ destination address' or `500pps from any given source address'
|
|
|
+ with a single rule.
|
|
|
+
|
|
|
config NETFILTER_XT_MATCH_HELPER
|
|
|
tristate '"helper" match support'
|
|
|
depends on NETFILTER_XTABLES
|
|
@@ -671,6 +686,17 @@ config NETFILTER_XT_MATCH_MARK
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
+config NETFILTER_XT_MATCH_MULTIPORT
|
|
|
+ tristate '"multiport" Multiple port match support'
|
|
|
+ depends on NETFILTER_XTABLES
|
|
|
+ depends on NETFILTER_ADVANCED
|
|
|
+ help
|
|
|
+ Multiport matching allows you to match TCP or UDP packets based on
|
|
|
+ a series of source or destination ports: normally a rule can only
|
|
|
+ match a single range of ports.
|
|
|
+
|
|
|
+ To compile it as a module, choose M here. If unsure, say N.
|
|
|
+
|
|
|
config NETFILTER_XT_MATCH_OWNER
|
|
|
tristate '"owner" match support'
|
|
|
depends on NETFILTER_XTABLES
|
|
@@ -691,17 +717,6 @@ config NETFILTER_XT_MATCH_POLICY
|
|
|
|
|
|
To compile it as a module, choose M here. If unsure, say N.
|
|
|
|
|
|
-config NETFILTER_XT_MATCH_MULTIPORT
|
|
|
- tristate '"multiport" Multiple port match support'
|
|
|
- depends on NETFILTER_XTABLES
|
|
|
- depends on NETFILTER_ADVANCED
|
|
|
- help
|
|
|
- Multiport matching allows you to match TCP or UDP packets based on
|
|
|
- a series of source or destination ports: normally a rule can only
|
|
|
- match a single range of ports.
|
|
|
-
|
|
|
- To compile it as a module, choose M here. If unsure, say N.
|
|
|
-
|
|
|
config NETFILTER_XT_MATCH_PHYSDEV
|
|
|
tristate '"physdev" match support'
|
|
|
depends on NETFILTER_XTABLES && BRIDGE && BRIDGE_NETFILTER
|
|
@@ -884,20 +899,5 @@ config NETFILTER_XT_MATCH_U32
|
|
|
|
|
|
Details and examples are in the kernel module source.
|
|
|
|
|
|
-config NETFILTER_XT_MATCH_HASHLIMIT
|
|
|
- tristate '"hashlimit" match support'
|
|
|
- depends on NETFILTER_XTABLES && (IP6_NF_IPTABLES || IP6_NF_IPTABLES=n)
|
|
|
- depends on NETFILTER_ADVANCED
|
|
|
- help
|
|
|
- This option adds a `hashlimit' match.
|
|
|
-
|
|
|
- As opposed to `limit', this match dynamically creates a hash table
|
|
|
- of limit buckets, based on your selection of source/destination
|
|
|
- addresses and/or ports.
|
|
|
-
|
|
|
- It enables you to express policies like `10kpps for any given
|
|
|
- destination address' or `500pps from any given source address'
|
|
|
- with a single rule.
|
|
|
-
|
|
|
endmenu
|
|
|
|