?
Solved

how to protect a firewall and leaving port 80 on?

Posted on 2009-05-14
4
Medium Priority
?
384 Views
Last Modified: 2013-11-16
Hi,

I was wondering would be the best way to go about protecting my firewall from hackers and leaving port 80 on as we need that on at all times
0
Comment
Question by:jonathanduane08
  • 2
4 Comments
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383281
Better to monitor the traffic... using any HIPS software
This may help... http://www.experts-exchange.com/Security/Operating_Systems_Security/Windows/Q_23300772.html
0
 
LVL 5

Expert Comment

by:mfhorizon
ID: 24383286
0
 
LVL 1

Expert Comment

by:vadirajj
ID: 24383488
Hi Jonathan,

By keeping the Port 80 open , do you mean its for inbound access / outbound access or accessing  Firewall as destination. Usually most of the commercial firewalls  have a rule called Stealth Rule, whihc is the FIRST rule above all admin-configured rules that prevents anyone connecting to the Firewall on any port except the trusted hosts ( Moslty Management stations running the Client GUI ).

If your firewall is a any open-source one, you need to put this in place so that only the trusted inside management station has access-to-firewall, and firewall will not process any Traffic with Itself as Destination.

Vadiraj
0
 
LVL 3

Accepted Solution

by:
bleech677 earned 1500 total points
ID: 24389311
Keep your web server updated - you also have to consider security holes that your website may have open e.g. sql injection from bad programming by you developers. Your firewall my also be able to look at what is coming over the connection by inspection the packets and stop certain things on a blacklist
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.
Spectre and Meltdown, how it affects me and my clients?
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

590 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question