how to protect a firewall and leaving port 80 on?

Posted on 2009-05-14
Last Modified: 2013-11-16

I was wondering would be the best way to go about protecting my firewall from hackers and leaving port 80 on as we need that on at all times
Question by:jonathanduane08
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2

Expert Comment

ID: 24383281
Better to monitor the traffic... using any HIPS software
This may help...

Expert Comment

ID: 24383286

Expert Comment

ID: 24383488
Hi Jonathan,

By keeping the Port 80 open , do you mean its for inbound access / outbound access or accessing  Firewall as destination. Usually most of the commercial firewalls  have a rule called Stealth Rule, whihc is the FIRST rule above all admin-configured rules that prevents anyone connecting to the Firewall on any port except the trusted hosts ( Moslty Management stations running the Client GUI ).

If your firewall is a any open-source one, you need to put this in place so that only the trusted inside management station has access-to-firewall, and firewall will not process any Traffic with Itself as Destination.


Accepted Solution

bleech677 earned 500 total points
ID: 24389311
Keep your web server updated - you also have to consider security holes that your website may have open e.g. sql injection from bad programming by you developers. Your firewall my also be able to look at what is coming over the connection by inspection the packets and stop certain things on a blacklist

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question