⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 kconfig

📁 linux 内核源代码
💻
📖 第 1 页 / 共 2 页
字号:
	tristate  '"TRACE" target support'	depends on NETFILTER_XTABLES	depends on IP_NF_RAW || IP6_NF_RAW	help	  The TRACE target allows you to mark packets so that the kernel	  will log every rule which match the packets as those traverse	  the tables, chains, rules.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_TARGET_SECMARK	tristate '"SECMARK" target support'	depends on NETFILTER_XTABLES && NETWORK_SECMARK	help	  The SECMARK target allows security marking of network	  packets, for use with security subsystems.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_TARGET_CONNSECMARK	tristate '"CONNSECMARK" target support'	depends on NETFILTER_XTABLES && NF_CONNTRACK && NF_CONNTRACK_SECMARK	help	  The CONNSECMARK target copies security markings from packets	  to connections, and restores security markings from connections	  to packets (if the packets are not already marked).  This would	  normally be used in conjunction with the SECMARK target.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_TARGET_TCPMSS	tristate '"TCPMSS" target support'	depends on NETFILTER_XTABLES && (IPV6 || IPV6=n)	---help---	  This option adds a `TCPMSS' target, which allows you to alter the	  MSS value of TCP SYN packets, to control the maximum size for that	  connection (usually limiting it to your outgoing interface's MTU	  minus 40).	  This is used to overcome criminally braindead ISPs or servers which	  block ICMP Fragmentation Needed packets.  The symptoms of this	  problem are that everything works fine from your Linux	  firewall/router, but machines behind it can never exchange large	  packets:	        1) Web browsers connect, then hang with no data received.	        2) Small mail works fine, but large emails hang.	        3) ssh works fine, but scp hangs after initial handshaking.	  Workaround: activate this option and add a rule to your firewall	  configuration like:	  iptables -A FORWARD -p tcp --tcp-flags SYN,RST SYN \	                 -j TCPMSS --clamp-mss-to-pmtu	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_COMMENT	tristate  '"comment" match support'	depends on NETFILTER_XTABLES	help	  This option adds a `comment' dummy-match, which allows you to put	  comments in your iptables ruleset.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_CONNBYTES	tristate  '"connbytes" per-connection counter match support'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	select NF_CT_ACCT	help	  This option adds a `connbytes' match, which allows you to match the	  number of bytes and/or packets for each direction within a connection.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_CONNLIMIT	tristate '"connlimit" match support"'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	---help---	  This match allows you to match against the number of parallel	  connections to a server per client IP address (or address block).config NETFILTER_XT_MATCH_CONNMARK	tristate  '"connmark" connection mark match support'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	select NF_CONNTRACK_MARK	help	  This option adds a `connmark' match, which allows you to match the	  connection mark value previously set for the session by `CONNMARK'. 		  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  The module will be called	  ipt_connmark.ko.  If unsure, say `N'.config NETFILTER_XT_MATCH_CONNTRACK	tristate '"conntrack" connection tracking match support'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	help	  This is a general conntrack match module, a superset of the state match.	  It allows matching on additional conntrack information, which is	  useful in complex configurations, such as NAT gateways with multiple	  internet links or tunnels.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_DCCP	tristate  '"DCCP" protocol match support'	depends on NETFILTER_XTABLES	help	  With this option enabled, you will be able to use the iptables	  `dccp' match in order to match on DCCP source/destination ports	  and DCCP flags.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_DSCP	tristate '"DSCP" match support'	depends on NETFILTER_XTABLES	help	  This option adds a `DSCP' match, which allows you to match against	  the IPv4/IPv6 header DSCP field (differentiated services codepoint).	  The DSCP field can have any value between 0x0 and 0x3f inclusive.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_ESP	tristate '"ESP" match support'	depends on NETFILTER_XTABLES	help	  This match extension allows you to match a range of SPIs	  inside ESP header of IPSec packets.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_HELPER	tristate '"helper" match support'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	help	  Helper matching allows you to match packets in dynamic connections	  tracked by a conntrack-helper, ie. ip_conntrack_ftp	  To compile it as a module, choose M here.  If unsure, say Y.config NETFILTER_XT_MATCH_LENGTH	tristate '"length" match support'	depends on NETFILTER_XTABLES	help	  This option allows you to match the length of a packet against a	  specific value or range of values.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_LIMIT	tristate '"limit" match support'	depends on NETFILTER_XTABLES	help	  limit matching allows you to control the rate at which a rule can be	  matched: mainly useful in combination with the LOG target ("LOG	  target support", below) and to avoid some Denial of Service attacks.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_MAC	tristate '"mac" address match support'	depends on NETFILTER_XTABLES	help	  MAC matching allows you to match packets based on the source	  Ethernet address of the packet.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_MARK	tristate '"mark" match support'	depends on NETFILTER_XTABLES	help	  Netfilter mark matching allows you to match packets based on the	  `nfmark' value in the packet.  This can be set by the MARK target	  (see below).	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_POLICY	tristate 'IPsec "policy" match support'	depends on NETFILTER_XTABLES && XFRM	help	  Policy matching allows you to match packets based on the	  IPsec policy that was used during decapsulation/will	  be used during encapsulation.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_MULTIPORT	tristate "Multiple port match support"	depends on NETFILTER_XTABLES	help	  Multiport matching allows you to match TCP or UDP packets based on	  a series of source or destination ports: normally a rule can only	  match a single range of ports.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_PHYSDEV	tristate '"physdev" match support'	depends on NETFILTER_XTABLES && BRIDGE && BRIDGE_NETFILTER	help	  Physdev packet matching matches against the physical bridge ports	  the IP packet arrived on or will leave by.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_PKTTYPE	tristate '"pkttype" packet type match support'	depends on NETFILTER_XTABLES	help	  Packet type matching allows you to match a packet by	  its "class", eg. BROADCAST, MULTICAST, ...	  Typical usage:	  iptables -A INPUT -m pkttype --pkt-type broadcast -j LOG	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_QUOTA	tristate '"quota" match support'	depends on NETFILTER_XTABLES	help	  This option adds a `quota' match, which allows to match on a	  byte counter.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_REALM	tristate  '"realm" match support'	depends on NETFILTER_XTABLES	select NET_CLS_ROUTE	help	  This option adds a `realm' match, which allows you to use the realm	  key from the routing subsystem inside iptables.		  This match pretty much resembles the CONFIG_NET_CLS_ROUTE4 option 	  in tc world.		  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_SCTP	tristate  '"sctp" protocol match support (EXPERIMENTAL)'	depends on NETFILTER_XTABLES && EXPERIMENTAL	help	  With this option enabled, you will be able to use the 	  `sctp' match in order to match on SCTP source/destination ports	  and SCTP chunk types.	  If you want to compile it as a module, say M here and read	  <file:Documentation/kbuild/modules.txt>.  If unsure, say `N'.config NETFILTER_XT_MATCH_STATE	tristate '"state" match support'	depends on NETFILTER_XTABLES	depends on NF_CONNTRACK	help	  Connection state matching allows you to match packets based on their	  relationship to a tracked connection (ie. previous packets).  This	  is a powerful tool for packet classification.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_STATISTIC	tristate '"statistic" match support'	depends on NETFILTER_XTABLES	help	  This option adds a `statistic' match, which allows you to match	  on packets periodically or randomly with a given percentage.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_STRING	tristate  '"string" match support'	depends on NETFILTER_XTABLES	select TEXTSEARCH	select TEXTSEARCH_KMP	select TEXTSEARCH_BM	select TEXTSEARCH_FSM	help	  This option adds a `string' match, which allows you to look for	  pattern matchings in packets.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_TCPMSS	tristate '"tcpmss" match support'	depends on NETFILTER_XTABLES	help	  This option adds a `tcpmss' match, which allows you to examine the	  MSS value of TCP SYN packets, which control the maximum packet size	  for that connection.	  To compile it as a module, choose M here.  If unsure, say N.config NETFILTER_XT_MATCH_TIME	tristate '"time" match support'	depends on NETFILTER_XTABLES	---help---	  This option adds a "time" match, which allows you to match based on	  the packet arrival time (at the machine which netfilter is running)	  on) or departure time/date (for locally generated packets).	  If you say Y here, try `iptables -m time --help` for	  more information.	  If you want to compile it as a module, say M here.	  If unsure, say N.config NETFILTER_XT_MATCH_U32	tristate '"u32" match support'	depends on NETFILTER_XTABLES	---help---	  u32 allows you to extract quantities of up to 4 bytes from a packet,	  AND them with specified masks, shift them by specified amounts and	  test whether the results are in any of a set of specified ranges.	  The specification of what to extract is general enough to skip over	  headers with lengths stored in the packet, as in IP or TCP header	  lengths.	  Details and examples are in the kernel module source.config NETFILTER_XT_MATCH_HASHLIMIT	tristate '"hashlimit" match support'	depends on NETFILTER_XTABLES && (IP6_NF_IPTABLES || IP6_NF_IPTABLES=n)	help	  This option adds a `hashlimit' match.	  As opposed to `limit', this match dynamically creates a hash table	  of limit buckets, based on your selection of source/destination	  addresses and/or ports.	  It enables you to express policies like `10kpps for any given	  destination address' or `500pps from any given source address'	  with a single rule.endmenu

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -