2 # IP netfilter configuration
5 menu "IPv6: Netfilter Configuration"
6 depends on INET && IPV6 && NETFILTER
8 #tristate 'Connection tracking (required for masq/NAT)' CONFIG_IP6_NF_CONNTRACK
9 #if [ "$CONFIG_IP6_NF_CONNTRACK" != "n" ]; then
10 # dep_tristate ' FTP protocol support' CONFIG_IP6_NF_FTP $CONFIG_IP6_NF_CONNTRACK
13 tristate "Userspace queueing via NETLINK"
16 This option adds a queue handler to the kernel for IPv6
17 packets which lets us to receive the filtered packets
18 with QUEUE target using libiptc as we can do with
21 (C) Fernando Anton 2001
22 IPv64 Project - Work based in IPv64 draft by Arturo Azcorra.
23 Universidad Carlos III de Madrid
24 Universidad Politecnica de Alcala de Henares
25 email: <fanton@it.uc3m.es>.
27 To compile it as a module, choose M here. If unsure, say N.
29 config IP6_NF_IPTABLES
30 tristate "IP6 tables support (required for filtering/masq/NAT)"
32 ip6tables is a general, extensible packet identification framework.
33 Currently only the packet filtering and packet mangling subsystem
34 for IPv6 use this, but connection tracking is going to follow.
35 Say 'Y' or 'M' here if you want to use either of those.
37 To compile it as a module, choose M here. If unsure, say N.
40 config IP6_NF_MATCH_LIMIT
41 tristate "limit match support"
42 depends on IP6_NF_IPTABLES
44 limit matching allows you to control the rate at which a rule can be
45 matched: mainly useful in combination with the LOG target ("LOG
46 target support", below) and to avoid some Denial of Service attacks.
48 To compile it as a module, choose M here. If unsure, say N.
50 config IP6_NF_MATCH_MAC
51 tristate "MAC address match support"
52 depends on IP6_NF_IPTABLES
54 mac matching allows you to match packets based on the source
55 Ethernet address of the packet.
57 To compile it as a module, choose M here. If unsure, say N.
59 config IP6_NF_MATCH_RT
60 tristate "Routing header match support"
61 depends on IP6_NF_IPTABLES
63 rt matching allows you to match packets based on the routing
66 To compile it as a module, choose M here. If unsure, say N.
68 config IP6_NF_MATCH_OPTS
69 tristate "Hop-by-hop and Dst opts header match support"
70 depends on IP6_NF_IPTABLES
72 This allows one to match packets based on the hop-by-hop
73 and destination options headers of a packet.
75 To compile it as a module, choose M here. If unsure, say N.
77 config IP6_NF_MATCH_FRAG
78 tristate "Fragmentation header match support"
79 depends on IP6_NF_IPTABLES
81 frag matching allows you to match packets based on the fragmentation
84 To compile it as a module, choose M here. If unsure, say N.
86 config IP6_NF_MATCH_HL
87 tristate "HL match support"
88 depends on IP6_NF_IPTABLES
90 HL matching allows you to match packets based on the hop
93 To compile it as a module, choose M here. If unsure, say N.
95 config IP6_NF_MATCH_MULTIPORT
96 tristate "Multiple port match support"
97 depends on IP6_NF_IPTABLES
99 Multiport matching allows you to match TCP or UDP packets based on
100 a series of source or destination ports: normally a rule can only
101 match a single range of ports.
103 To compile it as a module, choose M here. If unsure, say N.
105 config IP6_NF_MATCH_OWNER
106 tristate "Owner match support"
107 depends on IP6_NF_IPTABLES
109 Packet owner matching allows you to match locally-generated packets
110 based on who created them: the user, group, process or session.
112 To compile it as a module, choose M here. If unsure, say N.
114 # dep_tristate ' MAC address match support' CONFIG_IP6_NF_MATCH_MAC $CONFIG_IP6_NF_IPTABLES
115 config IP6_NF_MATCH_MARK
116 tristate "netfilter MARK match support"
117 depends on IP6_NF_IPTABLES
119 Netfilter mark matching allows you to match packets based on the
120 `nfmark' value in the packet. This can be set by the MARK target
123 To compile it as a module, choose M here. If unsure, say N.
125 config IP6_NF_MATCH_IPV6HEADER
126 tristate "IPv6 Extension Headers Match"
127 depends on IP6_NF_IPTABLES
129 This module allows one to match packets based upon
130 the ipv6 extension headers.
132 To compile it as a module, choose M here. If unsure, say N.
134 config IP6_NF_MATCH_AHESP
135 tristate "AH/ESP match support"
136 depends on IP6_NF_IPTABLES
138 This module allows one to match AH and ESP packets.
140 To compile it as a module, choose M here. If unsure, say N.
142 config IP6_NF_MATCH_LENGTH
143 tristate "Packet Length match support"
144 depends on IP6_NF_IPTABLES
146 This option allows you to match the length of a packet against a
147 specific value or range of values.
149 To compile it as a module, choose M here. If unsure, say N.
151 config IP6_NF_MATCH_EUI64
152 tristate "EUI64 address check"
153 depends on IP6_NF_IPTABLES
155 This module performs checking on the IPv6 source address
156 Compares the last 64 bits with the EUI64 (delivered
157 from the MAC address) address
159 To compile it as a module, choose M here. If unsure, say N.
161 # dep_tristate ' Multiple port match support' CONFIG_IP6_NF_MATCH_MULTIPORT $CONFIG_IP6_NF_IPTABLES
162 # dep_tristate ' TOS match support' CONFIG_IP6_NF_MATCH_TOS $CONFIG_IP6_NF_IPTABLES
163 # if [ "$CONFIG_IP6_NF_CONNTRACK" != "n" ]; then
164 # dep_tristate ' Connection state match support' CONFIG_IP6_NF_MATCH_STATE $CONFIG_IP6_NF_CONNTRACK $CONFIG_IP6_NF_IPTABLES
166 # if [ "$CONFIG_EXPERIMENTAL" = "y" ]; then
167 # dep_tristate ' Unclean match support (EXPERIMENTAL)' CONFIG_IP6_NF_MATCH_UNCLEAN $CONFIG_IP6_NF_IPTABLES
168 # dep_tristate ' Owner match support (EXPERIMENTAL)' CONFIG_IP6_NF_MATCH_OWNER $CONFIG_IP6_NF_IPTABLES
172 tristate "Packet filtering"
173 depends on IP6_NF_IPTABLES
175 Packet filtering defines a table `filter', which has a series of
176 rules for simple packet filtering at local input, forwarding and
177 local output. See the man page for iptables(8).
179 To compile it as a module, choose M here. If unsure, say N.
181 config IP6_NF_TARGET_LOG
182 tristate "LOG target support"
183 depends on IP6_NF_FILTER
185 This option adds a `LOG' target, which allows you to create rules in
186 any iptables table which records the packet header to the syslog.
188 To compile it as a module, choose M here. If unsure, say N.
190 # if [ "$CONFIG_IP6_NF_FILTER" != "n" ]; then
191 # dep_tristate ' REJECT target support' CONFIG_IP6_NF_TARGET_REJECT $CONFIG_IP6_NF_FILTER
192 # if [ "$CONFIG_EXPERIMENTAL" = "y" ]; then
193 # dep_tristate ' MIRROR target support (EXPERIMENTAL)' CONFIG_IP6_NF_TARGET_MIRROR $CONFIG_IP6_NF_FILTER
197 tristate "Packet mangling"
198 depends on IP6_NF_IPTABLES
200 This option adds a `mangle' table to iptables: see the man page for
201 iptables(8). This table is used for various packet alterations
202 which can effect how the packet is routed.
204 To compile it as a module, choose M here. If unsure, say N.
206 # dep_tristate ' TOS target support' CONFIG_IP6_NF_TARGET_TOS $CONFIG_IP_NF_MANGLE
207 config IP6_NF_TARGET_MARK
208 tristate "MARK target support"
209 depends on IP6_NF_MANGLE
211 This option adds a `MARK' target, which allows you to create rules
212 in the `mangle' table which alter the netfilter mark (nfmark) field
213 associated with the packet packet prior to routing. This can change
214 the routing method (see `Use netfilter MARK value as routing
215 key') and can also be used by other subsystems to change their
218 To compile it as a module, choose M here. If unsure, say N.
220 #dep_tristate ' LOG target support' CONFIG_IP6_NF_TARGET_LOG $CONFIG_IP6_NF_IPTABLES
222 tristate 'raw table support (required for TRACE)'
223 depends on IP6_NF_IPTABLES
225 This option adds a `raw' table to ip6tables. This table is the very
226 first in the netfilter framework and hooks in at the PREROUTING
229 If you want to compile it as a module, say M here and read
230 <file:Documentation/modules.txt>. If unsure, say `N'.