NOTES (133640) | NOTES (133720) |
---|---|
1# $FreeBSD: head/sys/conf/NOTES 133640 2004-08-13 09:40:58Z fjoe $ | 1# $FreeBSD: head/sys/conf/NOTES 133720 2004-08-14 15:32:40Z dwmalone $ |
2# 3# NOTES -- Lines that can be cut/pasted into kernel and hints configs. 4# 5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers', 6# 'makeoptions', 'hints', etc. go into the kernel configuration that you 7# run config(8) with. 8# 9# Lines that begin with 'hint.' are NOT for config(8), they go into your --- 524 unchanged lines hidden (view full) --- 534# The `ef' device provides support for multiple ethernet frame types 535# specified via ETHER_* options. See ef(4) for details. 536# 537# The pf packet filter consists of three devices: 538# The `pf' device provides /dev/pf and the firewall code itself. 539# The `pflog' device provides the pflog0 interface which logs packets. 540# The `pfsync' device provides the pfsync0 interface used for 541# synchronization of firewall state tables (over the net). | 2# 3# NOTES -- Lines that can be cut/pasted into kernel and hints configs. 4# 5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers', 6# 'makeoptions', 'hints', etc. go into the kernel configuration that you 7# run config(8) with. 8# 9# Lines that begin with 'hint.' are NOT for config(8), they go into your --- 524 unchanged lines hidden (view full) --- 534# The `ef' device provides support for multiple ethernet frame types 535# specified via ETHER_* options. See ef(4) for details. 536# 537# The pf packet filter consists of three devices: 538# The `pf' device provides /dev/pf and the firewall code itself. 539# The `pflog' device provides the pflog0 interface which logs packets. 540# The `pfsync' device provides the pfsync0 interface used for 541# synchronization of firewall state tables (over the net). |
542# Requires option PFIL_HOOKS and (when used as a module) option RANDOM_IP_ID | 542# Requires option PFIL_HOOKS |
543# 544# The PPP_BSDCOMP option enables support for compress(1) style entire 545# packet compression, the PPP_DEFLATE is for zlib/gzip style compression. 546# PPP_FILTER enables code for filtering the ppp data stream and selecting 547# events for resetting the demand dial activity timer - requires bpf. 548# See pppd(8) for more details. 549# 550device ether #Generic Ethernet --- 91 unchanged lines hidden (view full) --- 642options PFIL_HOOKS #required by IPFILTER 643options TCPDEBUG 644 645# The MBUF_STRESS_TEST option enables options which create 646# various random failures / extreme cases related to mbuf 647# functions. See mbuf(9) for a list of available test cases. 648options MBUF_STRESS_TEST 649 | 543# 544# The PPP_BSDCOMP option enables support for compress(1) style entire 545# packet compression, the PPP_DEFLATE is for zlib/gzip style compression. 546# PPP_FILTER enables code for filtering the ppp data stream and selecting 547# events for resetting the demand dial activity timer - requires bpf. 548# See pppd(8) for more details. 549# 550device ether #Generic Ethernet --- 91 unchanged lines hidden (view full) --- 642options PFIL_HOOKS #required by IPFILTER 643options TCPDEBUG 644 645# The MBUF_STRESS_TEST option enables options which create 646# various random failures / extreme cases related to mbuf 647# functions. See mbuf(9) for a list of available test cases. 648options MBUF_STRESS_TEST 649 |
650# RANDOM_IP_ID causes the ID field in IP packets to be randomized 651# instead of incremented by 1 with each packet generated. This 652# option closes a minor information leak which allows remote 653# observers to determine the rate of packet generation on the 654# machine by watching the counter. 655options RANDOM_IP_ID 656 | |
657# Statically Link in accept filters 658options ACCEPT_FILTER_DATA 659options ACCEPT_FILTER_HTTP 660 661# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This 662# prevents nmap et al. from identifying the TCP/IP stack, but breaks support 663# for RFC1644 extensions and is not recommended for web servers. 664# --- 1838 unchanged lines hidden --- | 650# Statically Link in accept filters 651options ACCEPT_FILTER_DATA 652options ACCEPT_FILTER_HTTP 653 654# TCP_DROP_SYNFIN adds support for ignoring TCP packets with SYN+FIN. This 655# prevents nmap et al. from identifying the TCP/IP stack, but breaks support 656# for RFC1644 extensions and is not recommended for web servers. 657# --- 1838 unchanged lines hidden --- |