/external/iptables/extensions/ |
libipt_SNAT.man | 2 .B nat 27 Later Kernels (>= 2.6.11-rc1) don't have the ability to NAT to multiple ranges
|
libipt_REDIRECT.man | 2 .B nat
|
libipt_MASQUERADE.man | 2 .B nat
|
libipt_addrtype.man | 28 .BI "NAT"
|
/external/kernel-headers/original/linux/netfilter/ |
nf_conntrack_common.h | 4 but required by, the NAT layer; it can also be used by an iptables 44 /* Connection needs src nat in orig dir. This bit never changed. */ 48 /* Connection needs dst nat in orig dir. This bit never changed. */ 59 /* NAT initialization bits. */ 121 /* NAT info */
|
nf_conntrack_ftp.h | 33 /* For NAT to hook in when we find a packet which describes what other
|
/external/ipsec-tools/ |
NEWS | 6 o Fixed a NAT-T flag check 14 o NAT-T fixes related to purging of IPsec SA:s and retransmission 58 o NAT-T works with multiple peers behind the NAT (need kernel support) 102 o Fixed NAT-T with more proposals (e.g. more crypto algos). 109 o Fixed NAT-T in aggresive mode. 118 o Added documentation for NAT-T 119 o Better NAT-T diagnostic. 123 o Support for NAT Traversal (NAT-T [all...] |
/external/ipsec-tools/src/racoon/ |
vendorid.c | 62 { VENDORID_NATT_00 , "draft-ietf-ipsec-nat-t-ike-00" }, 63 { VENDORID_NATT_01 , "draft-ietf-ipsec-nat-t-ike-01" }, 64 { VENDORID_NATT_02 , "draft-ietf-ipsec-nat-t-ike-02" }, 65 { VENDORID_NATT_02_N , "draft-ietf-ipsec-nat-t-ike-02\n" }, 66 { VENDORID_NATT_03 , "draft-ietf-ipsec-nat-t-ike-03" }, 67 { VENDORID_NATT_04 , "draft-ietf-ipsec-nat-t-ike-04" }, 68 { VENDORID_NATT_05 , "draft-ietf-ipsec-nat-t-ike-05" }, 69 { VENDORID_NATT_06 , "draft-ietf-ipsec-nat-t-ike-06" }, 70 { VENDORID_NATT_07 , "draft-ietf-ipsec-nat-t-ike-07" }, 71 { VENDORID_NATT_08 , "draft-ietf-ipsec-nat-t-ike-08" } [all...] |
isakmp.h | 93 /* NAT-T draft-ietf-ipsec-nat-t-ike-05 and later */ 95 #define ISAKMP_NPTYPE_NATD_BADDRAFT 15 /* NAT Discovery */ 96 #define ISAKMP_NPTYPE_NATOA_BADDRAFT 16 /* NAT Original Address */ 99 /* NAT-T RFC */ 100 #define ISAKMP_NPTYPE_NATD_RFC 20 /* NAT Discovery */ 101 #define ISAKMP_NPTYPE_NATOA_RFC 21 /* NAT Original Address */ 103 /* NAT-T up to draft-ietf-ipsec-nat-t-ike-04 */ 104 #define ISAKMP_NPTYPE_NATD_DRAFT 130 /* NAT Discovery * [all...] |
/dalvik/dx/src/com/android/dx/rop/cst/ |
CstFieldRef.java | 44 * @param nat {@code non-null;} the name-and-type 46 public CstFieldRef(CstType definingClass, CstNat nat) { 47 super(definingClass, nat);
|
/dalvik/dx/tests/002-minimal-valid/ |
small-class.txt | 19 0c 0004 0005 # 0007: nat[0004, 0005]
|
expected.txt | 15 0007: nat{<init>:()V}
|
/external/iptables/ |
ip6tables-restore.8 | 49 The iptables-HOWTO, which details more iptables usage, the NAT-HOWTO, 50 which details NAT, and the netfilter-hacking-HOWTO which details the
|
ip6tables-save.8 | 48 The iptables-HOWTO, which details more iptables usage, the NAT-HOWTO, 49 which details NAT, and the netfilter-hacking-HOWTO which details the
|
iptables-restore.8 | 47 The iptables-HOWTO, which details more iptables usage, the NAT-HOWTO, 48 which details NAT, and the netfilter-hacking-HOWTO which details the
|
iptables-save.8 | 46 The iptables-HOWTO, which details more iptables usage, the NAT-HOWTO, 47 which details NAT, and the netfilter-hacking-HOWTO which details the
|
/external/ipsec-tools/src/racoon/doc/ |
FAQ | 36 Enable NAT-Traversal. This needs kernel support, which is 37 available on Linux. On NetBSD, NAT-Traversal kernel support 41 using NAT-Traversal might infringe a patent. 45 able to ditinguish peers hidden behind the same NAT. 49 behind the same NAT.
|
/system/netd/ |
NatController.cpp | 81 if (runIptablesCmd("-t nat -F")) 130 // add this if we are the first added nat 132 snprintf(cmd, sizeof(cmd), "-t nat -A POSTROUTING -o %s -j MASQUERADE", extIface);
|
/dalvik/dx/src/com/android/dx/cf/direct/ |
FieldListParser.java | 78 protected Member set(int n, int accessFlags, CstNat nat, 81 new StdField(getDefiner(), accessFlags, nat, attributes);
|
MethodListParser.java | 78 protected Member set(int n, int accessFlags, CstNat nat, 81 new StdMethod(getDefiner(), accessFlags, nat, attributes);
|
/external/dnsmasq/contrib/port-forward/ |
dnsmasq-portforward | 55 ${IPTABLES} -t nat -D PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst 57 ${IPTABLES} -t nat -A PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
|
/external/iproute2/ip/ |
rtm_map.c | 49 return "nat"; 66 else if (strcmp(arg, "nat") == 0)
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
phase1-down.sh | 57 # Use this for a NAT-T setup 61 # Use this for a non NAT-T setup
|
phase1-up.sh | 50 # Use this for a NAT-T setup 54 # Use this for a non NAT-T setup
|
/dalvik/dx/src/com/android/dx/dex/file/ |
StringIdsSection.java | 159 * @param nat {@code non-null;} the name-and-type 161 public void intern(CstNat nat) { 162 intern(nat.getName()); 163 intern(nat.getDescriptor());
|