Ce site web utilise des cookies pour stocker des informations sur votre appareil. Les cookies aident notre site web à fonctionner normalement et nous montrent comment nous pouvons améliorer votre expérience utilisateur.
En poursuivant votre navigation sur le site, vous acceptez nos politique relative aux cookies et politique de confidentialité.

About “Port Forwarding”

It is well known that the Internet is flooded with constant cyber-attacks. Once connected to the Internet, devices will face all kinds of cyber security problems. Therefore, it is generally recommended that devices not be directly connected to the nternet, unless there are special access purposes.

If P2P or VPN solutions fail to meet the needs of users, who want to have a quick and steady access to the specified port service of the device through the Internet,users may have to choose the traditional "port forwarding" scheme. While this provides easy access to devices, special consideration should be given to cybersecurity controls because these devices will be visible from the internet. If one decides to use this method, it is highly recommended that additional host-based security controls are used to better secure the device.