Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Search for a product comparison in Ethernet Switches
Ethernet Switches connect multiple devices within a network, enabling smooth data transfer and communication among them. They are essential for businesses that require reliable and high-performance networking capabilities.
High-quality Ethernet Switches offer advanced features such as traffic management, quality of service, and security enhancements. Businesses can choose from a range of configurations and port capacities to fit their specific networking needs. The devices support various...
Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Greater security concerns would require port triggering.
@Michael Carter Thanks. Would you mind elaborating a bit more? What sort of security concerns would require port triggering?