Lines Matching refs:to
9 intend to participate in the MBONE, a high bandwidth network on top
15 safe to say N.
20 If you intend to run your Linux box mostly as a router, i.e. as a
25 The answer to this question won't directly affect the kernel:
26 answering N will just cause the configurator to skip all the
30 forwarding in your kernel; you can do that by saying Y to "/proc
43 asymmetric routing (packets from you to a host take a different path
44 than packets from that host to you) or if you operate a non-routing
100 Normally, a router decides what to do with a received packet based
102 the Linux router will also be able to take the packet's source
118 Normally, the routing tables specify a single action to be taken in
120 however, it becomes possible to attach several actions to a packet
121 pattern, in effect specifying several alternative paths to travel
122 for those packets. The router considers all these paths to be of
143 You need to say Y only for diskless machines requiring network
144 access to boot (in which case you want to say Y to "Root file system
152 If you want your Linux box to mount its whole root file system (the
154 net via NFS and you want the IP address of your computer to be
161 If unsure, say Y. Note that if you want to use DHCP, a DHCP server
169 If you want your Linux box to mount its whole root file system (the
171 net via NFS and you want the IP address of your computer to be
177 want to use BOOTP, a BOOTP server must be operating on your network.
184 If you want your Linux box to mount its whole root file system (the
186 net via NFS and you want the IP address of your computer to be
189 here. Note that if you want to use RARP, a RARP server must be
203 can be useful if you want to make your (or some other) machine
204 appear on a different network than it physically is, or to use
205 mobile-IP facilities (allowing laptops to seamlessly move between
208 Saying Y to this option will produce two modules ( = code which can
229 One application of GRE/IP is to construct a broadcast WAN (Wide Area
232 to do that, say Y here and to "IP multicast routing" below.
238 This is used if you want your machine to act as a router for IP
241 audio and video broadcasts. In order to do that, you would most
253 because Cisco supports it. You need special software to use it
257 Say Y if you want to use PIM-SM v1. Note that you can say N here if
258 you just want to use Dense Mode PIM.
264 Kernel side support for Sparse Mode PIM version 2. In order to use
267 you want to play with it.
274 addresses to hardware addresses on the local network, so that
275 Ethernet/Token Ring/ etc. frames are sent to the proper address on
281 connections are made to many machines on the network.
284 to more than 256 entries (the oldest entries are expired in a LIFO
289 This code is experimental and also obsolete. If you want to use it,
290 you need to find a version of the daemon arpd on the net somewhere,
291 and you should also say Y to "Kernel/User network link driver",
297 Normal TCP/IP networking is open to an attack known as "SYN
299 users from being able to connect to your computer during an ongoing
305 protocol known as "SYN cookies" to enable legitimate users to
306 continue to connect, even when your machine is under attack. There
307 is no need for the legitimate users to change their TCP/IP software;
308 SYN cookies work transparently to them. For technical information
309 about SYN cookies, check out <http://cr.yp.to/syncookies.html>.
312 likely to have been forged by the attacker; it is only reported as
313 an aid in tracing the packets to their actual source and should not
321 you can enable them by saying Y to "/proc file system support" and
466 control. It is based on end-to-end bandwidth estimation to set
481 modeswitch to change the alpha and beta parameters of TCP Reno
482 based on network conditions and in a way so as to be fair with
491 A modification to TCP's congestion control mechanism for use
492 with large congestion windows. A table indicates how much to
511 TCP Vegas is a sender-side only change to TCP that anticipates
522 Scalable TCP is a sender-side only change to TCP which uses a
524 properties, though is known to have fairness issues.
533 to utilize only the excess network bandwidth as compared to the
542 TCP Veno is a sender-side only enhancement of TCP to obtain better
544 distinguishing to circumvent the difficult judgment of the packet loss
545 type. TCP Veno cuts down less congestion window in response to random
556 algorithm, which uses a mixed loss/delay approach to compute the
558 internal, RTT and Reno fairness, resilience to link loss while
570 high speed long delay links. It uses round-trip-time to
571 adjust the alpha and beta parameters to achieve a higher average
627 RFC2385 specifies a method of giving MD5 protection to TCP sessions.
628 Its main (only?) use is to protect BGP sessions between core routers