NOTES (171568) | NOTES (171732) |
---|---|
1# $FreeBSD: head/sys/conf/NOTES 171568 2007-07-24 15:35:02Z scottl $ | 1# $FreeBSD: head/sys/conf/NOTES 171732 2007-08-05 16:16:15Z bz $ |
2# 3# NOTES -- Lines that can be cut/pasted into kernel and hints configs. 4# 5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers', 6# 'makeoptions', 'hints', etc. go into the kernel configuration that you 7# run config(8) with. 8# 9# Lines that begin with 'hint.' are NOT for config(8), they go into your --- 486 unchanged lines hidden (view full) --- 496options INET #Internet communications protocols 497options INET6 #IPv6 communications protocols 498 499# In order to enable IPSEC you MUST also add device crypto to 500# your kernel configuration 501options IPSEC #IP security (requires device crypto) 502#options IPSEC_DEBUG #debug for IP security 503# | 2# 3# NOTES -- Lines that can be cut/pasted into kernel and hints configs. 4# 5# Lines that begin with 'device', 'options', 'machine', 'ident', 'maxusers', 6# 'makeoptions', 'hints', etc. go into the kernel configuration that you 7# run config(8) with. 8# 9# Lines that begin with 'hint.' are NOT for config(8), they go into your --- 486 unchanged lines hidden (view full) --- 496options INET #Internet communications protocols 497options INET6 #IPv6 communications protocols 498 499# In order to enable IPSEC you MUST also add device crypto to 500# your kernel configuration 501options IPSEC #IP security (requires device crypto) 502#options IPSEC_DEBUG #debug for IP security 503# |
504# Set IPSEC_FILTERGIF to force packets coming through a gif tunnel 505# to be processed by any configured packet filtering (ipfw, ipf). 506# The default is that packets coming from a tunnel are _not_ processed; | 504# Set IPSEC_FILTERTUNNEL to force packets coming through a tunnel 505# to be processed by any configured packet filtering twice. 506# The default is that packets coming out of a tunnel are _not_ processed; |
507# they are assumed trusted. 508# 509# IPSEC history is preserved for such packets, and can be filtered 510# using ipfw(8)'s 'ipsec' keyword, when this option is enabled. 511# | 507# they are assumed trusted. 508# 509# IPSEC history is preserved for such packets, and can be filtered 510# using ipfw(8)'s 'ipsec' keyword, when this option is enabled. 511# |
512#options IPSEC_FILTERGIF #filter ipsec packets from a tunnel | 512#options IPSEC_FILTERTUNNEL #filter ipsec packets from a tunnel |
513 514options IPX #IPX/SPX communications protocols 515 516options NCP #NetWare Core protocol 517 518options NETATALK #Appletalk communications protocols 519options NETATALKDEBUG #Appletalk debugging 520 --- 2157 unchanged lines hidden --- | 513 514options IPX #IPX/SPX communications protocols 515 516options NCP #NetWare Core protocol 517 518options NETATALK #Appletalk communications protocols 519options NETATALKDEBUG #Appletalk debugging 520 --- 2157 unchanged lines hidden --- |