However, to ensure that requests from trusted servers are not denied, you can specify a list of trusted IP addresses. Requests from these trusted IP addresses are always allowed. For more information about trusted IP address ranges, see
About Trusted IP Addresses.