2 # IP netfilter configuration
5 menu "IPv6: Netfilter Configuration (EXPERIMENTAL)"
6 depends on INET && IPV6 && NETFILTER && EXPERIMENTAL
8 #tristate 'Connection tracking (required for masq/NAT)' CONFIG_IP6_NF_CONNTRACK
9 #if [ "$CONFIG_IP6_NF_CONNTRACK" != "n" ]; then
10 # dep_tristate ' FTP protocol support' CONFIG_IP6_NF_FTP $CONFIG_IP6_NF_CONNTRACK
13 tristate "Userspace queueing via NETLINK"
16 This option adds a queue handler to the kernel for IPv6
17 packets which lets us to receive the filtered packets
18 with QUEUE target using libiptc as we can do with
21 (C) Fernando Anton 2001
22 IPv64 Project - Work based in IPv64 draft by Arturo Azcorra.
23 Universidad Carlos III de Madrid
24 Universidad Politecnica de Alcala de Henares
25 email: <fanton@it.uc3m.es>.
27 To compile it as a module, choose M here. If unsure, say N.
29 config IP6_NF_IPTABLES
30 tristate "IP6 tables support (required for filtering/masq/NAT)"
32 ip6tables is a general, extensible packet identification framework.
33 Currently only the packet filtering and packet mangling subsystem
34 for IPv6 use this, but connection tracking is going to follow.
35 Say 'Y' or 'M' here if you want to use either of those.
37 To compile it as a module, choose M here. If unsure, say N.
40 config IP6_NF_MATCH_LIMIT
41 tristate "limit match support"
42 depends on IP6_NF_IPTABLES
44 limit matching allows you to control the rate at which a rule can be
45 matched: mainly useful in combination with the LOG target ("LOG
46 target support", below) and to avoid some Denial of Service attacks.
48 To compile it as a module, choose M here. If unsure, say N.
50 config IP6_NF_MATCH_MAC
51 tristate "MAC address match support"
52 depends on IP6_NF_IPTABLES
54 mac matching allows you to match packets based on the source
55 Ethernet address of the packet.
57 To compile it as a module, choose M here. If unsure, say N.
59 config IP6_NF_MATCH_RT
60 tristate "Routing header match support"
61 depends on IP6_NF_IPTABLES
63 rt matching allows you to match packets based on the routing
66 To compile it as a module, choose M here. If unsure, say N.
68 config IP6_NF_MATCH_OPTS
69 tristate "Hop-by-hop and Dst opts header match support"
70 depends on IP6_NF_IPTABLES
72 This allows one to match packets based on the hop-by-hop
73 and destination options headers of a packet.
75 To compile it as a module, choose M here. If unsure, say N.
77 config IP6_NF_MATCH_FRAG
78 tristate "Fragmentation header match support"
79 depends on IP6_NF_IPTABLES
81 frag matching allows you to match packets based on the fragmentation
84 To compile it as a module, choose M here. If unsure, say N.
86 config IP6_NF_MATCH_HL
87 tristate "HL match support"
88 depends on IP6_NF_IPTABLES
90 HL matching allows you to match packets based on the hop
93 To compile it as a module, choose M here. If unsure, say N.
95 config IP6_NF_MATCH_MULTIPORT
96 tristate "Multiple port match support"
97 depends on IP6_NF_IPTABLES
99 Multiport matching allows you to match TCP or UDP packets based on
100 a series of source or destination ports: normally a rule can only
101 match a single range of ports.
103 To compile it as a module, choose M here. If unsure, say N.
105 config IP6_NF_MATCH_OWNER
106 tristate "Owner match support"
107 depends on IP6_NF_IPTABLES
109 Packet owner matching allows you to match locally-generated packets
110 based on who created them: the user, group, process or session.
112 To compile it as a module, choose M here. If unsure, say N.
114 # dep_tristate ' MAC address match support' CONFIG_IP6_NF_MATCH_MAC $CONFIG_IP6_NF_IPTABLES
115 config IP6_NF_MATCH_MARK
116 tristate "netfilter MARK match support"
117 depends on IP6_NF_IPTABLES
119 Netfilter mark matching allows you to match packets based on the
120 `nfmark' value in the packet. This can be set by the MARK target
123 To compile it as a module, choose M here. If unsure, say N.
125 config IP6_NF_MATCH_IPV6HEADER
126 tristate "IPv6 Extension Headers Match"
127 depends on IP6_NF_IPTABLES
129 This module allows one to match packets based upon
130 the ipv6 extension headers.
132 To compile it as a module, choose M here. If unsure, say N.
134 config IP6_NF_MATCH_AHESP
135 tristate "AH/ESP match support"
136 depends on IP6_NF_IPTABLES
138 This module allows one to match AH and ESP packets.
140 To compile it as a module, choose M here. If unsure, say N.
142 config IP6_NF_MATCH_LENGTH
143 tristate "Packet Length match support"
144 depends on IP6_NF_IPTABLES
146 This option allows you to match the length of a packet against a
147 specific value or range of values.
149 To compile it as a module, choose M here. If unsure, say N.
151 config IP6_NF_MATCH_EUI64
152 tristate "EUI64 address check"
153 depends on IP6_NF_IPTABLES
155 This module performs checking on the IPv6 source address
156 Compares the last 64 bits with the EUI64 (delivered
157 from the MAC address) address
159 To compile it as a module, choose M here. If unsure, say N.
161 config IP6_NF_MATCH_PHYSDEV
162 tristate "Physdev match support"
163 depends on IP6_NF_IPTABLES && BRIDGE_NETFILTER
165 Physdev packet matching matches against the physical bridge ports
166 the IP packet arrived on or will leave by.
168 To compile it as a module, choose M here. If unsure, say N.
170 # dep_tristate ' Multiple port match support' CONFIG_IP6_NF_MATCH_MULTIPORT $CONFIG_IP6_NF_IPTABLES
171 # dep_tristate ' TOS match support' CONFIG_IP6_NF_MATCH_TOS $CONFIG_IP6_NF_IPTABLES
172 # if [ "$CONFIG_IP6_NF_CONNTRACK" != "n" ]; then
173 # dep_tristate ' Connection state match support' CONFIG_IP6_NF_MATCH_STATE $CONFIG_IP6_NF_CONNTRACK $CONFIG_IP6_NF_IPTABLES
175 # if [ "$CONFIG_EXPERIMENTAL" = "y" ]; then
176 # dep_tristate ' Unclean match support (EXPERIMENTAL)' CONFIG_IP6_NF_MATCH_UNCLEAN $CONFIG_IP6_NF_IPTABLES
177 # dep_tristate ' Owner match support (EXPERIMENTAL)' CONFIG_IP6_NF_MATCH_OWNER $CONFIG_IP6_NF_IPTABLES
181 tristate "Packet filtering"
182 depends on IP6_NF_IPTABLES
184 Packet filtering defines a table `filter', which has a series of
185 rules for simple packet filtering at local input, forwarding and
186 local output. See the man page for iptables(8).
188 To compile it as a module, choose M here. If unsure, say N.
190 config IP6_NF_TARGET_LOG
191 tristate "LOG target support"
192 depends on IP6_NF_FILTER
194 This option adds a `LOG' target, which allows you to create rules in
195 any iptables table which records the packet header to the syslog.
197 To compile it as a module, choose M here. If unsure, say N.
199 # if [ "$CONFIG_IP6_NF_FILTER" != "n" ]; then
200 # dep_tristate ' REJECT target support' CONFIG_IP6_NF_TARGET_REJECT $CONFIG_IP6_NF_FILTER
201 # if [ "$CONFIG_EXPERIMENTAL" = "y" ]; then
202 # dep_tristate ' MIRROR target support (EXPERIMENTAL)' CONFIG_IP6_NF_TARGET_MIRROR $CONFIG_IP6_NF_FILTER
206 tristate "Packet mangling"
207 depends on IP6_NF_IPTABLES
209 This option adds a `mangle' table to iptables: see the man page for
210 iptables(8). This table is used for various packet alterations
211 which can effect how the packet is routed.
213 To compile it as a module, choose M here. If unsure, say N.
215 # dep_tristate ' TOS target support' CONFIG_IP6_NF_TARGET_TOS $CONFIG_IP_NF_MANGLE
216 config IP6_NF_TARGET_MARK
217 tristate "MARK target support"
218 depends on IP6_NF_MANGLE
220 This option adds a `MARK' target, which allows you to create rules
221 in the `mangle' table which alter the netfilter mark (nfmark) field
222 associated with the packet packet prior to routing. This can change
223 the routing method (see `Use netfilter MARK value as routing
224 key') and can also be used by other subsystems to change their
227 To compile it as a module, choose M here. If unsure, say N.
229 #dep_tristate ' LOG target support' CONFIG_IP6_NF_TARGET_LOG $CONFIG_IP6_NF_IPTABLES
231 tristate 'raw table support (required for TRACE)'
232 depends on IP6_NF_IPTABLES
234 This option adds a `raw' table to ip6tables. This table is the very
235 first in the netfilter framework and hooks in at the PREROUTING
238 If you want to compile it as a module, say M here and read
239 <file:Documentation/modules.txt>. If unsure, say `N'.