Walter.Web.FireWall
FireWallGuardActions Enumeration
Walter.Web.FireWall Assembly > Walter.Web.FireWall.Filters Namespace : FireWallGuardActions Enumeration
Enumerable that contains FireWall Guard Module names.
Syntax
public enum FireWallGuardActions : System.Enum 
Members
MemberDescription
AJAX_ENDPOINT shorthand for the modules that are typically skipped for AJAX script endpoints
ALL Combination of almost all modules that can be disabled
API_ENDPOINT shorthand for the modules that are typically skipped for API endpoints
API_ENDPOINT_LAX shorthand for the modules that are typically skipped for API endpoints where you allow even those that are blocked to access the endpoint
CSPReport The CSP report
EarlyUserDiscovery early user discovery modules
EmbeddedResources Embedded resources rule
IsBlocked The manual is blocked rule, can be set by any user code by calling the Block() method from the IFirewall instance
None Indicates none set to be ignored or tested depending on the context
RejectAddHockRequests The reject add hock requests rule
RejectAgentsConsideredMalicious Reject requests from browsers and bots that are considered to be Malicious
RejectAPIPenetrationAttempts A penetration attempt made against the firewall management API
RejectCommonVulnerabilitiesExposuresExploits the attack is a common vulnerabilities and exposure
RejectCrossSiteRequests Reject access to a resource if not from internal domain or from a domain that is white-listed (protects HttpPost requests)
RejectDDOS The reject distributed denial of service request rule
RejectHitRatioViolations The reject hit ratio violations
RejectHoneyPotTrap reject users making use of a ^known honey-pot trap
RejectIntentions reject a request based on browser intentions
RejectInvalidUserPageGroupHeader reject those that have an invalid PageGroup identifier.
RejectInvalidUserSalt User presented the wrong cipher salt to the response or request
RejectInvalidUserSessionHeaderId Invalid session header in request
RejectInvalidUserSessionId Reject those that have the wrong firewall session id
RejectKnownBadBoys The reject known bad boys rule
RejectNavigation reject or allow a request based on links rendered to the user
RejectNonAspNet The request is a non ASP net request rule
RejectPenetrationAttempts Reject penetration attempts rule
RejectPhsishing early user discovery modules
RejectPoisonedCookies Reject requests where the firewall detects poisoned cookies
RejectRefreshViolations The reject refresh violations rule
RejectRejectWhoisProvider Reject requests if the Internet service provider is having the wrong reputation for a user target user group
RejectRepeatViolations The reject known bad boys that are causing repeat violations
RejectScrubbing The reject scrubbing rule
RejectSemanticUrlAttack Reject semantic url attacks
RejectSiteMapViolations Reject access to endpoints that have not been rendered to a previous request
RejectTor The Attacker is using Tor this access is reject
RejectWrongGeography User access from the wrong geographic region
RejectWrongProtocol The reject wrong protocol requests rule
RejectWrongUserTypeThe reject requests from wrong user category like IsHuman or distinction like IsMalliciouse types rule
TCPResetAttack A attempt is make to take the website off-line by flooding the site with connections that will be processed by the server but are never processed by the initiator
Remarks
The even though there are more guard modules that are active,this however is the list of rules that can be managed by means of configuration.
Inheritance Hierarchy

System.Object
   System.ValueType
      System.Enum
         Walter.Web.FireWall.Filters.FireWallGuardActions

Requirements

Target Platforms: Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2

See Also

Reference

Walter.Web.FireWall.Filters Namespace
ViolationsStack Property
HasViolated Method