Where can I find info on creating an operating procedure for TCP/IP ports?
Presently, we have applications under development which will use port 80.
The client will dial-in remotely and establish connections to port 80 and
ports 1526. These applications are behind the company's firewall. Can anyone
who develops software recommend ways to secure access to the application
without breaching the company's security. Port 80 appears to be the only
way to have access to these software. Correction. The severs will reside
outside the Corporate firewall behind another firewall in the DMZ. Thanks.
Wendy