• Home
  • Raw
  • Download

Lines Matching refs:a

39 	  Connection tracking keeps a record of what packets have passed
47 To compile it as a module, choose M here. If unsure, say N.
82 Normally, each connection needs to have a unique system wide
104 provide a notifier chain that can be used by other kernel code
157 If you want to compile it as a module, say M here and read
168 To compile it as a module, choose M here. If unsure, say N.
183 To compile it as a module, choose M here. If unsure, say N.
197 To compile it as a module, choose M here. If unsure, say N.
204 H.323 is a VoIP signalling protocol from ITU-T. As one of the most
209 With this module you can support H.323 on a connection tracking/NAT
217 To compile it as a module, choose M here. If unsure, say N.
223 There is a commonly-used extension to IRC called
226 of a server. DCC Sending is used anywhere you send files over IRC,
232 To compile it as a module, choose M here. If unsure, say N.
254 To compile it as a module, choose M here. If unsure, say N.
269 To compile it as a module, choose M here. If unsure, say N.
279 If you are running PPTP sessions over a stateful firewall or NAT
285 in PNS->PAC direction. This is a violation of RFC2637.
286 - Only supports a single call within each session
288 To compile it as a module, choose M here. If unsure, say N.
294 SANE is a protocol for remote access to scanners as implemented
298 With this module you can support SANE on a connection tracking
301 To compile it as a module, choose M here. If unsure, say N.
310 the nf_nat_sip modules you can support the protocol on a connection
313 To compile it as a module, choose M here. If unsure, say N.
321 If you are using a tftp client behind -j SNAT or -j MASQUERADING
324 To compile it as a module, choose M here. If unsure, say N.
331 This option enables support for a netlink-based userspace interface
425 provides a pseudo-state machine with an extensible instruction-set
432 To compile it as a module, choose M here.
440 This option enables support for a mixed IPv4/IPv6 "inet" table.
483 include packet and byte counters in a rule.
583 Netfilter allows you to store a mark value per connection (a.k.a.
597 To compile it as a module, choose M here. If unsure, say N.
608 This option adds a 'AUDIT' target, which can be used to create
611 To compileit as a module, choose M here. If unsure, say N.
618 This option adds a `CHECKSUM' target, which can be used in the iptables mangle
622 a packet that lacks a checksum. This is particularly useful,
627 To compile it as a module, choose M here. If unsure, say N.
633 This option adds a `CLASSIFY' target, which enables the user to set
634 the priority of a packet. Some qdiscs can use this value for
639 To compile it as a module, choose M here. If unsure, say N.
647 This is a backwards-compat option for the user's convenience
661 To compile it as a module, choose M here. If unsure, say N.
669 This options adds a `CT' target, which allows to specify initial
673 To compile it as a module, choose M here. If unsure, say N.
680 This option adds a `DSCP' target, which allows you to manipulate
689 To compile it as a module, choose M here. If unsure, say N.
714 which set the skbuff mark by means of hash calculation within a given
719 To compile it as a module, choose M here. If unsure, say N.
728 added. When the timer expires, it triggers a sysfs notification.
731 To compile it as a module, choose M here. If unsure, say N.
738 This option adds a `LED' target, which allows you to blink LEDs in
741 This can be used to turn a spare LED into a network activity LED,
743 you could have an LED which lights up for a minute or two every time
764 This option adds a `LOG' target, which allows you to create rules in
767 To compile it as a module, choose M here. If unsure, say N.
774 This is a backwards-compat option for the user's convenience
784 To compile it as a module, choose M here. If unsure, say N.
794 To compile it as a module, choose M here. If unsure, say N.
804 To compile it as a module, choose M here. If unsure, say N.
816 To compile it as a module, choose M here. If unsure, say N.
829 This option adds a `RATEEST' target, which allows to measure
833 To compile it as a module, choose M here. If unsure, say N.
839 REDIRECT is a special case of NAT: all incoming connections are
844 To compile it as a module, choose M here. If unsure, say N.
852 This option adds a "TEE" target with which a packet can be cloned and
864 This option adds a `TPROXY' target, which is somewhat similar to
866 to redirect traffic to a transparent proxy. It does _not_ depend
872 To compile it as a module, choose M here. If unsure, say N.
883 If you want to compile it as a module, say M here and read
894 To compile it as a module, choose M here. If unsure, say N.
901 This option adds a `TCPMSS' target, which allows you to alter the
915 Workaround: activate this option and add a rule to your firewall
921 To compile it as a module, choose M here. If unsure, say N.
928 This option adds a "TCPOPTSTRIP" target, which allows you to strip
942 If you want to compile it as a module, say M here and read
949 BPF matching applies a linux socket filter to each packet and
952 To compile it as a module, choose M here. If unsure, say N.
970 network servers/stateful firewalls without having a dedicated
984 This option adds a `comment' dummy-match, which allows you to put
987 If you want to compile it as a module, say M here and read
995 This option adds a `connbytes' match, which allows you to match the
996 number of bytes and/or packets for each direction within a connection.
998 If you want to compile it as a module, say M here and read
1008 to a connection. The kernel only stores bit values - mapping
1011 Unlike connmark, more than 32 flag bits may be assigned to a
1020 connections to a server per client IP address (or address block).
1028 This is a backwards-compat option for the user's convenience
1037 This is a general conntrack match module, a superset of the state match.
1043 To compile it as a module, choose M here. If unsure, say N.
1052 To compile it as a module, choose M here. If unsure, say N.
1063 If you want to compile it as a module, say M here and read
1070 This options adds a `devgroup' match, which allows to match on the
1071 device group a network device is assigned to.
1073 To compile it as a module, choose M here. If unsure, say N.
1079 This option adds a `DSCP' match, which allows you to match against
1084 It will also add a "tos" match, which allows you to match packets
1088 To compile it as a module, choose M here. If unsure, say N.
1097 To compile it as a module, choose M here. If unsure, say N.
1103 This match extension allows you to match a range of SPIs
1106 To compile it as a module, choose M here. If unsure, say N.
1113 This option adds a `hashlimit' match.
1115 As opposed to `limit', this match dynamically creates a hash table
1121 with a single rule.
1129 tracked by a conntrack-helper, ie. ip_conntrack_ftp
1131 To compile it as a module, choose M here. If unsure, say Y.
1145 This match extension allows you to match a range of CPIs(16 bits)
1148 To compile it as a module, choose M here. If unsure, say N.
1154 This option adds a "iprange" match, which allows you to match based on
1166 This option allows you to match against IPVS properties of a packet.
1178 To compile it as a module, choose M here. If unsure, say N.
1184 This option allows you to match the length of a packet against a
1187 To compile it as a module, choose M here. If unsure, say N.
1193 limit matching allows you to control the rate at which a rule can be
1197 To compile it as a module, choose M here. If unsure, say N.
1206 To compile it as a module, choose M here. If unsure, say N.
1213 This is a backwards-compat option for the user's convenience
1222 a series of source or destination ports: normally a rule can only
1223 match a single range of ports.
1225 To compile it as a module, choose M here. If unsure, say N.
1235 To compile it as a module, choose M here. If unsure, say N.
1248 To compile it as a module, choose M here. If unsure, say N.
1256 possible to check whether a socket actually exists.
1269 To compile it as a module, choose M here. If unsure, say N.
1279 To compile it as a module, choose M here. If unsure, say N.
1285 Packet type matching allows you to match a packet by
1291 To compile it as a module, choose M here. If unsure, say N.
1299 on uid, it keeps stats based on a tag assigned to a socket.
1300 The full tag is comprised of a UID and an accounting tag.
1301 The tags are assignable to sockets from user space (e.g. a download
1313 This option adds a `quota' match, which allows to match on a
1316 If you want to compile it as a module, say M here and read
1323 This option adds a `quota2' match, which allows to match on a
1328 If you want to compile it as a module, say M here and read
1336 This option allows `quota2' to log ONCE when a quota limit
1347 This option adds a `rateest' match, which allows to match on the
1350 To compile it as a module, choose M here. If unsure, say N.
1357 This option adds a `realm' match, which allows you to use the realm
1363 If you want to compile it as a module, say M here and read
1385 If you want to compile it as a module, say M here and read
1397 This option adds a `socket' match, which can be used to match
1398 packets for which a TCP or UDP socket lookup finds a valid socket.
1402 To compile it as a module, choose M here. If unsure, say N.
1410 relationship to a tracked connection (ie. previous packets). This
1411 is a powerful tool for packet classification.
1413 To compile it as a module, choose M here. If unsure, say N.
1419 This option adds a `statistic' match, which allows you to match
1420 on packets periodically or randomly with a given percentage.
1422 To compile it as a module, choose M here. If unsure, say N.
1432 This option adds a `string' match, which allows you to look for
1435 To compile it as a module, choose M here. If unsure, say N.
1441 This option adds a `tcpmss' match, which allows you to examine the
1445 To compile it as a module, choose M here. If unsure, say N.
1451 This option adds a "time" match, which allows you to match based on
1458 If you want to compile it as a module, say M here.
1465 u32 allows you to extract quantities of up to 4 bytes from a packet,
1467 test whether the results are in any of a set of specified ranges.