About “Port Forwarding”

About “Port Forwarding”

It is well known that the Internet is flooded with constant cyber-attacks. Once connected to the Internet, devices will face all kinds of cyber security problems. Therefore, it is generally recommended that devices not be directly connected to the nternet, unless there are special access purposes.

If P2P or VPN solutions fail to meet the needs of users, who want to have a quick and steady access to the specified port service of the device through the Internet,users may have to choose the traditional "port forwarding" scheme. While this provides easy access to devices, special consideration should be given to cybersecurity controls because these devices will be visible from the internet. If one decides to use this method, it is highly recommended that additional host-based security controls are used to better secure the device.

يستخدم هذا الموقع ملفات تعريف الارتباط لتخزين المعلومات على جهازك. تساعد ملفات تعريف الارتباط موقعنا على العمل بشكل طبيعي وتبين لنا كيف يمكننا تحسين تجربة المستخدم الخاصة بك.
من خلال الاستمرار في تصفح الموقع، فإنك توافق على  سياسة ملفات تعريف الارتباط  و سياسة الخصوصية

اتصل بنا