Home
last modified time | relevance | path

Searched full:firewall (Results 1 – 25 of 135) sorted by relevance

123456

/kernel/linux/linux-6.6/include/uapi/linux/netfilter_arp/
Darp_tables.h3 * Format of an ARP firewall descriptor
93 /* This structure defines each of the firewall rules. Consists of 3
116 * New IP firewall options for [gs]etsockopt at the RAW IP level.
206 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-5.10/include/uapi/linux/netfilter_arp/
Darp_tables.h3 * Format of an ARP firewall descriptor
93 /* This structure defines each of the firewall rules. Consists of 3
116 * New IP firewall options for [gs]etsockopt at the RAW IP level.
206 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-5.10/net/
DKconfig129 a firewall protecting a local network from the Internet. The type of
130 firewall provided by this kernel support is called a "packet
132 based on type, source, destination etc. The other kind of firewall,
149 firewall box itself. It works both ways: if the outside host
163 Yet another use of Netfilter is building a bridging firewall. Using
197 ARP resp. IP traffic. If you want a bridging firewall, you probably
/kernel/linux/linux-6.6/net/
DKconfig154 a firewall protecting a local network from the Internet. The type of
155 firewall provided by this kernel support is called a "packet
157 based on type, source, destination etc. The other kind of firewall,
174 firewall box itself. It works both ways: if the outside host
188 Yet another use of Netfilter is building a bridging firewall. Using
222 ARP resp. IP traffic. If you want a bridging firewall, you probably
/kernel/linux/linux-6.6/include/uapi/linux/netfilter_ipv4/
Dip_tables.h9 * Format of an IP firewall descriptor
103 /* This structure defines each of the firewall rules. Consists of 3
128 * New IP firewall options for [gs]etsockopt at the RAW IP level.
229 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-5.10/include/uapi/linux/netfilter_ipv4/
Dip_tables.h9 * Format of an IP firewall descriptor
103 /* This structure defines each of the firewall rules. Consists of 3
128 * New IP firewall options for [gs]etsockopt at the RAW IP level.
229 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-5.10/Documentation/networking/device_drivers/cable/
Dsb1000.rst97 8. Be sure to modify /etc/ppp/firewall to use ipchains instead of
103 You may also wish to modify the firewall script to implement a different
173 5. The firewall script isn't working (with 2.2.x and higher kernels).
177 /etc/ppp/firewall script from the deprecated ipfwadm commands to ipchains.
179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
/kernel/linux/linux-6.6/Documentation/networking/device_drivers/cable/
Dsb1000.rst97 8. Be sure to modify /etc/ppp/firewall to use ipchains instead of
103 You may also wish to modify the firewall script to implement a different
173 5. The firewall script isn't working (with 2.2.x and higher kernels).
177 /etc/ppp/firewall script from the deprecated ipfwadm commands to ipchains.
179 6. I'm getting *tons* of firewall deny messages in the /var/kern.log,
/kernel/linux/linux-5.10/include/uapi/linux/netfilter_ipv6/
Dip6_tables.h9 * Format of an IP6 firewall descriptor
107 /* This structure defines each of the firewall rules. Consists of 3
165 * New IP firewall options for [gs]etsockopt at the RAW IP level.
269 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-6.6/include/uapi/linux/netfilter_ipv6/
Dip6_tables.h9 * Format of an IP6 firewall descriptor
107 /* This structure defines each of the firewall rules. Consists of 3
165 * New IP firewall options for [gs]etsockopt at the RAW IP level.
269 * Main firewall chains definitions and global var's definitions.
/kernel/linux/linux-5.10/net/bridge/
DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/kernel/linux/linux-6.6/net/bridge/
DKconfig26 turn your bridge into a bridging IP firewall.
28 take this into account when setting up your firewall rules.
/kernel/linux/linux-6.6/drivers/soc/tegra/cbb/
Dtegra234-cbb.c73 /* Write firewall check enable */
144 dev_info(&pdev->dev, "SoC data missing for firewall\n"); in tegra234_cbb_write_access_allowed()
150 dev_err(&pdev->dev, "wrong firewall offset value\n"); in tegra234_cbb_write_access_allowed()
156 * If the firewall check feature for allowing or blocking the in tegra234_cbb_write_access_allowed()
157 * write accesses through the firewall of a fabric is disabled in tegra234_cbb_write_access_allowed()
164 * If the firewall check is enabled then check whether CCPLEX in tegra234_cbb_write_access_allowed()
682 .desc = "Attempt to access a region which is firewall protected"
885 * level firewall(SCR), address hole within the slave, etc
1155 * is blocked by CBB firewall. in tegra234_cbb_probe()
1158 dev_info(&pdev->dev, "error reporting not enabled due to firewall\n"); in tegra234_cbb_probe()
/kernel/linux/linux-5.10/arch/arm/mach-omap2/
Dl3_3xxx.h3 * arch/arm/plat-omap/include/plat/l3_3xxx.h - L3 firewall definitions
Dl3_2xxx.h3 * arch/arm/plat-omap/include/plat/l3_2xxx.h - L3 firewall definitions
Dl4_2xxx.h3 * arch/arm/plat-omap/include/plat/l4_2xxx.h - L4 firewall definitions
Dl4_3xxx.h3 * arch/arm/plat-omap/include/mach/l4_3xxx.h - L4 firewall definitions
/kernel/linux/linux-6.6/arch/arm/mach-omap2/
Dl3_2xxx.h3 * arch/arm/plat-omap/include/plat/l3_2xxx.h - L3 firewall definitions
Dl3_3xxx.h3 * arch/arm/plat-omap/include/plat/l3_3xxx.h - L3 firewall definitions
Dl4_2xxx.h3 * arch/arm/plat-omap/include/plat/l4_2xxx.h - L4 firewall definitions
Dl4_3xxx.h3 * arch/arm/plat-omap/include/mach/l4_3xxx.h - L4 firewall definitions
/kernel/linux/linux-6.6/drivers/gpu/host1x/
DKconfig23 bool "Enable HOST1X security firewall"
/kernel/linux/linux-5.10/drivers/gpu/host1x/
DKconfig17 bool "Enable HOST1X security firewall"
/kernel/linux/linux-6.6/drivers/gpu/drm/tegra/
DMakefile8 firewall.o \
/kernel/linux/linux-5.10/net/netfilter/
DKconfig239 firewall.
272 same port. This make them hard to firewall properly because connection
292 same port. This make them hard to firewall properly because connection
308 If you are running PPTP sessions over a stateful firewall or NAT
328 firewall.
340 tracking/NATing firewall.
1085 firewall/router, but machines behind it can never exchange large
1091 Workaround: activate this option and add a rule to your firewall

123456