Chromium Code Reviews| Index: components/policy/resources/policy_templates.json |
| diff --git a/components/policy/resources/policy_templates.json b/components/policy/resources/policy_templates.json |
| index a371fa06b78b4a934eedf70b06e1833da73bdea3..c2a5a30aa0bca47863c494762ff0fbdd61357770 100644 |
| --- a/components/policy/resources/policy_templates.json |
| +++ b/components/policy/resources/policy_templates.json |
| @@ -118,7 +118,7 @@ |
| # persistent IDs for all fields (but not for groups!) are needed. These are |
| # specified by the 'id' keys of each policy. NEVER CHANGE EXISTING IDs, |
| # because doing so would break the deployed wire format! |
| -# For your editing convenience: highest ID currently used: 262 |
| +# For your editing convenience: highest ID currently used: 264 |
| # |
| # Placeholders: |
| # The following placeholder strings are automatically substituted: |
| @@ -542,7 +542,7 @@ |
| 'example_value': False, |
| 'id': 95, |
| 'caption': '''Enable firewall traversal from remote access host''', |
| - 'desc': '''Enables usage of STUN and relay servers when remote clients are trying to establish a connection to this machine. |
| + 'desc': '''Enables usage of STUN servers when remote clients are trying to establish a connection to this machine. |
| If this setting is enabled, then remote clients can discover and connect to this machines even if they are separated by a firewall. |
| @@ -658,6 +658,42 @@ |
| If this setting is disabled or not configured, gnubby authentication requests will not be proxied.''', |
| }, |
| + { |
| + 'name': 'RemoteAccessHostAllowRelayedConnection', |
| + 'type': 'main', |
| + 'schema': { 'type': 'boolean' }, |
| + 'supported_on': ['chrome.*:35-'], |
| + 'features': { |
| + 'dynamic_refresh': True, |
| + 'per_profile': False, |
| + }, |
| + 'example_value': False, |
| + 'id': 263, |
| + 'caption': '''Enable the use of relay servers by the remote access host''', |
| + 'desc': '''Enables usage of relay servers when remote clients are trying to establish a connection to this machine. |
| + |
| + If this setting is enabled, then remote clients can use relay servers to connect to the this machine when a direct connection is not available (e.g. due to firewall restrictions). |
| + |
| + Note that if the policy <ph name="REMOTEACCESSHOSTFIREWALLTRAVERSAL_POLICY_NAME">RemoteAccessHostFirewallTraversal</ph> is disabled, this policy will be ignored. |
| + |
| + If this policy is left not set the setting will be enabled.''', |
| + }, |
| + { |
| + 'name': 'RemoteAccessHostUdpPortRange', |
| + 'type': 'string', |
| + 'schema': { 'type': 'string' }, |
| + 'supported_on': ['chrome.*:35-'], |
| + 'features': { |
| + 'dynamic_refresh': True, |
| + 'per_profile': False, |
| + }, |
| + 'example_value': '12400-12409', |
| + 'id': 264, |
| + 'caption': '''Restrict the UDP port range used by the remote access host''', |
| + 'desc': '''Restricts the UDP port range used by the remote access host in this machine. |
|
Sergey Ulanov
2014/03/27 18:31:20
Mention that port range is restricted to 12400-124
dcaiafa
2014/03/27 19:32:24
Done.
|
| + |
| + If this policy is left not set, or if it is set to an empty string, the remote access host will be allowed to use any available ports.''', |
| + }, |
| ], |
| }, |
| { |