It (mostly) does not matter
If you just want to reduce the number of login attempts in the server's system log, either approach is fine.
To be specific here are the two approaches:
- You can have the router listen to say port 220022 and set it to forward it to port 22 of the IP 192.168.1.200. This way you don't have to edit the
sshd_config in the server.
- You can have the router listen to say port 220022 and set it to forward it to port 220022 of the IP 192.168.1.200. This way you have to edit the
sshd_config in the server so that it does not listen to the default port 22 and listens to the port you selected.
What about local threats?
If you are worried about someone at your home breaking into your server or someone in a black van parking outside your home and then breaking into your home WiFi network, and then try to break into your server. Then just changing the default port probably won't save you.
Other measures
As pointed out by Thomas Ward in the comments, restricting ssh access to only a few external IP address is a better security measure. See Restrict SSH Access to Specific IP for User for how to do that.
This works if you have a handful of remote locations (say office and sister's place) to login from. It is different if you travel a lot and want to login from all the hotel's Internet.
VPN to solve the "hotel" problem
You will need a VPN service, either provided by your employer or a consumer-grade paid VPN. Then you can add the VPN server's IP address (or a range of IP addresses) to the list of allowed IP addresses. When on the road (in a hotel) connect to the VPN first and then connect to your ssh server.
Stop the Brute Force
There are various tools to stop repeated unsuccessful attempts (brute force) to ssh. fail2ban and sshguard are both highly regarded.
Hope this helps
sshd_config. – user68186 Apr 24 '22 at 16:25sshguardandfail2banare good choices for denial of repeat login attempts that fail. I strongly recommend using one of those options for adding protection to your SSH server. – Thomas Ward Apr 24 '22 at 17:05