About “Port Forwarding”

About “Port Forwarding”

It is well known that the Internet is flooded with constant cyber-attacks. Once connected to the Internet, devices will face all kinds of cyber security problems. Therefore, it is generally recommended that devices not be directly connected to the nternet, unless there are special access purposes.

If P2P or VPN solutions fail to meet the needs of users, who want to have a quick and steady access to the specified port service of the device through the Internet,users may have to choose the traditional "port forwarding" scheme. While this provides easy access to devices, special consideration should be given to cybersecurity controls because these devices will be visible from the internet. If one decides to use this method, it is highly recommended that additional host-based security controls are used to better secure the device.

This website uses cookies to store info on your device. Cookies help our website work normally and show us how we can improve your user experience.
By continuing to browse the site you are agreeing to our cookie policy and privacy policy.

Bize Ulaşın
back to top

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.