Walter.BOM Namespace
Walter.Web.FireWall Namespace
ASP-WAF | .Net API for WAF Systems

UrlValidatedResult Enumeration

Enum UrlValidatedResult returns what rule was violated by the rule engine executing blockedPatterns

Namespace:  Walter.Web.FireWall.RuleEngine
Assembly:  Walter.Web.FireWall (in Walter.Web.FireWall.dll)

Syntax


public enum UrlValidatedResult

Members


Member nameDescription
OK The result is OK using the current rule-set
NotSupportedPlatform The not supported platform
NotUsedPlugin The not used plug-in
NoPublicAccessToAdministration The no public access to administration
NoSuchDirectoryExists The no such directory exists
NoUserAuthenticationExists The no user authentication exists
NoOnlinePaymentSystemExists The no on-line payment system exists
NoPublicAccessToConfigurationAllowed The no public access to configuration allowed
NoPublicAccessToBackupsAllowed The no public access to backups allowed
NoPublicAccessToFileDirectoryAllowed The no public access to file directory allowed
NoPublicAccessToApplicationCodeAllowed The no public access to application code allowed
UrlFishingSuspected The URL fishing suspected
ScriptInjectionNotAllowed The script injection not allowed
OperatingSystemAccessProhibited The operating system access prohibited
DatabasesAreNotPubliclyAccessible The databases are not publicly accessible
RequestFromBlacklistedCountry The request from blacklisted country
RequestPerSecondLooksLikeScrubbingOrDDOS The request per second looks like scrubbing or DDOS
CrossSiteUrlDetected The cross site URL detected
SaltFromCookieAndSaltProvidedDoNotMatch The salt from cookie and salt provided do not match
SaltWasNotProvidedInHeaderOfUrl The salt was not provided in header of URL
SaltExpired The salt expired
NoAccessToPaymentSystem The no access to payment system
RequestFromBlacklistedCountryOrAtBrowser The request from blacklisted country or at browser
AddhockFileAccess The add-hock file access
QueryParameterInjection Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters are added
QueryParameterOmission Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters are left out
QueryParameterManipulation Semantic URL attack detected as an query string is presented in such a way that it does not match the url's signature as parameters not compatible with the data type expected