Walter.Web.FireWall
2021.5.24.1019
Prefix Reserved
See the version list below for details.
dotnet add package Walter.Web.FireWall --version 2021.5.24.1019
NuGet\Install-Package Walter.Web.FireWall -Version 2021.5.24.1019
<PackageReference Include="Walter.Web.FireWall" Version="2021.5.24.1019" />
paket add Walter.Web.FireWall --version 2021.5.24.1019
#r "nuget: Walter.Web.FireWall, 2021.5.24.1019"
// Install Walter.Web.FireWall as a Cake Addin #addin nuget:?package=Walter.Web.FireWall&version=2021.5.24.1019 // Install Walter.Web.FireWall as a Cake Tool #tool nuget:?package=Walter.Web.FireWall&version=2021.5.24.1019
The application firewall that can be used in .NET 5.0, .Net CORE 3.1 and .NET standard 2.1 applications that
would benefit for protection against several types of attacks and is easily activated by service integration.
services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey
, domainName: new Uri("https://www.your-domain.com/", UriKind.Absolute)
, options => {
//your options
});
Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall
and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in
applications. You can view the firewall in action using https://www.asp-waf.com/Firewall
You can get started with the firewall using the samples shown in
https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf
as well as the on line documentation at https://firewallapi.asp-waf.com/
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 is compatible. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp3.0 was computed. netcoreapp3.1 is compatible. |
.NET Standard | netstandard2.1 is compatible. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETCoreApp 3.1
- Microsoft.AspNetCore.Connections.Abstractions (>= 5.0.6)
- Microsoft.AspNetCore.Cors (>= 2.2.0)
- Microsoft.AspNetCore.Mvc.RazorPages (>= 2.2.5)
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter (>= 2021.5.12.929)
- Walter.BOM (>= 2021.5.24.1019)
- Walter.Cypher (>= 2021.5.12.929)
- Walter.DataTools.MsSql (>= 2021.5.24.1019)
- Walter.IO (>= 2021.5.24.1019)
- Walter.Net.HoneyPot (>= 2021.5.24.1019)
- Walter.Net.LookWhosTalking (>= 2021.5.24.1019)
- Walter.Net.Networking (>= 2021.5.24.1019)
-
.NETStandard 2.1
- Microsoft.AspNetCore.Connections.Abstractions (>= 5.0.6)
- Microsoft.AspNetCore.Cors (>= 2.2.0)
- Microsoft.AspNetCore.Mvc.RazorPages (>= 2.2.5)
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter (>= 2021.5.12.929)
- Walter.BOM (>= 2021.5.24.1019)
- Walter.Cypher (>= 2021.5.12.929)
- Walter.DataTools.MsSql (>= 2021.5.24.1019)
- Walter.IO (>= 2021.5.24.1019)
- Walter.Net.HoneyPot (>= 2021.5.24.1019)
- Walter.Net.LookWhosTalking (>= 2021.5.24.1019)
- Walter.Net.Networking (>= 2021.5.24.1019)
-
net5.0
- Microsoft.AspNetCore.Connections.Abstractions (>= 5.0.6)
- Microsoft.AspNetCore.Cors (>= 2.2.0)
- Microsoft.AspNetCore.Mvc.RazorPages (>= 2.2.5)
- Microsoft.Extensions.Configuration.Binder (>= 5.0.0)
- Walter (>= 2021.5.12.929)
- Walter.BOM (>= 2021.5.24.1019)
- Walter.Cypher (>= 2021.5.12.929)
- Walter.DataTools.MsSql (>= 2021.5.24.1019)
- Walter.IO (>= 2021.5.24.1019)
- Walter.Net.HoneyPot (>= 2021.5.24.1019)
- Walter.Net.LookWhosTalking (>= 2021.5.24.1019)
- Walter.Net.Networking (>= 2021.5.24.1019)
NuGet packages (11)
Showing the top 5 NuGet packages that depend on Walter.Web.FireWall:
Package | Downloads |
---|---|
Walter.Web.FireWall.EventLog
Reporting interface for the firewall and the windows to support structured logging to the windows EventLog. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseEventLogLogging(options=>{ options.LogName = "FireWall"; options.SourceName = "www.your-domain.com"; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf |
|
Walter.Web.FireWall.SqlLogger
Package that enable SQL Server database storage and logging to NuGet package Walter.Web.Firewall The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseDataBase(ConfigurationManager.ConnectionStrings["FireWallState"].ConnectionString) .UseFireWallReportingDatabase(ConfigurationManager.ConnectionStrings["FireWallReporting"].ConnectionString); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf |
|
Walter.Web.FireWall.Geo.Native
Free FireWall native Geo-country code API with limited accuracy. The Package adds functionality to NuGet package Walter.Web.Firewall More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf This free API library may not give accurate results as it uses unchecked public domain data |
|
Walter.Web.FireWall.SMTPLogger
The Package adds E-Mail based reporting functionality to NuGet package Walter.Web.Firewall and allows for the logging of incidents via E-Mail by using a E-Mail buffer and sends the emails at configured intervals. The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseSMTPReportingDatabase(options =>{ options.Archive = TimeSpan.FromDays(180); options.Server = "mail.server.com"; options.UserName = "noreply@your-domain.com"; options.Password = "pa$$w0rd1234"; options.Port = 8889; options.From = "noreply@your-domain.com"; options.IgnoreServerCertificateErrors = true; options.DefaultEmail = "webmaster@your-domain.com"; options.Archive = TimeSpan.FromDays(60); options.MailingList.AddRange(new[] { new EMailAddress("Security Admin","security@your-domain.com") { Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.FireWallAdministrationViolations | EMailRoles.UnauthorizedPhysicalFilesViolation }, new EMailAddress("WAF","info@your-domain.com"){ Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.ProductUpdates | EMailRoles.OwnAccountRelatedViolations } , }); }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as on-line at https://www.asp-waf.com/NuGet |
|
Walter.Web.FireWall.DiskLogger
Reporting interface for the firewall and the windows to support logging to disk as well as start Post-Reporting work-flows like PowerShel scripts or executables. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }).UseDiskLogging(opt=>{ opt.DataDirectory = @"D:\Web-FireWall\FireWall"; opt.PowerShellOption = PowerShellFilesOption.GenerateIfMissing; opt.Commandline = new System.Diagnostics.ProcessStartInfo(@"D:\jobs\FireWall.bat"){UseShellExecute = true}; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2024.11.6.1222 | 248 | 11/6/2024 |
2024.10.28.1605 | 277 | 10/28/2024 |
2024.10.28.1335 | 213 | 10/28/2024 |
2024.10.19.1525 | 244 | 10/20/2024 |
2024.10.18.1315 | 222 | 10/19/2024 |
2024.9.27.1406 | 271 | 9/27/2024 |
2024.9.17.1417 | 327 | 9/17/2024 |
2024.9.12.1923 | 363 | 9/12/2024 |
2024.9.6.1352 | 414 | 9/7/2024 |
2024.9.1.1159 | 330 | 9/1/2024 |
2024.8.26.1150 | 359 | 8/26/2024 |
2024.8.19.1411 | 379 | 8/19/2024 |
2024.8.17.1000 | 369 | 8/17/2024 |
2024.8.12.1622 | 352 | 8/13/2024 |
2024.8.5.1010 | 310 | 8/5/2024 |
2024.8.1.1545 | 391 | 8/16/2024 |
2024.7.28.629 | 176 | 7/28/2024 |
2024.7.26.1512 | 216 | 7/26/2024 |
2024.7.26.828 | 189 | 7/26/2024 |
2024.7.11.1604 | 325 | 7/11/2024 |
2024.7.9.1520 | 337 | 7/9/2024 |
2024.7.4.1425 | 377 | 7/4/2024 |
2024.7.3.1249 | 316 | 7/3/2024 |
2024.7.2.1536 | 393 | 7/2/2024 |
2024.6.28.953 | 381 | 6/28/2024 |
2023.11.13.1117 | 1,517 | 11/13/2023 |
2023.10.26.1502 | 1,386 | 10/29/2023 |
2023.10.12.1926 | 1,515 | 10/12/2023 |
2023.9.14.812 | 1,642 | 9/14/2023 |
2023.9.7.1748 | 1,663 | 9/7/2023 |
2023.9.7.1241 | 1,668 | 9/7/2023 |
2023.9.6.1001 | 1,637 | 9/6/2023 |
2023.9.5.1246 | 1,647 | 9/5/2023 |
2023.9.5.1032 | 1,642 | 9/5/2023 |
2023.8.31.1522 | 1,654 | 8/31/2023 |
2023.8.29.1040 | 1,730 | 8/29/2023 |
2023.8.17.901 | 1,777 | 8/17/2023 |
2023.8.9.1314 | 1,873 | 8/9/2023 |
2023.8.2.750 | 1,918 | 8/2/2023 |
2023.7.12.830 | 1,934 | 7/12/2023 |
2023.7.5.1419 | 2,067 | 7/6/2023 |
2023.6.14.1628 | 2,108 | 6/14/2023 |
2023.6.11.1304 | 2,174 | 6/11/2023 |
2023.5.30.1640 | 2,141 | 5/30/2023 |
2023.5.4.1552 | 2,246 | 5/4/2023 |
2023.5.1.1524 | 2,137 | 5/1/2023 |
2023.4.29.910 | 2,342 | 4/29/2023 |
2023.4.12.1236 | 2,341 | 4/12/2023 |
2023.3.22.1456 | 2,470 | 3/22/2023 |
2023.3.14.1356 | 2,560 | 3/14/2023 |
2023.3.1.810 | 2,634 | 3/1/2023 |
2023.2.25.11857 | 2,616 | 2/25/2023 |
2023.2.22.27 | 2,596 | 2/22/2023 |
2023.2.15.1413 | 2,680 | 2/15/2023 |
2023.2.11.1628 | 2,774 | 2/11/2023 |
2023.1.11.534 | 2,920 | 1/11/2023 |
2022.12.30.711 | 2,935 | 12/30/2022 |
2022.12.15.1108 | 2,930 | 12/15/2022 |
2022.12.14.648 | 2,989 | 12/14/2022 |
2022.11.27.1059 | 3,065 | 11/27/2022 |
2022.11.21.338 | 3,135 | 11/21/2022 |
2022.11.14.1819 | 3,192 | 11/14/2022 |
2022.11.13.917 | 3,175 | 11/13/2022 |
2022.10.31.740 | 5,628 | 11/1/2022 |
2022.10.15.652 | 5,993 | 10/15/2022 |
2022.10.1.810 | 6,371 | 10/1/2022 |
2022.9.26.1444 | 6,412 | 9/26/2022 |
2022.9.14.1508 | 6,583 | 9/14/2022 |
2022.9.14.809 | 6,592 | 9/14/2022 |
2022.9.8.1009 | 6,769 | 9/8/2022 |
2022.8.20.1007 | 6,685 | 8/20/2022 |
2022.8.1.1 | 6,679 | 7/31/2022 |
2022.7.1300 | 6,999 | 7/1/2022 |
2022.7.31.1016 | 6,957 | 7/31/2022 |
2022.7.15.841 | 7,005 | 7/15/2022 |
2022.6.21.647 | 6,831 | 6/21/2022 |
2022.5.18.638 | 6,914 | 5/19/2022 |
2022.5.16.853 | 7,055 | 5/19/2022 |
2022.5.16.816 | 7,041 | 5/16/2022 |
2022.5.4.1010 | 7,012 | 5/4/2022 |
2022.4.10.947 | 7,450 | 4/10/2022 |
2022.4.10.925 | 7,515 | 4/10/2022 |
2022.4.10.828 | 7,319 | 4/10/2022 |
2022.4.1.1545 | 7,616 | 4/1/2022 |
2022.3.31.823 | 6,367 | 3/31/2022 |
2022.3.26.1103 | 7,622 | 3/26/2022 |
2022.3.26.820 | 7,180 | 3/26/2022 |
2022.3.25.840 | 6,468 | 3/26/2022 |
2022.2.16.1131 | 7,733 | 2/17/2022 |
2022.2.16.834 | 7,502 | 2/17/2022 |
2022.2.15.824 | 1,308 | 2/17/2022 |
2022.2.11.1452 | 1,491 | 2/17/2022 |
2022.2.11.931 | 1,316 | 2/17/2022 |
2022.2.5.1114 | 7,867 | 2/5/2022 |
2022.1.17.1158 | 9,065 | 1/17/2022 |
2022.1.10.1505 | 9,142 | 1/10/2022 |
2022.1.10.537 | 9,203 | 1/10/2022 |
2022.1.5.1139 | 8,751 | 1/8/2022 |
2021.12.28.1452 | 9,944 | 12/28/2021 |
2021.12.16.812 | 9,615 | 12/16/2021 |
2021.11.23.1528 | 16,135 | 11/24/2021 |
2021.11.21.925 | 16,545 | 11/22/2021 |
2021.11.19.847 | 10,953 | 11/19/2021 |
2021.11.18.1824 | 9,982 | 11/16/2021 |
2021.11.10.852 | 11,153 | 11/10/2021 |
2021.11.9.2021 | 10,831 | 11/9/2021 |
2021.11.8.2109 | 8,199 | 11/9/2021 |
2021.11.8.1612 | 8,822 | 11/8/2021 |
2021.11.7.1021 | 8,585 | 11/8/2021 |
2021.11.3.1612 | 8,771 | 11/4/2021 |
2021.11.1.1102 | 7,646 | 11/1/2021 |
2021.10.25.1206 | 9,303 | 10/25/2021 |
2021.10.23.1310 | 9,189 | 10/25/2021 |
2021.10.19.1522 | 9,090 | 10/19/2021 |
2021.10.16.1325 | 9,150 | 10/18/2021 |
2021.10.9.1119 | 286 | 10/9/2024 |
2021.10.6.1546 | 9,104 | 10/6/2021 |
2021.10.5.1450 | 9,148 | 10/5/2021 |
2021.10.4.1155 | 9,118 | 10/5/2021 |
2021.10.1.753 | 9,316 | 10/1/2021 |
2021.9.27.1005 | 8,589 | 9/28/2021 |
2021.9.26.1913 | 9,455 | 9/26/2021 |
2021.9.19.1015 | 7,409 | 9/19/2021 |
2021.9.17.1702 | 5,245 | 9/17/2021 |
2021.9.17.1449 | 11,872 | 9/17/2021 |
2021.9.13.1600 | 7,058 | 9/13/2021 |
2021.9.12.1100 | 4,893 | 9/13/2021 |
2021.9.11.2004 | 8,355 | 9/11/2021 |
2021.9.9.1110 | 9,034 | 9/9/2021 |
2021.9.7.1901 | 9,039 | 9/8/2021 |
2021.9.7.1121 | 9,334 | 9/7/2021 |
2021.9.6.1518 | 8,598 | 9/7/2021 |
2021.9.4.1124 | 9,217 | 9/4/2021 |
2021.9.2.708 | 8,546 | 9/4/2021 |
2021.9.0.1259 | 8,422 | 9/2/2021 |
2021.8.2200 | 8,077 | 8/23/2021 |
2021.8.2100 | 9,050 | 8/23/2021 |
2021.8.22.900 | 9,023 | 8/22/2021 |
2021.8.18.1500 | 8,931 | 8/18/2021 |
2021.8.18.930 | 8,983 | 8/18/2021 |
2021.8.14.1600 | 8,719 | 8/16/2021 |
2021.8.14.829 | 3,834 | 8/14/2021 |
2021.8.9.1105 | 8,753 | 8/9/2021 |
2021.8.8.1612 | 8,506 | 8/8/2021 |
2021.8.8.1138 | 7,632 | 8/8/2021 |
2021.8.6.1044 | 8,628 | 8/6/2021 |
2021.8.4.1355 | 9,079 | 8/5/2021 |
2021.7.30.2118 | 9,053 | 7/31/2021 |
2021.7.27.926 | 8,887 | 7/28/2021 |
2021.7.23.931 | 8,913 | 7/26/2021 |
2021.7.22.1456 | 8,406 | 7/23/2021 |
2021.7.15.1547 | 8,487 | 7/15/2021 |
2021.7.13.812 | 8,455 | 7/13/2021 |
2021.7.8.1527 | 8,734 | 7/10/2021 |
2021.7.5.1649 | 7,438 | 7/5/2021 |
2021.6.29.1453 | 8,801 | 6/30/2021 |
2021.6.26.1753 | 9,265 | 6/27/2021 |
2021.6.25.1849 | 8,961 | 6/25/2021 |
2021.6.24.1518 | 8,716 | 6/24/2021 |
2021.6.20.729 | 8,423 | 6/20/2021 |
2021.6.15.2006 | 8,301 | 6/15/2021 |
2021.6.14.2025 | 8,201 | 6/15/2021 |
2021.6.13.2035 | 8,392 | 6/14/2021 |
2021.6.12.1154 | 7,774 | 6/13/2021 |
2021.6.9.1120 | 8,001 | 6/9/2021 |
2021.6.3.1509 | 7,765 | 6/3/2021 |
2021.5.31.1533 | 7,963 | 5/31/2021 |
2021.5.31.1415 | 7,910 | 5/31/2021 |
2021.5.25.1732 | 6,894 | 5/25/2021 |
2021.5.24.1128 | 7,653 | 5/24/2021 |
2021.5.24.1019 | 7,535 | 5/24/2021 |
2021.5.12.1054 | 7,534 | 5/12/2021 |
2021.5.12.637 | 5,815 | 5/12/2021 |
2021.5.10.1442 | 6,975 | 5/11/2021 |
2021.5.8.1226 | 7,443 | 5/8/2021 |
2021.5.6.2037 | 6,605 | 5/6/2021 |
2021.5.5.1901 | 7,591 | 5/6/2021 |
2021.5.3.1621 | 7,717 | 5/4/2021 |
2021.5.1.905 | 7,933 | 5/1/2021 |
2021.4.28.1511 | 7,893 | 4/28/2021 |
2021.4.20.1520 | 7,704 | 4/21/2021 |
2021.4.16.949 | 1,215 | 4/21/2021 |
2021.4.16.738 | 7,928 | 4/21/2021 |
2021.4.14.1216 | 8,114 | 4/16/2021 |
2021.4.9.1538 | 7,874 | 4/13/2021 |
2021.4.8.947 | 7,998 | 4/13/2021 |
2021.4.6.1235 | 8,015 | 4/6/2021 |
2021.4.5.1653 | 7,678 | 4/5/2021 |
2021.4.1.913 | 7,934 | 4/1/2021 |
2021.3.31.2003 | 7,862 | 4/1/2021 |
2021.3.18.1622 | 8,365 | 3/18/2021 |
2021.3.3.1259 | 7,703 | 3/3/2021 |
2021.3.2.1415 | 8,140 | 3/2/2021 |
2021.3.1.11 | 7,679 | 2/28/2021 |
2021.3.1.1 | 7,945 | 2/27/2021 |
2021.3.1 | 7,584 | 2/27/2021 |
2021.2.23.6 | 6,839 | 2/23/2021 |
2021.2.23.4 | 1,260 | 2/23/2021 |
2021.2.21.1 | 7,496 | 2/21/2021 |
2021.2.20.1 | 7,457 | 2/20/2021 |
2021.2.19.2 | 7,377 | 2/19/2021 |
2021.2.18.6 | 6,408 | 2/19/2021 |
2021.2.17.1 | 7,396 | 2/17/2021 |
2021.2.16.1 | 7,839 | 2/16/2021 |
2021.2.15.3 | 7,730 | 2/15/2021 |
2021.2.15.1 | 7,756 | 2/14/2021 |
2021.2.14.3 | 7,214 | 2/14/2021 |
2021.2.12.6 | 7,572 | 2/12/2021 |
2021.2.12.2 | 7,778 | 2/12/2021 |
2021.2.11.1 | 6,039 | 2/11/2021 |
2021.2.10.1 | 7,192 | 2/10/2021 |
2021.2.8.1 | 7,659 | 2/9/2021 |
2021.2.7.2 | 7,742 | 2/7/2021 |
2021.2.7.1 | 7,948 | 2/6/2021 |
2020.12.27.1 | 7,220 | 12/27/2020 |
2020.12.26.5 | 7,252 | 12/27/2020 |
2020.12.26.4 | 1,215 | 12/27/2020 |
2020.12.26.3 | 7,226 | 12/27/2020 |
2020.12.19.1 | 7,807 | 12/19/2020 |
2020.12.16.1 | 7,197 | 12/16/2020 |
2020.12.15.1 | 7,910 | 12/15/2020 |
2020.12.14.5 | 13,171 | 12/14/2020 |
Major releases that add functionality other than optimization and minor bug fixing
25 May 2021
- Change loop frequency to reduce pooling frequency
- Add counters to WHOIS
- Block ISP's if Rule on rule engine or endpoint based on trust settings
allowing general blocking for IoT devices if request are made via external data center/ provider
- Change storage for firewall state classes
- Add firewall management API data
12 April 2021
- Update to new code base after .net security violation fix
10 May 2021
- Update Database based storage
05 May 2021
- Integrate default endpoints so that there is no need for the default endpoints NuGet package and load the modules if the site uses management or renders pages
04 May 2021
- Add Key exchange for administration console on a per client basis
- Add default endpoints for user discovery if the FireWallMode in the settings containing JavaScript clients
29 April 2021
- Add support for custom port with administration system
- Add support for custom GuestUser password
04 April 2021
- Add ISPTrustLevelAttribute for end point protection
- Add Minimum Credibility ISP requirement on Rule engine configuration
- fix bug in BreadCrumb serialization
05 April 2021
- Add Administration configuration
- Endpoint Annotation for 2nd level user detection
- Update user discover script
22 March 2021
- Performance update
14 March 2021
- Update firewall and expose HoneyPot traps to firewall extension model
05 March 2021
- Add 2 new Rules that can be used as annotation on endpoints.
* BrowserIntentionsAttribute - allows a way to block requests from user agents with a bad reputation
* SiteMapAttribute - Allows a way to block users from URL's that have not been rendered to them in Razor-Pages or Views
* Add new Tag helper for firewall-browser-intentions-
- Add Counters for SearchEngines in User-Agents
- Add Intent counters in User-Agents (reputation)
- Minor bug fixes
- Update package reference
02 March 2021
- Update user agents add intentions
25 February 2021
- Add MaliciousUserAgentsAttribute
- Add support for MaliciousUserAgents in firewall rules
24 February 2021
- Update IPageRequest.BreadCrumbs class
- Update Annotations
- Update TagHelpers
17 February 2021
- Add endpoint types to protect supporting classes that are based on ControllerBase, Controller and RazorPage
using the IFireWallConf.ProtectedEndPointTypes property
12 February 2021
- Framework extension changes
- Update package references
30 January 2021
- Update disk change rule engine
25 January 2021
- Update rule engine
02 January 2021
- Updated terms and conditions to REL. 2021.01.02
29 December 2020
- Extend Storage interface and Documentation interfaces
- Refactor DI registration
27 December 2020
- Fix Bug
- Add reporting for Suspicious user agents
26 December 2020
- Extend IFireWall and FireWallBase class and interface add classes for reporting as well as change the constructor to allow for DI overriding state classes.
- Extend IIncidentDatabase with IIncidentDatabase.All(bool distinct,TimeSpan limitTo)
- Extend failed WHOIS request trying to retrieve ISP data
- Extend reporting interface include firewall binary version and size
- Extend Look-Who-Is-Talking (LWT) reporting capabilities
21 December 2020
- Integrate database maintenance when a database is used for firewall state on disposing the firewall (when the web application shuts down) as to not incur blocking
- Update database state include who-is-talking history tracking repository...
19 December 2020
- Update package references
- Integrate LookWhoisTalking repository for reporting
see https://firewallapi.asp-waf.com/html/P-Walter.Web.FireWall.IFireWall.WhoisTalking.htm
see https://firewallapi.asp-waf.com/html/AllMembers.T-Walter.Web.FireWall.ViewModels.Talking.htm
- Update package references
16 December 2020
- Update text reporting showing days left in license and active and maximum concurrent users
15 December 2020
- Update text report generating local time and no longer users UTC date/time
- Update user agent cashing
14 December 2020
- Update package references
- Update WHOIS query infrastructure
- Add publicity for concurrent user count
- Add country field to State date when a database is used
12 December 2020
- Update WHOIS query engine to query IP address requester and not IP address of reverse DNS of the ISP or Data center
- Update package references
- Compile with Language version 9.0
05 December 2020
- Update default license implementation
- Update NuGet Package references
- Update database storage SQL script for State objects
04 December 2020
- Bug in SQL script for database storage migration
- Extend health Logging interface to contain references to failed update script
- Update package references
- Change Json data size from a byte[] of 4000 to 8000 to facilitate bigger datasets for firewall state objects when stored to database
03 December 2020
- Extend IFirewall interface for reporting features
See https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IFireWall.GetVisitStats.htm
https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IFireWall.GetPhishyVisitStats.htm
02 December 2020
- Update country definition of a WHOIS entry if the country is unknown and a geography plugin is used
01 December 2020
- Update Connection string application name in connection from default .net message to application name when database storage is used to save state and no application name was provided.
- Update IFireWall.Whois() method to map LAN IP addresses to the firewall contact details
- Extend Incident classes to update for IWHOIS data for use in the management interfaces
27 November 2020
- Bug Fix cookie options set secure only if web application is using TLS connection
22 November 2020
- Update compiler hints improving .net Core 3.1 and .Net 5.0 compiled binaries
- Fix bug in update script for incident database
20 November 2020
- update packages to .net core 3.1.404
17 November 2020
- Update documentation
- Annotate return types IFireWall, IPageRequest, IIncidentDatabase, IUserIdentity, IFureWallUser, IFireWallConfig and more
- Extend IIncidentDatabase management API interface
- Change nullability of some types
14 November 2020
- Add support for IWhoisBackGroundProcessor for NuGet Package
Documentation at https://firewallapi.asp-waf.com/?topic=html/T-Microsoft.Extensions.DependencyInjection.WhoisWhoisBackGroundProcessorExtensions.htm
- Add access to the default instance for most of the propiatary storage classes for the firewall allowing direct access for advance use interface
IResetRepository: https://firewallapi.asp-waf.com/?topic=html/M-Walter.Web.FireWall.Infrastructure.Repositories.IResetRepository.Instance.htm
IWhoisRepository: https://firewallapi.asp-waf.com/html/M-Walter.Web.FireWall.Infrastructure.IWhoisRepository.Instance.htm
IIncidentDatabase: https://firewallapi.asp-waf.com/html/M-Walter.Web.FireWall.RuleEngine.IIncidentDatabase.Instance.htm
13 November 2020
- Update the way that default interface object created and will capture missing interfaces when a custom FireWall instance
used extension methods in service registration but the constructor does not capture the interface.
- Fix Spelling and update documentation
12 November 2020
- Update IPageRequest allow to read block cookie reasons using ContainsBlockCookie method allowing you to log the reasons documented
11 November 2020
- Update packages and support .Net 5.0
08 November 2020
Update signatures FireWallBase for null validly testing by the compiler and IntelliSense
01 November 2020
- Add overload methods to override default storage location and data retention for firewall database state per data type
30 October 2020
- implement database state for firewall
15 October 2020
- Update User blocking message
- Add FireWall exception handler event
- Reduce firewall footprint when using CookieFactory in Firewall
- Improve GDPR action by cashing Cookie requests between HttGet and HttpPost AJAX callbacks
14 October 2020
- Update to .net core 3.1.4
12 October 2020
1. Change Database logging interface providing access to full IPageRequest interface
09 October 2020
1. Fix bug in UserAgent database storage creation script
2. Update ToDo message generated when finding security issue in application
08 October 2020
1 update documentation
2 update filter improve dependency independence
06 October 2020
1. Update Browser data
2. Add extension method to service configuration to better configure UserAgent storage
3. Improved user agent cashing and device recognition
documentation at: https://firewallapi.asp-waf.com/?topic=html/AllMembers.T-Walter.Web.FireWall.Browser.IUserAgent.htm
05 October 2020
1. Update NuGet Package References
2. Update EULA
3. Provide access to browser and browser meta data of IUserAgent in IPageRequest.User.UserAgent
1 October 2020
1. Add interactions to IPageRequest for on a Root page if User discovery is used
2. Update NuGet package References
3. Fix bug where user cookie was always a session cookie
30 September 2020
1. Sort result for text based reporting
29 September 2020
1. Integrate Lazy logging from Walter.dll
2. Fix bug on license validator
3. Update FireWall session storage interface
4. Update NugetPackage references
24 September 2020
1. fix index error on ILogger interface in Guard Module
2. Include Minify data to reporting interface
23 September 2020
1. Add Minification to the reporting data class
22 September 2020
1. Add User type filters that allow the firewall to reject BOT's and Malicious users
documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.BlockBotsFilter.htm
documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.BlockMaliciousUserFilter.htm
19 September 2020
1. Add Minify attribute
documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.MinifyAttribute.htm
2. Add Firewall disk manipulation detection event
documentation at https://firewallapi.asp-waf.com/?topic=html/E-Walter.Web.FireWall.FireWallBase.OnDiskManipulation.htm
3. Add User GDPR cookie solution using transparent encryption and IPageRequest.User cookie capabilities
documentation at https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IUserIdentity.WriteCookie.htm
https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.CookieConfig.UseTransparentEncryption.htm
16 September 2020
1. Streamline the FileWall tag helpers
2. Update Disk logging NuNet Package now in Walter.Web.FireWall.DiskLogging NuGet Package
3. Update ILogging NuNet Package now in Walter.Web.FireWall.ILogging NuGet Package
4. Update package references
14 September 2020
1. Update package references
2. Add NoCashAttribute
https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.NoCacheAttribute.htm
3. Add ModelFilter attribute
https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.ModelFilterAttribute.htm
09 September 2020
1. Add access to Rules class for advanced configuration before rule engine uses it to generated default rules
https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.IFireWallConfig.htm
2. Add access to RuleEngine configuration for runtime PEN scripts detection by making RulesConfig.BlockedPatterns Property public
https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.BlockedPatterns.htm
3. Update documentation and sample documentation in on-line help and manual
https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf
4. Fix issue where sometimes a user gets rejected for being in the wrong group without having a filter defined.
https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.RejectUsersByDefault.htm
08 September 2020
1. Add OnRootPageRequestDisposed and OnResourceSend event to FireWallBase class as well as IFireWall interface
Methods allow for post processing in proprietary projects
https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.FireWallBase.htm
2. Provide access to default rules for UrlValidationPatterns
https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.BlockedPatterns.htm
2. Fix bug where sometimes users would be blocked as no user rule was defined
06 September 2020
1. update documentation
2. Update terms
3. Update NuGet package references
04 September 2020
1. update documentation
2. Add manual blocking on event
03 September 2020
1. Add events for firewall management
https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.IFireWall.htm
2. Add method for using custom IFireWall implementation using base class
https://firewallapi.asp-waf.com/?topic=html/M-Walter.Web.FireWall.FireWallBase.-ctor.htm
27 August 2020
1. Update License test for machine name in URL allowing it as a valid local licensed domain as LocalHost
2. Update documentation
3. Save incidents to disk in clear json format making it easier to validate blocking incidents
4. Show RuleId and ViolationId in Page if triggered and enabled
26 August 2020
1. Export FireWall base to the framework for custom implementation of IFireWall
22 August 2020
1. Alter default cookie names
2. Set CRF token settings based on firewall settings
3. update text report to associate fictitious user nr to incident details