Walter.Web.FireWall
RulesConfig Class Properties


Walter.Web.FireWall Assembly > Walter.Web.FireWall.Configurations Namespace : RulesConfig Class

For a list of all members of this type, see RulesConfig members.

Public Properties
 NameDescription
Public Property If true allow the download of protected resources without having been used on a page, normally indicates a developer loading the resource  
Public Property AllowRaiseIncident violations if the IP address is a IP address of this server  
Public Property Gets or sets the times you would like to allow non ASP net requests and redirect it to the home page or the special redirect url for.  
Public Property Gets or sets the timespan for non ASP net requests will be measured in.  
Public Property Gets or sets the times you would like to allow Penetration probing and redirect it to the home page or the special redirect url for.  
Public Property Gets or sets the timespan for non ASP net requests will be measured in.  
Public Property Defines the user group that would be granted access to endpoints. By default any user will be allowed except those as identified as being malicious.  
Public Property Indicates if white-listing is allowed regardless of the configuration.  
Public PropertyWill by default, disable the firewall from applying rules to all physical/ static files.  
Public Property Gets or sets the blacklist level for when detecting when any of the honey pot ports is being access.  
Public PropertyThe blocking patterns that are used for rejecting penetration attempts  
Public Property Block users with HoneyPot access  
Public Property Gets or sets the block duration for non ASP net requests.  
Public Property Gets or sets the block duration for non ASP net requests.  
Public Property If true, the default it will blocks replay attempts  
Public Property Default value for how to deal with blocking request on endpoints that have no rules configured by use of attribute annotations.  
Public Property Gets or sets a value indicating whether to block tor requests.  
Public Property Block requests from user Bots and Browser that have been flagged as "ConsideredMalicious"  
Public Propertystatic (Shared in Visual Basic) Default configuration  
Public Property the Default trust level a Internet service provider must have for the UTL to be served  
Public Property Gets or sets the guard action event identifier.  
Public Property Gets or sets the guard action log level.  
Public Property headers configuration in regards to rules  
Public Property Honey-pot listener configurations monitoring non HTTP requests  
Public Property Gets a value indicating whether to ignore requests that are not discovered or not listed in [DomainKey].DiscoveRrouts.json.  
Public Property Ignore Robots.txt rules  
Public Property Gets or sets the incident event identifier.  
Public Property Gets or sets the incident log level.  
Public Property Gets or sets a value indicating whether to load endpoint configuration from disk.  
Public Property If set to a set of values, say the firewall will notify if communication outside of the noted ports occurred by any DLL in the solution. You can access this throe the firewall's interface IFireWall.IregularNetworkCommunications  
Public Property Rules to disable at a application level  
Public PropertyReasons that will cause the disk logger to not write block rules to disk file for physical firewall integration  
Public Property Gets or sets the interval used to propagate expired rules in minutes.  
Public Property If set, the firewall will redirect all requests to the indicated URI.  
Public Property Gets or sets the redirect browser when users are using the browsers developer tools. set to Null or String.Empty to disable  
Public PropertyGet or set the redirect URL for all non ASP net requests if the AllowNonAspNetRequests frequency in AllowNonAspNetRequestsIn has not been violated.  
Public PropertyGet or set the redirect URL for penetration attempts if the AllowPenetrationAttempts frequency in AllowPenetrationAttemptsIn has not been violated.  
Public Property Gets or sets the redirect when a Tor requests is detected.  
Public Property Gets or sets the redirect URL when phishing is detected, this might be a old link or some one manually types a link that does not exists.  
Public Property Define the user groups that would get rejected by default. If nothing is specified then the default type that will always get rejected is any user group identified as malicious  
Public Property Access the rules that are defined  
Public Property Indicate to test for all violations to collect more malicious activity, of to save CPU time and cancel evaluating rules after the first incident.  
Public Property If set to true the firewall will no longer serve requests  
Public Property Gets or sets the tolerate maximum violations allowed in the TolerateMaximumViolationsIn timespan settings (default 1 incidents in 1 minute).  
Public Property Gets or sets the tolerate maximum violations in a given Timespan, the longer the time the more restrictive and the more likely a user will get rejected.  
Public Property Gets or sets a value indicating whether to tolerate wrong protocol method, meaning a post when expecting a get, this usually indicates a bug in development or a scripted attack in production.  
Public PropertyA list of trusted domains in that are picked up by the CrossSite when assuming access to a endpoint is to be limited.  
Public Property The value is set by the runtime and is used in reporting indicating the level of protection that is enabled.  
Public Property Will tell the violation to expire after a given time, the default is 20 minutes. Use annotations to control firewall blocking rules  
Top
See Also

Reference

RulesConfig Class
Walter.Web.FireWall.Configurations Namespace