Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Search for a product comparison in Ethernet Switches
Ethernet Switches are crucial network components that enable seamless data transmission across devices within a local area network. They provide high-speed data transfer, ensuring efficient communication between connected devices.Ethernet Switches are designed to deliver robust network management and high-speed connectivity for enterprises and small business networks. They support both data and power over a single cable, allowing for simplified installations and reduced cabling costs....
Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Greater security concerns would require port triggering.
@Michael Carter Thanks. Would you mind elaborating a bit more? What sort of security concerns would require port triggering?