Lines Matching refs:use
40 so-called IP spoofing, however it can pose problems if you use
44 rp_filter on use:
130 If unsure, say Y. Note that if you want to use DHCP, a DHCP server
146 want to use BOOTP, a BOOTP server must be operating on your network.
158 here. Note that if you want to use RARP, a RARP server must be
172 appear on a different network than it physically is, or to use
252 because Cisco supports it. You need special software to use it
256 Say Y if you want to use PIM-SM v1. Note that you can say N here if
257 you just want to use Dense Mode PIM.
263 Kernel side support for Sparse Mode PIM version 2. In order to use
278 say Y here, the TCP/IP stack will use a cryptographic challenge
314 the notion of a secure tunnel for IPSEC and then use routing protocol
338 When this option is enabled IP tunnels can be configured to use
535 A modification to TCP's congestion control mechanism for use
598 throughput over wireless networks. TCP Veno makes use of state
660 o Coexist with flows that use loss-based congestion control.
677 coexist with flows that use loss-based congestion control, and can
751 Its main (only?) use is to protect BGP sessions between core routers