Lines Matching full:matching
511 packets matching some criteria.
613 tristate "Netfilter nf_tables xfrm/IPSec security association matching"
625 This option allows matching for the presence or absence of a
633 This option allows matching packets from an specific OS.
724 Netfilter mark matching allows you to match packets based on the
882 This option adds the `IDLETIMER' target. Each matching packet
1126 BPF matching applies a linux socket filter to each packet and
1137 Socket/process control group matching allows you to match locally
1217 It allows matching on additional conntrack information, which is
1227 CPU matching allows you to match packets based on the CPU
1306 Helper matching allows you to match packets in dynamic connections
1315 HL matching allows you to match packets based on the hoplimit
1371 limit matching allows you to control the rate at which a rule can be
1381 MAC matching allows you to match packets based on the source
1399 Multiport matching allows you to match TCP or UDP packets based on
1433 Socket owner matching allows you to match locally-generated packets
1442 Policy matching allows you to match packets based on the
1453 Physdev packet matching matches against the physical bridge ports
1462 Packet type matching allows you to match a packet by
1509 used addresses and then matching against that/those list(s).
1549 Connection state matching allows you to match packets based on their