Kconfig 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352
  1. #
  2. # IP netfilter configuration
  3. #
  4. menu "IPv6: Netfilter Configuration"
  5. depends on INET && IPV6 && NETFILTER
  6. config NF_SOCKET_IPV6
  7. tristate "IPv6 socket lookup support"
  8. help
  9. This option enables the IPv6 socket lookup infrastructure. This
  10. is used by the {ip6,nf}tables socket match.
  11. config NF_TPROXY_IPV6
  12. tristate "IPv6 tproxy support"
  13. if NF_TABLES
  14. config NF_TABLES_IPV6
  15. bool "IPv6 nf_tables support"
  16. help
  17. This option enables the IPv6 support for nf_tables.
  18. if NF_TABLES_IPV6
  19. config NFT_CHAIN_ROUTE_IPV6
  20. tristate "IPv6 nf_tables route chain support"
  21. help
  22. This option enables the "route" chain for IPv6 in nf_tables. This
  23. chain type is used to force packet re-routing after mangling header
  24. fields such as the source, destination, flowlabel, hop-limit and
  25. the packet mark.
  26. if NF_NAT_IPV6
  27. config NFT_CHAIN_NAT_IPV6
  28. tristate "IPv6 nf_tables nat chain support"
  29. help
  30. This option enables the "nat" chain for IPv6 in nf_tables. This
  31. chain type is used to perform Network Address Translation (NAT)
  32. packet transformations such as the source, destination address and
  33. source and destination ports.
  34. config NFT_MASQ_IPV6
  35. tristate "IPv6 masquerade support for nf_tables"
  36. depends on NFT_MASQ
  37. select NF_NAT_MASQUERADE_IPV6
  38. help
  39. This is the expression that provides IPv4 masquerading support for
  40. nf_tables.
  41. config NFT_REDIR_IPV6
  42. tristate "IPv6 redirect support for nf_tables"
  43. depends on NFT_REDIR
  44. select NF_NAT_REDIRECT
  45. help
  46. This is the expression that provides IPv4 redirect support for
  47. nf_tables.
  48. endif # NF_NAT_IPV6
  49. config NFT_REJECT_IPV6
  50. select NF_REJECT_IPV6
  51. default NFT_REJECT
  52. tristate
  53. config NFT_DUP_IPV6
  54. tristate "IPv6 nf_tables packet duplication support"
  55. depends on !NF_CONNTRACK || NF_CONNTRACK
  56. select NF_DUP_IPV6
  57. help
  58. This module enables IPv6 packet duplication support for nf_tables.
  59. config NFT_FIB_IPV6
  60. tristate "nf_tables fib / ipv6 route lookup support"
  61. select NFT_FIB
  62. help
  63. This module enables IPv6 FIB lookups, e.g. for reverse path filtering.
  64. It also allows query of the FIB for the route type, e.g. local, unicast,
  65. multicast or blackhole.
  66. endif # NF_TABLES_IPV6
  67. endif # NF_TABLES
  68. config NF_FLOW_TABLE_IPV6
  69. tristate "Netfilter flow table IPv6 module"
  70. depends on NF_FLOW_TABLE
  71. help
  72. This option adds the flow table IPv6 support.
  73. To compile it as a module, choose M here.
  74. config NF_DUP_IPV6
  75. tristate "Netfilter IPv6 packet duplication to alternate destination"
  76. depends on !NF_CONNTRACK || NF_CONNTRACK
  77. help
  78. This option enables the nf_dup_ipv6 core, which duplicates an IPv6
  79. packet to be rerouted to another destination.
  80. config NF_REJECT_IPV6
  81. tristate "IPv6 packet rejection"
  82. default m if NETFILTER_ADVANCED=n
  83. config NF_LOG_IPV6
  84. tristate "IPv6 packet logging"
  85. default m if NETFILTER_ADVANCED=n
  86. select NF_LOG_COMMON
  87. config NF_NAT_IPV6
  88. tristate "IPv6 NAT"
  89. depends on NF_CONNTRACK
  90. depends on NETFILTER_ADVANCED
  91. select NF_NAT
  92. help
  93. The IPv6 NAT option allows masquerading, port forwarding and other
  94. forms of full Network Address Port Translation. This can be
  95. controlled by iptables or nft.
  96. if NF_NAT_IPV6
  97. config NF_NAT_MASQUERADE_IPV6
  98. bool
  99. endif # NF_NAT_IPV6
  100. config IP6_NF_IPTABLES
  101. tristate "IP6 tables support (required for filtering)"
  102. depends on INET && IPV6
  103. select NETFILTER_XTABLES
  104. default m if NETFILTER_ADVANCED=n
  105. help
  106. ip6tables is a general, extensible packet identification framework.
  107. Currently only the packet filtering and packet mangling subsystem
  108. for IPv6 use this, but connection tracking is going to follow.
  109. Say 'Y' or 'M' here if you want to use either of those.
  110. To compile it as a module, choose M here. If unsure, say N.
  111. if IP6_NF_IPTABLES
  112. # The simple matches.
  113. config IP6_NF_MATCH_AH
  114. tristate '"ah" match support'
  115. depends on NETFILTER_ADVANCED
  116. help
  117. This module allows one to match AH packets.
  118. To compile it as a module, choose M here. If unsure, say N.
  119. config IP6_NF_MATCH_EUI64
  120. tristate '"eui64" address check'
  121. depends on NETFILTER_ADVANCED
  122. help
  123. This module performs checking on the IPv6 source address
  124. Compares the last 64 bits with the EUI64 (delivered
  125. from the MAC address) address
  126. To compile it as a module, choose M here. If unsure, say N.
  127. config IP6_NF_MATCH_FRAG
  128. tristate '"frag" Fragmentation header match support'
  129. depends on NETFILTER_ADVANCED
  130. help
  131. frag matching allows you to match packets based on the fragmentation
  132. header of the packet.
  133. To compile it as a module, choose M here. If unsure, say N.
  134. config IP6_NF_MATCH_OPTS
  135. tristate '"hbh" hop-by-hop and "dst" opts header match support'
  136. depends on NETFILTER_ADVANCED
  137. help
  138. This allows one to match packets based on the hop-by-hop
  139. and destination options headers of a packet.
  140. To compile it as a module, choose M here. If unsure, say N.
  141. config IP6_NF_MATCH_HL
  142. tristate '"hl" hoplimit match support'
  143. depends on NETFILTER_ADVANCED
  144. select NETFILTER_XT_MATCH_HL
  145. ---help---
  146. This is a backwards-compat option for the user's convenience
  147. (e.g. when running oldconfig). It selects
  148. CONFIG_NETFILTER_XT_MATCH_HL.
  149. config IP6_NF_MATCH_IPV6HEADER
  150. tristate '"ipv6header" IPv6 Extension Headers Match'
  151. default m if NETFILTER_ADVANCED=n
  152. help
  153. This module allows one to match packets based upon
  154. the ipv6 extension headers.
  155. To compile it as a module, choose M here. If unsure, say N.
  156. config IP6_NF_MATCH_MH
  157. tristate '"mh" match support'
  158. depends on NETFILTER_ADVANCED
  159. help
  160. This module allows one to match MH packets.
  161. To compile it as a module, choose M here. If unsure, say N.
  162. config IP6_NF_MATCH_RPFILTER
  163. tristate '"rpfilter" reverse path filter match support'
  164. depends on NETFILTER_ADVANCED
  165. depends on IP6_NF_MANGLE || IP6_NF_RAW
  166. ---help---
  167. This option allows you to match packets whose replies would
  168. go out via the interface the packet came in.
  169. To compile it as a module, choose M here. If unsure, say N.
  170. The module will be called ip6t_rpfilter.
  171. config IP6_NF_MATCH_RT
  172. tristate '"rt" Routing header match support'
  173. depends on NETFILTER_ADVANCED
  174. help
  175. rt matching allows you to match packets based on the routing
  176. header of the packet.
  177. To compile it as a module, choose M here. If unsure, say N.
  178. config IP6_NF_MATCH_SRH
  179. tristate '"srh" Segment Routing header match support'
  180. depends on NETFILTER_ADVANCED
  181. help
  182. srh matching allows you to match packets based on the segment
  183. routing header of the packet.
  184. To compile it as a module, choose M here. If unsure, say N.
  185. # The targets
  186. config IP6_NF_TARGET_HL
  187. tristate '"HL" hoplimit target support'
  188. depends on NETFILTER_ADVANCED && IP6_NF_MANGLE
  189. select NETFILTER_XT_TARGET_HL
  190. ---help---
  191. This is a backwards-compatible option for the user's convenience
  192. (e.g. when running oldconfig). It selects
  193. CONFIG_NETFILTER_XT_TARGET_HL.
  194. config IP6_NF_FILTER
  195. tristate "Packet filtering"
  196. default m if NETFILTER_ADVANCED=n
  197. help
  198. Packet filtering defines a table `filter', which has a series of
  199. rules for simple packet filtering at local input, forwarding and
  200. local output. See the man page for iptables(8).
  201. To compile it as a module, choose M here. If unsure, say N.
  202. config IP6_NF_TARGET_REJECT
  203. tristate "REJECT target support"
  204. depends on IP6_NF_FILTER
  205. select NF_REJECT_IPV6
  206. default m if NETFILTER_ADVANCED=n
  207. help
  208. The REJECT target allows a filtering rule to specify that an ICMPv6
  209. error should be issued in response to an incoming packet, rather
  210. than silently being dropped.
  211. To compile it as a module, choose M here. If unsure, say N.
  212. config IP6_NF_TARGET_SYNPROXY
  213. tristate "SYNPROXY target support"
  214. depends on NF_CONNTRACK && NETFILTER_ADVANCED
  215. select NETFILTER_SYNPROXY
  216. select SYN_COOKIES
  217. help
  218. The SYNPROXY target allows you to intercept TCP connections and
  219. establish them using syncookies before they are passed on to the
  220. server. This allows to avoid conntrack and server resource usage
  221. during SYN-flood attacks.
  222. To compile it as a module, choose M here. If unsure, say N.
  223. config IP6_NF_MANGLE
  224. tristate "Packet mangling"
  225. default m if NETFILTER_ADVANCED=n
  226. help
  227. This option adds a `mangle' table to iptables: see the man page for
  228. iptables(8). This table is used for various packet alterations
  229. which can effect how the packet is routed.
  230. To compile it as a module, choose M here. If unsure, say N.
  231. config IP6_NF_RAW
  232. tristate 'raw table support (required for TRACE)'
  233. help
  234. This option adds a `raw' table to ip6tables. This table is the very
  235. first in the netfilter framework and hooks in at the PREROUTING
  236. and OUTPUT chains.
  237. If you want to compile it as a module, say M here and read
  238. <file:Documentation/kbuild/modules.txt>. If unsure, say `N'.
  239. # security table for MAC policy
  240. config IP6_NF_SECURITY
  241. tristate "Security table"
  242. depends on SECURITY
  243. depends on NETFILTER_ADVANCED
  244. help
  245. This option adds a `security' table to iptables, for use
  246. with Mandatory Access Control (MAC) policy.
  247. If unsure, say N.
  248. config IP6_NF_NAT
  249. tristate "ip6tables NAT support"
  250. depends on NF_CONNTRACK
  251. depends on NETFILTER_ADVANCED
  252. select NF_NAT
  253. select NF_NAT_IPV6
  254. select NETFILTER_XT_NAT
  255. help
  256. This enables the `nat' table in ip6tables. This allows masquerading,
  257. port forwarding and other forms of full Network Address Port
  258. Translation.
  259. To compile it as a module, choose M here. If unsure, say N.
  260. if IP6_NF_NAT
  261. config IP6_NF_TARGET_MASQUERADE
  262. tristate "MASQUERADE target support"
  263. select NF_NAT_MASQUERADE_IPV6
  264. help
  265. Masquerading is a special case of NAT: all outgoing connections are
  266. changed to seem to come from a particular interface's address, and
  267. if the interface goes down, those connections are lost. This is
  268. only useful for dialup accounts with dynamic IP address (ie. your IP
  269. address will be different on next dialup).
  270. To compile it as a module, choose M here. If unsure, say N.
  271. config IP6_NF_TARGET_NPT
  272. tristate "NPT (Network Prefix translation) target support"
  273. help
  274. This option adds the `SNPT' and `DNPT' target, which perform
  275. stateless IPv6-to-IPv6 Network Prefix Translation per RFC 6296.
  276. To compile it as a module, choose M here. If unsure, say N.
  277. endif # IP6_NF_NAT
  278. endif # IP6_NF_IPTABLES
  279. endmenu
  280. config NF_DEFRAG_IPV6
  281. tristate