2 # IP netfilter configuration
5 menu "IPv6: Netfilter Configuration"
6 depends on INET && IPV6 && NETFILTER
12 config NF_CONNTRACK_IPV6
13 tristate "IPv6 connection tracking support"
14 depends on INET && IPV6 && NF_CONNTRACK
15 default m if NETFILTER_ADVANCED=n
18 Connection tracking keeps a record of what packets have passed
19 through your machine, in order to figure out how they are related
22 This is IPv6 support on Layer 3 independent connection tracking.
23 Layer 3 independent connection tracking is experimental scheme
24 which generalize ip_conntrack to support other layer 3 protocols.
26 To compile it as a module, choose M here. If unsure, say N.
29 tristate "IPv6 socket lookup support"
31 This option enables the IPv6 socket lookup infrastructure. This
32 is used by the ip6tables socket match.
37 tristate "IPv6 nf_tables support"
39 This option enables the IPv6 support for nf_tables.
43 config NFT_CHAIN_ROUTE_IPV6
44 tristate "IPv6 nf_tables route chain support"
46 This option enables the "route" chain for IPv6 in nf_tables. This
47 chain type is used to force packet re-routing after mangling header
48 fields such as the source, destination, flowlabel, hop-limit and
51 config NFT_REJECT_IPV6
57 tristate "IPv6 nf_tables packet duplication support"
58 depends on !NF_CONNTRACK || NF_CONNTRACK
61 This module enables IPv6 packet duplication support for nf_tables.
64 tristate "nf_tables fib / ipv6 route lookup support"
67 This module enables IPv6 FIB lookups, e.g. for reverse path filtering.
68 It also allows query of the FIB for the route type, e.g. local, unicast,
69 multicast or blackhole.
71 endif # NF_TABLES_IPV6
75 tristate "Netfilter IPv6 packet duplication to alternate destination"
76 depends on !NF_CONNTRACK || NF_CONNTRACK
78 This option enables the nf_dup_ipv6 core, which duplicates an IPv6
79 packet to be rerouted to another destination.
82 tristate "IPv6 packet rejection"
83 default m if NETFILTER_ADVANCED=n
86 tristate "IPv6 packet logging"
87 default m if NETFILTER_ADVANCED=n
92 depends on NF_CONNTRACK_IPV6
93 depends on NETFILTER_ADVANCED
96 The IPv6 NAT option allows masquerading, port forwarding and other
97 forms of full Network Address Port Translation. This can be
98 controlled by iptables or nft.
102 config NFT_CHAIN_NAT_IPV6
103 depends on NF_TABLES_IPV6
104 tristate "IPv6 nf_tables nat chain support"
106 This option enables the "nat" chain for IPv6 in nf_tables. This
107 chain type is used to perform Network Address Translation (NAT)
108 packet transformations such as the source, destination address and
109 source and destination ports.
111 config NF_NAT_MASQUERADE_IPV6
112 tristate "IPv6 masquerade support"
114 This is the kernel functionality to provide NAT in the masquerade
115 flavour (automatic source address selection) for IPv6.
118 tristate "IPv6 masquerade support for nf_tables"
119 depends on NF_TABLES_IPV6
121 select NF_NAT_MASQUERADE_IPV6
123 This is the expression that provides IPv4 masquerading support for
126 config NFT_REDIR_IPV6
127 tristate "IPv6 redirect support for nf_tables"
128 depends on NF_TABLES_IPV6
130 select NF_NAT_REDIRECT
132 This is the expression that provides IPv4 redirect support for
137 config IP6_NF_IPTABLES
138 tristate "IP6 tables support (required for filtering)"
139 depends on INET && IPV6
140 select NETFILTER_XTABLES
141 default m if NETFILTER_ADVANCED=n
143 ip6tables is a general, extensible packet identification framework.
144 Currently only the packet filtering and packet mangling subsystem
145 for IPv6 use this, but connection tracking is going to follow.
146 Say 'Y' or 'M' here if you want to use either of those.
148 To compile it as a module, choose M here. If unsure, say N.
152 # The simple matches.
153 config IP6_NF_MATCH_AH
154 tristate '"ah" match support'
155 depends on NETFILTER_ADVANCED
157 This module allows one to match AH packets.
159 To compile it as a module, choose M here. If unsure, say N.
161 config IP6_NF_MATCH_EUI64
162 tristate '"eui64" address check'
163 depends on NETFILTER_ADVANCED
165 This module performs checking on the IPv6 source address
166 Compares the last 64 bits with the EUI64 (delivered
167 from the MAC address) address
169 To compile it as a module, choose M here. If unsure, say N.
171 config IP6_NF_MATCH_FRAG
172 tristate '"frag" Fragmentation header match support'
173 depends on NETFILTER_ADVANCED
175 frag matching allows you to match packets based on the fragmentation
176 header of the packet.
178 To compile it as a module, choose M here. If unsure, say N.
180 config IP6_NF_MATCH_OPTS
181 tristate '"hbh" hop-by-hop and "dst" opts header match support'
182 depends on NETFILTER_ADVANCED
184 This allows one to match packets based on the hop-by-hop
185 and destination options headers of a packet.
187 To compile it as a module, choose M here. If unsure, say N.
189 config IP6_NF_MATCH_HL
190 tristate '"hl" hoplimit match support'
191 depends on NETFILTER_ADVANCED
192 select NETFILTER_XT_MATCH_HL
194 This is a backwards-compat option for the user's convenience
195 (e.g. when running oldconfig). It selects
196 CONFIG_NETFILTER_XT_MATCH_HL.
198 config IP6_NF_MATCH_IPV6HEADER
199 tristate '"ipv6header" IPv6 Extension Headers Match'
200 default m if NETFILTER_ADVANCED=n
202 This module allows one to match packets based upon
203 the ipv6 extension headers.
205 To compile it as a module, choose M here. If unsure, say N.
207 config IP6_NF_MATCH_MH
208 tristate '"mh" match support'
209 depends on NETFILTER_ADVANCED
211 This module allows one to match MH packets.
213 To compile it as a module, choose M here. If unsure, say N.
215 config IP6_NF_MATCH_RPFILTER
216 tristate '"rpfilter" reverse path filter match support'
217 depends on NETFILTER_ADVANCED
218 depends on IP6_NF_MANGLE || IP6_NF_RAW
220 This option allows you to match packets whose replies would
221 go out via the interface the packet came in.
223 To compile it as a module, choose M here. If unsure, say N.
224 The module will be called ip6t_rpfilter.
226 config IP6_NF_MATCH_RT
227 tristate '"rt" Routing header match support'
228 depends on NETFILTER_ADVANCED
230 rt matching allows you to match packets based on the routing
231 header of the packet.
233 To compile it as a module, choose M here. If unsure, say N.
236 config IP6_NF_TARGET_HL
237 tristate '"HL" hoplimit target support'
238 depends on NETFILTER_ADVANCED && IP6_NF_MANGLE
239 select NETFILTER_XT_TARGET_HL
241 This is a backwards-compatible option for the user's convenience
242 (e.g. when running oldconfig). It selects
243 CONFIG_NETFILTER_XT_TARGET_HL.
246 tristate "Packet filtering"
247 default m if NETFILTER_ADVANCED=n
249 Packet filtering defines a table `filter', which has a series of
250 rules for simple packet filtering at local input, forwarding and
251 local output. See the man page for iptables(8).
253 To compile it as a module, choose M here. If unsure, say N.
255 config IP6_NF_TARGET_REJECT
256 tristate "REJECT target support"
257 depends on IP6_NF_FILTER
258 select NF_REJECT_IPV6
259 default m if NETFILTER_ADVANCED=n
261 The REJECT target allows a filtering rule to specify that an ICMPv6
262 error should be issued in response to an incoming packet, rather
263 than silently being dropped.
265 To compile it as a module, choose M here. If unsure, say N.
267 config IP6_NF_TARGET_SYNPROXY
268 tristate "SYNPROXY target support"
269 depends on NF_CONNTRACK && NETFILTER_ADVANCED
270 select NETFILTER_SYNPROXY
273 The SYNPROXY target allows you to intercept TCP connections and
274 establish them using syncookies before they are passed on to the
275 server. This allows to avoid conntrack and server resource usage
276 during SYN-flood attacks.
278 To compile it as a module, choose M here. If unsure, say N.
281 tristate "Packet mangling"
282 default m if NETFILTER_ADVANCED=n
284 This option adds a `mangle' table to iptables: see the man page for
285 iptables(8). This table is used for various packet alterations
286 which can effect how the packet is routed.
288 To compile it as a module, choose M here. If unsure, say N.
291 tristate 'raw table support (required for TRACE)'
293 This option adds a `raw' table to ip6tables. This table is the very
294 first in the netfilter framework and hooks in at the PREROUTING
297 If you want to compile it as a module, say M here and read
298 <file:Documentation/kbuild/modules.txt>. If unsure, say `N'.
300 # security table for MAC policy
301 config IP6_NF_SECURITY
302 tristate "Security table"
304 depends on NETFILTER_ADVANCED
306 This option adds a `security' table to iptables, for use
307 with Mandatory Access Control (MAC) policy.
312 tristate "ip6tables NAT support"
313 depends on NF_CONNTRACK_IPV6
314 depends on NETFILTER_ADVANCED
317 select NETFILTER_XT_NAT
319 This enables the `nat' table in ip6tables. This allows masquerading,
320 port forwarding and other forms of full Network Address Port
323 To compile it as a module, choose M here. If unsure, say N.
327 config IP6_NF_TARGET_MASQUERADE
328 tristate "MASQUERADE target support"
329 select NF_NAT_MASQUERADE_IPV6
331 Masquerading is a special case of NAT: all outgoing connections are
332 changed to seem to come from a particular interface's address, and
333 if the interface goes down, those connections are lost. This is
334 only useful for dialup accounts with dynamic IP address (ie. your IP
335 address will be different on next dialup).
337 To compile it as a module, choose M here. If unsure, say N.
339 config IP6_NF_TARGET_NPT
340 tristate "NPT (Network Prefix translation) target support"
342 This option adds the `SNPT' and `DNPT' target, which perform
343 stateless IPv6-to-IPv6 Network Prefix Translation per RFC 6296.
345 To compile it as a module, choose M here. If unsure, say N.
349 endif # IP6_NF_IPTABLES