Well set up port forwarding and watch how quickly you start having attempts at it.
In layman's terms, opening a port for a VPN service is much different than opening a port for an unsecure device like a camera or NVR or straight to BI.
In fact, by default routers and computers have ports open like 22 (SSH for secure remote access), 25 (SMTP for email), 80 (HTTP for web browsing), and 443 (HTTPS for secure web browsing), etc. are common open ports. Go to your computer firewall and you will see many more open ports. All for a specific purpose.
With something like OpenVPN, the open port is like offering your home address but the router/OpenVPN then confirms those knocking have a key (the encryption key of the VPN service) and is still protected by the firewall/antivirus; whereas opening a port that goes straight to BI/NVR/Camera is offering your home address and the front door is open with free access to go to town on getting in.
BI is great, but it doesn't have the millions of users like other programs, so a vulnerability could be sitting there longer before it is realized than say with Windows. And we shut off anti-virus for BI, so.....follow that path - port forward is not a good idea...
In another thread, someone used Censys Search to search for PCs that presented the
Blue Iris login page and found almost 22,000 in the US and a total of about 32,000 worldwide. These are port-forwarded and many have been hacked.
So I noticed
These connections in my connections tab, the bottom is me, but the top 3 I don't know, one is an IP from Florida using a VPN, and the other is a Michigan VPN. What do these mean and why is their connection session 0:00:00:00?
Thanks, sorry I'm a newbie.
Steve