Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Search for a product comparison in Ethernet Switches
Ethernet Switches are essential networking tools that connect devices within a local area network. They manage the data flow, ensure seamless communication, and enhance network performance.Advancements in Ethernet Switch technology provide networking professionals with numerous benefits such as increased bandwidth capacity, improved management interfaces, and enhanced security features. Ethernet Switches can be found in data centers, enterprise networks, and even small businesses, offering...
Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Greater security concerns would require port triggering.
@Michael Carter Thanks. Would you mind elaborating a bit more? What sort of security concerns would require port triggering?