Solved

how to protect a firewall and leaving port 80 on?

Posted on 2009-05-14
4
345 Views
Last Modified: 2013-11-16
Hi,

I was wondering would be the best way to go about protecting my firewall from hackers and leaving port 80 on as we need that on at all times
0
Comment
Question by:jonathanduane08
  • 2
4 Comments
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383281
Better to monitor the traffic... using any HIPS software
This may help... http://www.experts-exchange.com/Security/Operating_Systems_Security/Windows/Q_23300772.html
0
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383286
0
 
LVL 1

Expert Comment

by:vadirajj
ID: 24383488
Hi Jonathan,

By keeping the Port 80 open , do you mean its for inbound access / outbound access or accessing  Firewall as destination. Usually most of the commercial firewalls  have a rule called Stealth Rule, whihc is the FIRST rule above all admin-configured rules that prevents anyone connecting to the Firewall on any port except the trusted hosts ( Moslty Management stations running the Client GUI ).

If your firewall is a any open-source one, you need to put this in place so that only the trusted inside management station has access-to-firewall, and firewall will not process any Traffic with Itself as Destination.

Vadiraj
0
 
LVL 3

Accepted Solution

by:
bleech677 earned 500 total points
ID: 24389311
Keep your web server updated - you also have to consider security holes that your website may have open e.g. sql injection from bad programming by you developers. Your firewall my also be able to look at what is coming over the connection by inspection the packets and stop certain things on a blacklist
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The month of August was another action packed month for hackers and a security nightmare for many retailers and restaurant establishments. Some of the more notable data breach victims this past month included supermarket giants SUPERVALU and Alberts…
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now