What are port forwarding and port triggering typically used for?
Port forwarding alone requires your main computer to have greater security measures in place because you've essentially opened the door for anyone that can access the remote device or computer and would highly recommend a VPN as well. Someone can hack into the connected device and enter through the forwarded port. BUT port triggering, like a doorman at a club, would keep that door/port closed until you needed to access it which protocol would let you in the door to the bar with the proper ID to have that drink but not the patrons without ID that don't belong to this club. Keeping out the riff-raff.
Greater security concerns would require port triggering.
@Michael Carter Thanks. Would you mind elaborating a bit more? What sort of security concerns would require port triggering?
What sort of network would benefit from switch stacking? Are there any drawbacks to taking this approach? What would be an alternative to stack switches?
I'm a Pre-sales and Project Management Engineer at a small consultancy. We are looking for an alternative to the Juniper CGS2520 switch. Any recommendations?