ASP-WAF Web application firewall for .Net 5, .Net Standard 2.1 and .Net Core 3.x

FireWallGuardModules Enumeration

Enumerable that contains FireWall Guard Module names. The even though there are more guard modules that are active, this however is the list of rules that can be managed by means of configuration.

Namespace:  Walter.Web.FireWall.Filters
Assembly:  Walter.Web.FireWall (in Walter.Web.FireWall.dll)

Syntax


[FlagsAttribute]
public enum FireWallGuardModules

Members


Member nameDescription
None Indicates none set to be ignored or tested depending on the context
RejectKnownBadBoys The reject known bad boys rule
RejectDDOS The reject distributed denial of service request rule
IsBlocked The manual is blocked rule, can be set by any user code by calling the Block() method from the IFirewall instance
RejectNonAspNet The request is a non ASP net request rule
RejectPenetrationAttempts Reject penetration attempts rule
RejectRepeatViolations The reject known bad boys that are causing repeat violations
RejectWrongUserTypeThe reject requests from wrong user category like IsHuman or distinction like IsMalliciouse types rule
RejectWrongProtocol The reject wrong protocol requests rule
RejectAddHockRequests The reject add hock requests rule
EmbeddedResources Embedded resources rule
RejectHitRatioViolations The reject hit ratio violations
RejectRefreshViolations The reject refresh violations rule
RejectScrubbing The reject scrubbing rule
RejectInvalidUserSalt User presented the wrong cipher salt to the response or request
RejectInvalidUserSessionId Reject those that have the wrong firewall session id
RejectInvalidUserPageGroupHeader reject those that have an invalid PageGroup identifier.
RejectCrossSiteRequests Reject access to a resource if not from internal domain or from a domain that is white-listed (protects HttpPost requests)
RejectInvalidUserSessionHeaderId Invalid session header in request
RejectWrongGeography User access from the wrong geographic region
EarlyUserDiscovery early user discovery modules
RejectPhsishing early user discovery modules
RejectSemanticUrlAttack Reject semantic url attacks
RejectAgentsConsideredMalicious Reject requests from browsers and bots that are considered to be Malicious
RejectPoisonedCookies Reject requests where the firewall detects poisoned cookies
ALL Combination of almost all modules that can be disabled
API_ENDPOINT shorthand for the modules that are typically skipped for API endpoints
API_ENDPOINT_LAX shorthand for the modules that are typically skipped for API endpoints where you allow even those that are blocked to access the endpoint
AJAX_ENDPOINT shorthand for the modules that are typically skipped for AJAX script endpoints