Solved

how to protect a firewall and leaving port 80 on?

Posted on 2009-05-14
4
357 Views
Last Modified: 2013-11-16
Hi,

I was wondering would be the best way to go about protecting my firewall from hackers and leaving port 80 on as we need that on at all times
0
Comment
Question by:jonathanduane08
  • 2
4 Comments
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383281
Better to monitor the traffic... using any HIPS software
This may help... http://www.experts-exchange.com/Security/Operating_Systems_Security/Windows/Q_23300772.html
0
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383286
0
 
LVL 1

Expert Comment

by:vadirajj
ID: 24383488
Hi Jonathan,

By keeping the Port 80 open , do you mean its for inbound access / outbound access or accessing  Firewall as destination. Usually most of the commercial firewalls  have a rule called Stealth Rule, whihc is the FIRST rule above all admin-configured rules that prevents anyone connecting to the Firewall on any port except the trusted hosts ( Moslty Management stations running the Client GUI ).

If your firewall is a any open-source one, you need to put this in place so that only the trusted inside management station has access-to-firewall, and firewall will not process any Traffic with Itself as Destination.

Vadiraj
0
 
LVL 3

Accepted Solution

by:
bleech677 earned 500 total points
ID: 24389311
Keep your web server updated - you also have to consider security holes that your website may have open e.g. sql injection from bad programming by you developers. Your firewall my also be able to look at what is coming over the connection by inspection the packets and stop certain things on a blacklist
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question