ASP-WAF Web application firewall for .Net 5, .Net Standard 2.1 and .Net Core 3.x

Walter.Web.FireWall.Annotations Namespace

Classes


  Class Description
Public class ActionProtectorAttribute
Class ActionProtectorAttribute allows you to discover malicious activity against actions and the models that are posted to these actions
Public class AddhockAttribute
Reject add-hock requests
Public class BaseFireWallAttribute
base class for firewall annotation attributes
Public class BlockDurationAttribute
This attribute allows you to configure a specific rule on a controller or a specific action end enables you to specify how long something should be blocked. Implements the Attribute
Public class CrossSiteAttribute
Prevents Cross-site request (or CSRF) disallow an attacker to induce actions that they do not intend to. Only HTTPS requests are supported!
Public class DisableFirewallAttribute
Disables all rules and validations on an endpoint(s) by the firewall, basically it's an Always-Off for an endpoint
Public class FireWallAttribute
Protects and block any requests that are in violation on URL type pattern attacks and allow only a the specified user types
Public class GeoBlockAttribute
This annotation allows for the granular control GEO blocking in the firewall if GEO blocking modules are registered in service configuration
Public class GeoIgnoreAttribute
Tells the Firewall to ignore geographically access filters to an endpoint Implements the Attribute
Public class HitRatioAttribute
The hit ratio attribute set rule of how often a user is allowed to access the action in a given time. This method specifically helps when protecting probing password recovery or logins or resubmitting the same page scrubbing for data.
Public class IgnoreAttribute
Tells the firewall to ignore this controller or action and perform no actions at all. This is especially use full for those endpoints that do error handling. Implements the Attribute
Public class KnownBadBoysAttribute
Reject known malicious users
Public class LimitReffererAttribute
Attribute used to limit the locations where your API or Action can be called from. to a singe resource
Public class MaliciousUserAgentsAttribute
Will reject all requests from UserAgents used by bots or browsers that are considered to me malicious
Public class MinifyAttribute
Will minify the Razor output if the request is a HTTPGet and does not contain an error.
Public class ModelFilterAttribute
Validates that the model send back to the application is in the right scope
Public class NoCacheAttribute
Tells the razor engine to include not cash the response in any form or way guarantying that the action is re-executed
Public class PageRefreshAttribute
Tells the firewall how ofter a page can be refreshed by the user during a page visit. Implements the Attribute
Public class PageScrubbingAttribute
Page scrubbing attribute indicates that the endpoint will be protected from data scrubbing
Public class PoisonedCookiesAttribute
Rule for dealing with poisoned cookies
Public class SecureCookiesAttribute Obsolete.
Ensure that all cookies are secure unless explicitly specified and data in the cookie is GDPR protected if at all possible
Public class UsersAttribute
Class FireWallAttribute stating what type of consumers are allowed. Helps mitigate scrubbing and bots reading the sites data
Public class WhiteListIPAttribute
White-List IP address single or ranges for a specific guard action
Public class WhiteListSubnetAttribute
AllowRaiseIncident access only to all resources if they are in the same subnet as the server

Structures


  Structure Description
Public structure WhiteListSubnetAttribute..::..IPRange
Struct IPRange

Interfaces


  Interface Description
Public interface IEndpointBlockRule
the blocking rule assigned to an endpoint
Public interface IEndpointRule
the rule assigned to an endpoint