diff options
author | dcaiafa@chromium.org <dcaiafa@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-04-30 16:47:31 +0000 |
---|---|---|
committer | dcaiafa@chromium.org <dcaiafa@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-04-30 16:47:31 +0000 |
commit | 573e6777aa7fe9f4fcf66202f9e93e062d120b7c (patch) | |
tree | 836659f93e57cf8dabe7dec9435b41e686bead42 /components/policy/resources/policy_templates.json | |
parent | 71d94dfce9c1989595d60e2737e05420cf6a5d5e (diff) | |
download | chromium_src-573e6777aa7fe9f4fcf66202f9e93e062d120b7c.zip chromium_src-573e6777aa7fe9f4fcf66202f9e93e062d120b7c.tar.gz chromium_src-573e6777aa7fe9f4fcf66202f9e93e062d120b7c.tar.bz2 |
New policies: enable/disable relay; port range
Add new Chromoting policies:
"RemoteAccessHostAllowRelayedConnection"
bool, default true
It can be set to false to disable the use of relay servers if NAT
traversal is enabled.
"RemoteAccessHostUdpPortRange"
string, default ""
Can be used to specify a range in the form "<min-port>-<max-port>" to
restrict the range of UDP ports available to the host for connections.
E.g. "12400-12409"
BUG=355168
Review URL: https://codereview.chromium.org/209323002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@267234 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'components/policy/resources/policy_templates.json')
-rw-r--r-- | components/policy/resources/policy_templates.json | 40 |
1 files changed, 38 insertions, 2 deletions
diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json index a3930d2..22b54d4 100644 --- a/components/policy/resources/policy_templates.json +++ b/components/policy/resources/policy_templates.json @@ -118,7 +118,7 @@ # persistent IDs for all fields (but not for groups!) are needed. These are # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, # because doing so would break the deployed wire format! -# For your editing convenience: highest ID currently used: 262 +# For your editing convenience: highest ID currently used: 264 # # Placeholders: # The following placeholder strings are automatically substituted: @@ -542,7 +542,7 @@ 'example_value': False, 'id': 95, 'caption': '''Enable firewall traversal from remote access host''', - 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. + 'desc': '''Enables usage of STUN servers when remote clients are trying to establish a connection to this machine. If this setting is enabled, then remote clients can discover and connect to this machines even if they are separated by a firewall. @@ -658,6 +658,42 @@ If this setting is disabled or not configured, gnubby authentication requests will not be proxied.''', }, + { + 'name': 'RemoteAccessHostAllowRelayedConnection', + 'type': 'main', + 'schema': { 'type': 'boolean' }, + 'supported_on': ['chrome.*:36-'], + 'features': { + 'dynamic_refresh': True, + 'per_profile': False, + }, + 'example_value': False, + 'id': 263, + 'caption': '''Enable the use of relay servers by the remote access host''', + 'desc': '''Enables usage of relay servers when remote clients are trying to establish a connection to this machine. + + If this setting is enabled, then remote clients can use relay servers to connect to this machine when a direct connection is not available (e.g. due to firewall restrictions). + + Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will be ignored. + + If this policy is left not set the setting will be enabled.''', + }, + { + 'name': 'RemoteAccessHostUdpPortRange', + 'type': 'string', + 'schema': { 'type': 'string' }, + 'supported_on': ['chrome.*:36-'], + 'features': { + 'dynamic_refresh': True, + 'per_profile': False, + }, + 'example_value': '12400-12409', + 'id': 264, + 'caption': '''Restrict the UDP port range used by the remote access host''', + 'desc': '''Restricts the UDP port range used by the remote access host in this machine. + + If this policy is left not set, or if it is set to an empty string, the remote access host will be allowed to use any available port, unless the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, in which case the remote access host will use UDP ports in the 12400-12409 range.''', + }, ], }, { |