Deleted Added
full compact
NOTES (171568) NOTES (171732)
1# $FreeBSD: head/sys/conf/NOTES 171568 2007-07-24 15:35:02Z scottl $
1# $FreeBSD: head/sys/conf/NOTES 171732 2007-08-05 16:16:15Z bz $
2#
3# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
4#
5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
6# 'makeoptions', 'hints', etc. go into the kernel configuration that you
7# run config(8) with.
8#
9# Lines that begin with 'hint.' are NOT for config(8), they go into your

--- 486 unchanged lines hidden (view full) ---

496options INET #Internet communications protocols
497options INET6 #IPv6 communications protocols
498
499# In order to enable IPSEC you MUST also add device crypto to
500# your kernel configuration
501options IPSEC #IP security (requires device crypto)
502#options IPSEC_DEBUG #debug for IP security
503#
2#
3# NOTES -- Lines that can be cut/pasted into kernel and hints configs.
4#
5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers',
6# 'makeoptions', 'hints', etc. go into the kernel configuration that you
7# run config(8) with.
8#
9# Lines that begin with 'hint.' are NOT for config(8), they go into your

--- 486 unchanged lines hidden (view full) ---

496options INET #Internet communications protocols
497options INET6 #IPv6 communications protocols
498
499# In order to enable IPSEC you MUST also add device crypto to
500# your kernel configuration
501options IPSEC #IP security (requires device crypto)
502#options IPSEC_DEBUG #debug for IP security
503#
504# Set IPSEC_FILTERGIF to force packets coming through a gif tunnel
505# to be processed by any configured packet filtering (ipfw, ipf).
506# The default is that packets coming from a tunnel are _not_ processed;
504# Set IPSEC_FILTERTUNNEL to force packets coming through a tunnel
505# to be processed by any configured packet filtering twice.
506# The default is that packets coming out of a tunnel are _not_ processed;
507# they are assumed trusted.
508#
509# IPSEC history is preserved for such packets, and can be filtered
510# using ipfw(8)'s 'ipsec' keyword, when this option is enabled.
511#
507# they are assumed trusted.
508#
509# IPSEC history is preserved for such packets, and can be filtered
510# using ipfw(8)'s 'ipsec' keyword, when this option is enabled.
511#
512#options IPSEC_FILTERGIF #filter ipsec packets from a tunnel
512#options IPSEC_FILTERTUNNEL #filter ipsec packets from a tunnel
513
514options IPX #IPX/SPX communications protocols
515
516options NCP #NetWare Core protocol
517
518options NETATALK #Appletalk communications protocols
519options NETATALKDEBUG #Appletalk debugging
520

--- 2157 unchanged lines hidden ---
513
514options IPX #IPX/SPX communications protocols
515
516options NCP #NetWare Core protocol
517
518options NETATALK #Appletalk communications protocols
519options NETATALKDEBUG #Appletalk debugging
520

--- 2157 unchanged lines hidden ---