Use this tab to add, define the behavior of, or remove authenticated hosts.
An authorized host is a server, client, or gateway that you explicitly designate as trusted. For example, an authorized host might be a server or client that has already performed authentication but does not appear on the trusted server list. Or, an authorized host might be an Internet Protocol public switched telephone network (IP-PSTN) gateway or other entity that does not perform authentication, but can be trusted anyway.
Servers
This specifies the names of the entities trusted by this Proxy Server.
Outbound Only
Specifies that this server can only make outbound connections to the authorized host. This setting is used only in conjunction with a static route.
Throttle As Server
Specifies that connections made to the authorized host are throttled as though the authorized host is a server instead of a client computer. Greater throughput is allowed for server connections than is allowed for client connections.
Treat As Authenticated
Specifies that connections made to the authorized host are treated as though the authorized host is authenticated. Clients that are connected to an authorized host that is treated as authenticated are also considered to have already been authenticated and, therefore, are not challenged by this Proxy Server.
Add
Add and configure an authorized host.
Edit
Redefine the settings for the selected authorized host.
Remove
Remove the selected authorized host from the Servers list.
Learn More Online
Click to expand or collapse
When you add an authorized host that is treated as authenticated, we recommend that you mitigate the risks by implementing additional security measures such as a firewall or IPsec around the authorized host.
For details, see the Operations section of the Office Communications Server Technical Library.
No comments:
Post a Comment