It is less secure than the port triggering method as the ports are left open in this method all the time thus it is more prone to the cyber and virus attacks. It can be deployed on more than one system on the network but only one machine can use it at one instance in time. The configuration is done only for one single system or machine on the network. The ports are opened only when they are triggered and for a specific period. The ports on which transmission of data is taken place are opened all the time during the communication. The IP addresses are assigned automatically when triggered. It needs the unique static IP address for configuration at each of the ports. It is a dynamic form of port forwarding method as the ports will open when required and will be closed when not in use. It is a static method of configuration of ports in the network and is mostly used between the nodes which are connected through the Internet via a remote end node. We can understand the differences between the two from the table below:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |