Lines Matching refs:of

88 	  Connection tracking keeps a record of what packets have passed
92 This is required to do Masquerading or other kinds of Network
108 by means of per-address-family sysctl tunables.
120 of packets, but this mark value is kept in the conntrack session
121 instead of the individual packets.
152 This option enables for the list of known conntrack entries
154 is considered obsolete in favor of using the conntrack(8)
233 Amanda requires for communication of the backup data, messages and
244 of Network Address Translation on them.
255 H.323 is a VoIP signalling protocol from ITU-T. As one of the most
277 of a server. DCC Sending is used anywhere you send files over IRC,
299 of "ip address show" should look similar to this:
333 Please note that not all PPTP modes of operation are supported yet.
336 in PNS->PAC direction. This is a violation of RFC2637.
392 policies to flows, instead of using the global timeout policy.
424 forms of full Network Address Port Translation. This can be
607 This is required if you intend to use any of existing
628 on the protocol of the packet.
635 of a packets security association.
643 This option allows matching for the presence or absence of a
701 on the protocol of the packet.
711 protocol of the packet.
747 This is required if you intend to use any of ip_tables,
811 # alphabetically ordered list of targets
846 the priority of a packet. Some qdiscs can use this value for
898 the "mangle" table which alter the Type Of Service field of an IPv4
899 or the Priority field of an IPv6 packet, prior to routing.
910 hoplimit/time-to-live value of the IP header.
913 modules also allow to increment and set the hoplimit value of
926 which set the skbuff mark by means of hash calculation within a given
1000 NETMAP is an implementation of static 1:1 NAT mapping of network
1050 REDIRECT is a special case of NAT: all incoming connections are
1052 come to the local machine instead of passing through. This is
1063 Masquerading is a special case of NAT: all outgoing connections are
1122 The SECMARK target allows security marking of network
1133 MSS value of TCP SYN packets, to control the maximum size for that
1138 block ICMP Fragmentation Needed packets. The symptoms of this
1162 # alphabetically ordered list of matches
1170 This option allows you to match what routing thinks of an address,
1200 This option allows you to build work-load-sharing clusters of
1227 number of bytes and/or packets for each direction within a connection.
1251 This match allows you to match against the number of parallel
1269 This is a general conntrack match module, a superset of the state match.
1317 based on the Type Of Service fields of the IPv4 packet (which share
1335 This match extension allows you to match a range of SPIs
1336 inside ESP header of IPSec packets.
1348 of limit buckets, based on your selection of source/destination
1371 header of the packet.
1377 This match extension allows you to match a range of CPIs(16 bits)
1378 inside IPComp header of IPSec packets.
1398 This option allows you to match against IPVS properties of a packet.
1416 This option allows you to match the length of a packet against a
1417 specific value or range of values.
1427 target support", below) and to avoid some Denial of Service attacks.
1436 Ethernet address of the packet.
1454 a series of source or destination ports: normally a rule can only
1455 match a single range of ports.
1562 This match is used for creating one or many lists of recently
1636 MSS value of TCP SYN packets, which control the maximum packet size
1659 u32 allows you to extract quantities of up to 4 bytes from a packet,
1661 test whether the results are in any of a set of specified ranges.
1662 The specification of what to extract is general enough to skip over