summaryrefslogtreecommitdiff
path: root/net/bridge
diff options
context:
space:
mode:
authorArturo Borrero <arturo.borrero.glez@gmail.com>2014-09-04 16:06:14 +0400
committerPablo Neira Ayuso <pablo@netfilter.org>2014-09-09 18:31:27 +0400
commite42eff8a32f8b7bde88ea3c5a56391407cbe84f3 (patch)
tree39ca3eca0d99acea8c49fc73e79244c63e191af5 /net/bridge
parentb9ac12ef099707f405d7478009564302d7ed8393 (diff)
downloadlinux-e42eff8a32f8b7bde88ea3c5a56391407cbe84f3.tar.xz
netfilter: nft_nat: include a flag attribute
Both SNAT and DNAT (and the upcoming masquerade) can have additional configuration parameters, such as port randomization and NAT addressing persistence. We can cover these scenarios by simply adding a flag attribute for userspace to fill when needed. The flags to use are defined in include/uapi/linux/netfilter/nf_nat.h: NF_NAT_RANGE_MAP_IPS NF_NAT_RANGE_PROTO_SPECIFIED NF_NAT_RANGE_PROTO_RANDOM NF_NAT_RANGE_PERSISTENT NF_NAT_RANGE_PROTO_RANDOM_FULLY NF_NAT_RANGE_PROTO_RANDOM_ALL The caller must take care of not messing up with the flags, as they are added unconditionally to the final resulting nf_nat_range. Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/bridge')
0 files changed, 0 insertions, 0 deletions