2 # IP netfilter configuration
5 menu "IP: Netfilter Configuration"
6 depends on INET && NETFILTER
8 # connection tracking, helpers and protocols
10 tristate "Connection tracking (required for masq/NAT)"
12 Connection tracking keeps a record of what packets have passed
13 through your machine, in order to figure out how they are related
16 This is required to do Masquerading or other kinds of Network
17 Address Translation (except for Fast NAT). It can also be used to
18 enhance packet filtering (see `Connection state match support'
21 To compile it as a module, choose M here. If unsure, say N.
24 bool "Connection tracking flow accounting"
25 depends on IP_NF_CONNTRACK
27 If this option is enabled, the connection tracking code will
28 keep per-flow packet and byte counters.
30 Those counters can be used for flow-based accounting or the
35 config IP_NF_CONNTRACK_MARK
36 bool 'Connection mark tracking support'
37 depends on IP_NF_CONNTRACK
39 This option enables support for connection marks, used by the
40 `CONNMARK' target and `connmark' match. Similar to the mark value
41 of packets, but this mark value is kept in the conntrack session
42 instead of the individual packets.
44 config IP_NF_CONNTRACK_EVENTS
45 bool "Connection tracking events"
46 depends on IP_NF_CONNTRACK
48 If this option is enabled, the connection tracking code will
49 provide a notifier chain that can be used by other kernel code
50 to get notified about changes in the connection tracking state.
54 config IP_NF_CT_PROTO_SCTP
55 tristate 'SCTP protocol connection tracking support (EXPERIMENTAL)'
56 depends on IP_NF_CONNTRACK && EXPERIMENTAL
58 With this option enabled, the connection tracking code will
59 be able to do state tracking on SCTP connections.
61 If you want to compile it as a module, say M here and read
62 <file:Documentation/modules.txt>. If unsure, say `N'.
65 tristate "FTP protocol support"
66 depends on IP_NF_CONNTRACK
68 Tracking FTP connections is problematic: special helpers are
69 required for tracking them, and doing masquerading and other forms
70 of Network Address Translation on them.
72 To compile it as a module, choose M here. If unsure, say Y.
75 tristate "IRC protocol support"
76 depends on IP_NF_CONNTRACK
78 There is a commonly-used extension to IRC called
79 Direct Client-to-Client Protocol (DCC). This enables users to send
80 files to each other, and also chat to each other without the need
81 of a server. DCC Sending is used anywhere you send files over IRC,
82 and DCC Chat is most commonly used by Eggdrop bots. If you are
83 using NAT, this extension will enable you to send files and initiate
84 chats. Note that you do NOT need this extension to get files or
85 have others initiate chats, or everything else in IRC.
87 To compile it as a module, choose M here. If unsure, say Y.
89 config IP_NF_NETBIOS_NS
90 tristate "NetBIOS name service protocol support (EXPERIMENTAL)"
91 depends on IP_NF_CONNTRACK && EXPERIMENTAL
93 NetBIOS name service requests are sent as broadcast messages from an
94 unprivileged port and responded to with unicast messages to the
95 same port. This make them hard to firewall properly because connection
96 tracking doesn't deal with broadcasts. This helper tracks locally
97 originating NetBIOS name service requests and the corresponding
98 responses. It relies on correct IP address configuration, specifically
99 netmask and broadcast address. When properly configured, the output
100 of "ip address show" should look similar to this:
102 $ ip -4 address show eth0
103 4: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
104 inet 172.16.2.252/24 brd 172.16.2.255 scope global eth0
106 To compile it as a module, choose M here. If unsure, say N.
109 tristate "TFTP protocol support"
110 depends on IP_NF_CONNTRACK
112 TFTP connection tracking helper, this is required depending
113 on how restrictive your ruleset is.
114 If you are using a tftp client behind -j SNAT or -j MASQUERADING
117 To compile it as a module, choose M here. If unsure, say Y.
120 tristate "Amanda backup protocol support"
121 depends on IP_NF_CONNTRACK
123 If you are running the Amanda backup package <http://www.amanda.org/>
124 on this machine or machines that will be MASQUERADED through this
125 machine, then you may want to enable this feature. This allows the
126 connection tracking and natting code to allow the sub-channels that
127 Amanda requires for communication of the backup data, messages and
130 To compile it as a module, choose M here. If unsure, say Y.
133 tristate "IP Userspace queueing via NETLINK (OBSOLETE)"
135 Netfilter has the ability to queue packets to user space: the
136 netlink device can be used to access them using this driver.
138 This option enables the old IPv4-only "ip_queue" implementation
139 which has been obsoleted by the new "nfnetlink_queue" code (see
140 CONFIG_NETFILTER_NETLINK_QUEUE).
142 To compile it as a module, choose M here. If unsure, say N.
144 config IP_NF_IPTABLES
145 tristate "IP tables support (required for filtering/masq/NAT)"
147 iptables is a general, extensible packet identification framework.
148 The packet filtering and full NAT (masquerading, port forwarding,
149 etc) subsystems now use this: say `Y' or `M' here if you want to use
152 To compile it as a module, choose M here. If unsure, say N.
155 config IP_NF_MATCH_LIMIT
156 tristate "limit match support"
157 depends on IP_NF_IPTABLES
159 limit matching allows you to control the rate at which a rule can be
160 matched: mainly useful in combination with the LOG target ("LOG
161 target support", below) and to avoid some Denial of Service attacks.
163 To compile it as a module, choose M here. If unsure, say N.
165 config IP_NF_MATCH_IPRANGE
166 tristate "IP range match support"
167 depends on IP_NF_IPTABLES
169 This option makes possible to match IP addresses against IP address
172 To compile it as a module, choose M here. If unsure, say N.
174 config IP_NF_MATCH_MAC
175 tristate "MAC address match support"
176 depends on IP_NF_IPTABLES
178 MAC matching allows you to match packets based on the source
179 Ethernet address of the packet.
181 To compile it as a module, choose M here. If unsure, say N.
183 config IP_NF_MATCH_PKTTYPE
184 tristate "Packet type match support"
185 depends on IP_NF_IPTABLES
187 Packet type matching allows you to match a packet by
188 its "class", eg. BROADCAST, MULTICAST, ...
191 iptables -A INPUT -m pkttype --pkt-type broadcast -j LOG
193 To compile it as a module, choose M here. If unsure, say N.
195 config IP_NF_MATCH_MARK
196 tristate "netfilter MARK match support"
197 depends on IP_NF_IPTABLES
199 Netfilter mark matching allows you to match packets based on the
200 `nfmark' value in the packet. This can be set by the MARK target
203 To compile it as a module, choose M here. If unsure, say N.
205 config IP_NF_MATCH_MULTIPORT
206 tristate "Multiple port match support"
207 depends on IP_NF_IPTABLES
209 Multiport matching allows you to match TCP or UDP packets based on
210 a series of source or destination ports: normally a rule can only
211 match a single range of ports.
213 To compile it as a module, choose M here. If unsure, say N.
215 config IP_NF_MATCH_TOS
216 tristate "TOS match support"
217 depends on IP_NF_IPTABLES
219 TOS matching allows you to match packets based on the Type Of
220 Service fields of the IP packet.
222 To compile it as a module, choose M here. If unsure, say N.
224 config IP_NF_MATCH_RECENT
225 tristate "recent match support"
226 depends on IP_NF_IPTABLES
228 This match is used for creating one or many lists of recently
229 used addresses and then matching against that/those list(s).
231 Short options are available by using 'iptables -m recent -h'
232 Official Website: <http://snowman.net/projects/ipt_recent/>
234 To compile it as a module, choose M here. If unsure, say N.
236 config IP_NF_MATCH_ECN
237 tristate "ECN match support"
238 depends on IP_NF_IPTABLES
240 This option adds a `ECN' match, which allows you to match against
241 the IPv4 and TCP header ECN fields.
243 To compile it as a module, choose M here. If unsure, say N.
245 config IP_NF_MATCH_DSCP
246 tristate "DSCP match support"
247 depends on IP_NF_IPTABLES
249 This option adds a `DSCP' match, which allows you to match against
250 the IPv4 header DSCP field (DSCP codepoint).
252 The DSCP codepoint can have any value between 0x0 and 0x4f.
254 To compile it as a module, choose M here. If unsure, say N.
256 config IP_NF_MATCH_AH_ESP
257 tristate "AH/ESP match support"
258 depends on IP_NF_IPTABLES
260 These two match extensions (`ah' and `esp') allow you to match a
261 range of SPIs inside AH or ESP headers of IPSec packets.
263 To compile it as a module, choose M here. If unsure, say N.
265 config IP_NF_MATCH_LENGTH
266 tristate "LENGTH match support"
267 depends on IP_NF_IPTABLES
269 This option allows you to match the length of a packet against a
270 specific value or range of values.
272 To compile it as a module, choose M here. If unsure, say N.
274 config IP_NF_MATCH_TTL
275 tristate "TTL match support"
276 depends on IP_NF_IPTABLES
278 This adds CONFIG_IP_NF_MATCH_TTL option, which enabled the user
279 to match packets by their TTL value.
281 To compile it as a module, choose M here. If unsure, say N.
283 config IP_NF_MATCH_TCPMSS
284 tristate "tcpmss match support"
285 depends on IP_NF_IPTABLES
287 This option adds a `tcpmss' match, which allows you to examine the
288 MSS value of TCP SYN packets, which control the maximum packet size
291 To compile it as a module, choose M here. If unsure, say N.
293 config IP_NF_MATCH_HELPER
294 tristate "Helper match support"
295 depends on IP_NF_CONNTRACK && IP_NF_IPTABLES
297 Helper matching allows you to match packets in dynamic connections
298 tracked by a conntrack-helper, ie. ip_conntrack_ftp
300 To compile it as a module, choose M here. If unsure, say Y.
302 config IP_NF_MATCH_STATE
303 tristate "Connection state match support"
304 depends on IP_NF_CONNTRACK && IP_NF_IPTABLES
306 Connection state matching allows you to match packets based on their
307 relationship to a tracked connection (ie. previous packets). This
308 is a powerful tool for packet classification.
310 To compile it as a module, choose M here. If unsure, say N.
312 config IP_NF_MATCH_CONNTRACK
313 tristate "Connection tracking match support"
314 depends on IP_NF_CONNTRACK && IP_NF_IPTABLES
316 This is a general conntrack match module, a superset of the state match.
318 It allows matching on additional conntrack information, which is
319 useful in complex configurations, such as NAT gateways with multiple
320 internet links or tunnels.
322 To compile it as a module, choose M here. If unsure, say N.
324 config IP_NF_MATCH_OWNER
325 tristate "Owner match support"
326 depends on IP_NF_IPTABLES
328 Packet owner matching allows you to match locally-generated packets
329 based on who created them: the user, group, process or session.
331 To compile it as a module, choose M here. If unsure, say N.
333 config IP_NF_MATCH_PHYSDEV
334 tristate "Physdev match support"
335 depends on IP_NF_IPTABLES && BRIDGE_NETFILTER
337 Physdev packet matching matches against the physical bridge ports
338 the IP packet arrived on or will leave by.
340 To compile it as a module, choose M here. If unsure, say N.
342 config IP_NF_MATCH_ADDRTYPE
343 tristate 'address type match support'
344 depends on IP_NF_IPTABLES
346 This option allows you to match what routing thinks of an address,
347 eg. UNICAST, LOCAL, BROADCAST, ...
349 If you want to compile it as a module, say M here and read
350 <file:Documentation/modules.txt>. If unsure, say `N'.
352 config IP_NF_MATCH_REALM
353 tristate 'realm match support'
354 depends on IP_NF_IPTABLES
357 This option adds a `realm' match, which allows you to use the realm
358 key from the routing subsystem inside iptables.
360 This match pretty much resembles the CONFIG_NET_CLS_ROUTE4 option
363 If you want to compile it as a module, say M here and read
364 <file:Documentation/modules.txt>. If unsure, say `N'.
366 config IP_NF_MATCH_SCTP
367 tristate 'SCTP protocol match support'
368 depends on IP_NF_IPTABLES
370 With this option enabled, you will be able to use the iptables
371 `sctp' match in order to match on SCTP source/destination ports
372 and SCTP chunk types.
374 If you want to compile it as a module, say M here and read
375 <file:Documentation/modules.txt>. If unsure, say `N'.
377 config IP_NF_MATCH_DCCP
378 tristate 'DCCP protocol match support'
379 depends on IP_NF_IPTABLES
381 With this option enabled, you will be able to use the iptables
382 `dccp' match in order to match on DCCP source/destination ports
385 If you want to compile it as a module, say M here and read
386 <file:Documentation/modules.txt>. If unsure, say `N'.
388 config IP_NF_MATCH_COMMENT
389 tristate 'comment match support'
390 depends on IP_NF_IPTABLES
392 This option adds a `comment' dummy-match, which allows you to put
393 comments in your iptables ruleset.
395 If you want to compile it as a module, say M here and read
396 <file:Documentation/modules.txt>. If unsure, say `N'.
398 config IP_NF_MATCH_CONNMARK
399 tristate 'Connection mark match support'
400 depends on IP_NF_CONNTRACK_MARK && IP_NF_IPTABLES
402 This option adds a `connmark' match, which allows you to match the
403 connection mark value previously set for the session by `CONNMARK'.
405 If you want to compile it as a module, say M here and read
406 <file:Documentation/modules.txt>. The module will be called
407 ipt_connmark.o. If unsure, say `N'.
409 config IP_NF_MATCH_CONNBYTES
410 tristate 'Connection byte/packet counter match support'
411 depends on IP_NF_CT_ACCT && IP_NF_IPTABLES
413 This option adds a `connbytes' match, which allows you to match the
414 number of bytes and/or packets for each direction within a connection.
416 If you want to compile it as a module, say M here and read
417 <file:Documentation/modules.txt>. If unsure, say `N'.
419 config IP_NF_MATCH_HASHLIMIT
420 tristate 'hashlimit match support'
421 depends on IP_NF_IPTABLES
423 This option adds a new iptables `hashlimit' match.
425 As opposed to `limit', this match dynamically crates a hash table
426 of limit buckets, based on your selection of source/destination
427 ip addresses and/or ports.
429 It enables you to express policies like `10kpps for any given
430 destination IP' or `500pps from any given source IP' with a single
433 config IP_NF_MATCH_STRING
434 tristate 'string match support'
435 depends on IP_NF_IPTABLES
437 select TEXTSEARCH_KMP
439 select TEXTSEARCH_FSM
441 This option adds a `string' match, which allows you to look for
442 pattern matchings in packets.
444 To compile it as a module, choose M here. If unsure, say N.
446 # `filter', generic and specific targets
448 tristate "Packet filtering"
449 depends on IP_NF_IPTABLES
451 Packet filtering defines a table `filter', which has a series of
452 rules for simple packet filtering at local input, forwarding and
453 local output. See the man page for iptables(8).
455 To compile it as a module, choose M here. If unsure, say N.
457 config IP_NF_TARGET_REJECT
458 tristate "REJECT target support"
459 depends on IP_NF_FILTER
461 The REJECT target allows a filtering rule to specify that an ICMP
462 error should be issued in response to an incoming packet, rather
463 than silently being dropped.
465 To compile it as a module, choose M here. If unsure, say N.
467 config IP_NF_TARGET_LOG
468 tristate "LOG target support"
469 depends on IP_NF_IPTABLES
471 This option adds a `LOG' target, which allows you to create rules in
472 any iptables table which records the packet header to the syslog.
474 To compile it as a module, choose M here. If unsure, say N.
476 config IP_NF_TARGET_ULOG
477 tristate "ULOG target support"
478 depends on IP_NF_IPTABLES
480 This option adds a `ULOG' target, which allows you to create rules in
481 any iptables table. The packet is passed to a userspace logging
482 daemon using netlink multicast sockets; unlike the LOG target
483 which can only be viewed through syslog.
485 The apropriate userspace logging daemon (ulogd) may be obtained from
486 <http://www.gnumonks.org/projects/ulogd/>
488 To compile it as a module, choose M here. If unsure, say N.
490 config IP_NF_TARGET_TCPMSS
491 tristate "TCPMSS target support"
492 depends on IP_NF_IPTABLES
494 This option adds a `TCPMSS' target, which allows you to alter the
495 MSS value of TCP SYN packets, to control the maximum size for that
496 connection (usually limiting it to your outgoing interface's MTU
499 This is used to overcome criminally braindead ISPs or servers which
500 block ICMP Fragmentation Needed packets. The symptoms of this
501 problem are that everything works fine from your Linux
502 firewall/router, but machines behind it can never exchange large
504 1) Web browsers connect, then hang with no data received.
505 2) Small mail works fine, but large emails hang.
506 3) ssh works fine, but scp hangs after initial handshaking.
508 Workaround: activate this option and add a rule to your firewall
511 iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \
512 -j TCPMSS --clamp-mss-to-pmtu
514 To compile it as a module, choose M here. If unsure, say N.
516 # NAT + specific targets
519 depends on IP_NF_IPTABLES && IP_NF_CONNTRACK
521 The Full NAT option allows masquerading, port forwarding and other
522 forms of full Network Address Port Translation. It is controlled by
523 the `nat' table in iptables: see the man page for iptables(8).
525 To compile it as a module, choose M here. If unsure, say N.
527 config IP_NF_NAT_NEEDED
529 depends on IP_NF_NAT != n
532 config IP_NF_TARGET_MASQUERADE
533 tristate "MASQUERADE target support"
536 Masquerading is a special case of NAT: all outgoing connections are
537 changed to seem to come from a particular interface's address, and
538 if the interface goes down, those connections are lost. This is
539 only useful for dialup accounts with dynamic IP address (ie. your IP
540 address will be different on next dialup).
542 To compile it as a module, choose M here. If unsure, say N.
544 config IP_NF_TARGET_REDIRECT
545 tristate "REDIRECT target support"
548 REDIRECT is a special case of NAT: all incoming connections are
549 mapped onto the incoming interface's address, causing the packets to
550 come to the local machine instead of passing through. This is
551 useful for transparent proxies.
553 To compile it as a module, choose M here. If unsure, say N.
555 config IP_NF_TARGET_NETMAP
556 tristate "NETMAP target support"
559 NETMAP is an implementation of static 1:1 NAT mapping of network
560 addresses. It maps the network address part, while keeping the host
561 address part intact. It is similar to Fast NAT, except that
562 Netfilter's connection tracking doesn't work well with Fast NAT.
564 To compile it as a module, choose M here. If unsure, say N.
566 config IP_NF_TARGET_SAME
567 tristate "SAME target support"
570 This option adds a `SAME' target, which works like the standard SNAT
571 target, but attempts to give clients the same IP for all connections.
573 To compile it as a module, choose M here. If unsure, say N.
575 config IP_NF_NAT_SNMP_BASIC
576 tristate "Basic SNMP-ALG support (EXPERIMENTAL)"
577 depends on EXPERIMENTAL && IP_NF_NAT
580 This module implements an Application Layer Gateway (ALG) for
581 SNMP payloads. In conjunction with NAT, it allows a network
582 management system to access multiple private networks with
583 conflicting addresses. It works by modifying IP addresses
584 inside SNMP payloads to match IP-layer NAT mapping.
586 This is the "basic" form of SNMP-ALG, as described in RFC 2962
588 To compile it as a module, choose M here. If unsure, say N.
592 depends on IP_NF_IPTABLES!=n && IP_NF_CONNTRACK!=n && IP_NF_NAT!=n
593 default IP_NF_NAT if IP_NF_IRC=y
594 default m if IP_NF_IRC=m
596 # If they want FTP, set to $CONFIG_IP_NF_NAT (m or y),
597 # or $CONFIG_IP_NF_FTP (m or y), whichever is weaker. Argh.
600 depends on IP_NF_IPTABLES!=n && IP_NF_CONNTRACK!=n && IP_NF_NAT!=n
601 default IP_NF_NAT if IP_NF_FTP=y
602 default m if IP_NF_FTP=m
604 config IP_NF_NAT_TFTP
606 depends on IP_NF_IPTABLES!=n && IP_NF_CONNTRACK!=n && IP_NF_NAT!=n
607 default IP_NF_NAT if IP_NF_TFTP=y
608 default m if IP_NF_TFTP=m
610 config IP_NF_NAT_AMANDA
612 depends on IP_NF_IPTABLES!=n && IP_NF_CONNTRACK!=n && IP_NF_NAT!=n
613 default IP_NF_NAT if IP_NF_AMANDA=y
614 default m if IP_NF_AMANDA=m
616 # mangle + specific targets
618 tristate "Packet mangling"
619 depends on IP_NF_IPTABLES
621 This option adds a `mangle' table to iptables: see the man page for
622 iptables(8). This table is used for various packet alterations
623 which can effect how the packet is routed.
625 To compile it as a module, choose M here. If unsure, say N.
627 config IP_NF_TARGET_TOS
628 tristate "TOS target support"
629 depends on IP_NF_MANGLE
631 This option adds a `TOS' target, which allows you to create rules in
632 the `mangle' table which alter the Type Of Service field of an IP
633 packet prior to routing.
635 To compile it as a module, choose M here. If unsure, say N.
637 config IP_NF_TARGET_ECN
638 tristate "ECN target support"
639 depends on IP_NF_MANGLE
641 This option adds a `ECN' target, which can be used in the iptables mangle
644 You can use this target to remove the ECN bits from the IPv4 header of
645 an IP packet. This is particularly useful, if you need to work around
646 existing ECN blackholes on the internet, but don't want to disable
647 ECN support in general.
649 To compile it as a module, choose M here. If unsure, say N.
651 config IP_NF_TARGET_DSCP
652 tristate "DSCP target support"
653 depends on IP_NF_MANGLE
655 This option adds a `DSCP' match, which allows you to match against
656 the IPv4 header DSCP field (DSCP codepoint).
658 The DSCP codepoint can have any value between 0x0 and 0x4f.
660 To compile it as a module, choose M here. If unsure, say N.
662 config IP_NF_TARGET_MARK
663 tristate "MARK target support"
664 depends on IP_NF_MANGLE
666 This option adds a `MARK' target, which allows you to create rules
667 in the `mangle' table which alter the netfilter mark (nfmark) field
668 associated with the packet prior to routing. This can change
669 the routing method (see `Use netfilter MARK value as routing
670 key') and can also be used by other subsystems to change their
673 To compile it as a module, choose M here. If unsure, say N.
675 config IP_NF_TARGET_CLASSIFY
676 tristate "CLASSIFY target support"
677 depends on IP_NF_MANGLE
679 This option adds a `CLASSIFY' target, which enables the user to set
680 the priority of a packet. Some qdiscs can use this value for
681 classification, among these are:
683 atm, cbq, dsmark, pfifo_fast, htb, prio
685 To compile it as a module, choose M here. If unsure, say N.
687 config IP_NF_TARGET_TTL
688 tristate 'TTL target support'
689 depends on IP_NF_MANGLE
691 This option adds a `TTL' target, which enables the user to modify
692 the TTL value of the IP header.
694 While it is safe to decrement/lower the TTL, this target also enables
695 functionality to increment and set the TTL value of the IP header to
696 arbitrary values. This is EXTREMELY DANGEROUS since you can easily
697 create immortal packets that loop forever on the network.
699 To compile it as a module, choose M here. If unsure, say N.
701 config IP_NF_TARGET_CONNMARK
702 tristate 'CONNMARK target support'
703 depends on IP_NF_CONNTRACK_MARK && IP_NF_MANGLE
705 This option adds a `CONNMARK' target, which allows one to manipulate
706 the connection mark value. Similar to the MARK target, but
707 affects the connection mark value rather than the packet mark value.
709 If you want to compile it as a module, say M here and read
710 <file:Documentation/modules.txt>. The module will be called
711 ipt_CONNMARK.o. If unsure, say `N'.
713 config IP_NF_TARGET_CLUSTERIP
714 tristate "CLUSTERIP target support (EXPERIMENTAL)"
715 depends on IP_NF_CONNTRACK_MARK && IP_NF_IPTABLES && EXPERIMENTAL
717 The CLUSTERIP target allows you to build load-balancing clusters of
718 network servers without having a dedicated load-balancing
719 router/server/switch.
721 To compile it as a module, choose M here. If unsure, say N.
723 # raw + specific targets
725 tristate 'raw table support (required for NOTRACK/TRACE)'
726 depends on IP_NF_IPTABLES
728 This option adds a `raw' table to iptables. This table is the very
729 first in the netfilter framework and hooks in at the PREROUTING
732 If you want to compile it as a module, say M here and read
733 <file:Documentation/modules.txt>. If unsure, say `N'.
735 config IP_NF_TARGET_NOTRACK
736 tristate 'NOTRACK target support'
738 depends on IP_NF_CONNTRACK
740 The NOTRACK target allows a select rule to specify
741 which packets *not* to enter the conntrack/NAT
742 subsystem with all the consequences (no ICMP error tracking,
743 no protocol helpers for the selected packets).
745 If you want to compile it as a module, say M here and read
746 <file:Documentation/modules.txt>. If unsure, say `N'.
750 config IP_NF_ARPTABLES
751 tristate "ARP tables support"
753 arptables is a general, extensible packet identification framework.
754 The ARP packet filtering and mangling (manipulation)subsystems
755 use this: say Y or M here if you want to use either of those.
757 To compile it as a module, choose M here. If unsure, say N.
759 config IP_NF_ARPFILTER
760 tristate "ARP packet filtering"
761 depends on IP_NF_ARPTABLES
763 ARP packet filtering defines a table `filter', which has a series of
764 rules for simple ARP packet filtering at local input and
765 local output. On a bridge, you can also specify filtering rules
766 for forwarded ARP packets. See the man page for arptables(8).
768 To compile it as a module, choose M here. If unsure, say N.
770 config IP_NF_ARP_MANGLE
771 tristate "ARP payload mangling"
772 depends on IP_NF_ARPTABLES
774 Allows altering the ARP packet payload: source and destination
775 hardware and network addresses.
777 config IP_NF_CONNTRACK_NETLINK
778 tristate 'Connection tracking netlink interface'
779 depends on IP_NF_CONNTRACK && NETFILTER_NETLINK
781 This option enables support for a netlink-based userspace interface