A host must of course not forward any guest’s traffic to any arbitrary remote station—thus, a central question remains: how can a host verify that it is safe to forward traffic between a guest and an IP address on the Internet which this guest claims to be her remote station? Or, simpler: how to prevent guests from naming an incorrect remote station? Clearly, some form of authentication is necessary.