how to protect a firewall and leaving port 80 on?

Posted on 2009-05-14
Last Modified: 2013-11-16

I was wondering would be the best way to go about protecting my firewall from hackers and leaving port 80 on as we need that on at all times
Question by:jonathanduane08
  • 2

Expert Comment

ID: 24383281
Better to monitor the traffic... using any HIPS software
This may help...

Expert Comment

ID: 24383286

Expert Comment

ID: 24383488
Hi Jonathan,

By keeping the Port 80 open , do you mean its for inbound access / outbound access or accessing  Firewall as destination. Usually most of the commercial firewalls  have a rule called Stealth Rule, whihc is the FIRST rule above all admin-configured rules that prevents anyone connecting to the Firewall on any port except the trusted hosts ( Moslty Management stations running the Client GUI ).

If your firewall is a any open-source one, you need to put this in place so that only the trusted inside management station has access-to-firewall, and firewall will not process any Traffic with Itself as Destination.


Accepted Solution

bleech677 earned 500 total points
ID: 24389311
Keep your web server updated - you also have to consider security holes that your website may have open e.g. sql injection from bad programming by you developers. Your firewall my also be able to look at what is coming over the connection by inspection the packets and stop certain things on a blacklist

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Exchange 2010 DAG 8 85
bypass UAC - always notifiy 4 55
Ransomware 9 63
webroot plus microsoft security essentials 2 68
These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
Malicious software is nothing new. Viruses have been created and spread since before physical networks became popular; back then viruses spread via floppy disk and modem connections with shared systems. Viruses weren't so rampant and protecting your…
Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now