89 packages tagged with “Firewall”
Enhance .NET applications with a robust firewall, designed as middleware and IActionFilter, protecting against CVE attacks, web scraping, and phishing. Configurable via annotations and a rule engine services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }); Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in applications. You can view the firewall in action using https://www.asp-waf.com/Firewall You can get started with the firewall using the samples shown in https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as the on line documentation at https://firewallapi.asp-waf.com/
Provide insight into the communication between the server hosting the website and the outside world and allows the users to observe communication and look for irrational or known malicious interaction. The static class that exposes this functionality can be found at Walter.Net.LookWhosTalking.WhosTalking Documentation available at https://firewallapi.asp-waf.com/?topic=html/N-Walter.Net.LookWhosTalking.htm
Free FireWall native Geo-country code API with limited accuracy. The Package adds functionality to NuGet package Walter.Web.Firewall More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf This free API library may not give accurate results as it uses unchecked public domain data
Package that enable SQL Server database storage and logging to NuGet package Walter.Web.Firewall The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseDataBase(ConfigurationManager.ConnectionStrings["FireWallState"].ConnectionString) .UseFireWallReportingDatabase(ConfigurationManager.ConnectionStrings["FireWallReporting"].ConnectionString); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf
The Package adds E-Mail based reporting functionality to NuGet package Walter.Web.Firewall and allows for the logging of incidents via E-Mail by using a E-Mail buffer and sends the emails at configured intervals. The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseSMTPReportingDatabase(options =>{ options.Archive = TimeSpan.FromDays(180); options.Server = "mail.server.com"; options.UserName = "noreply@your-domain.com"; options.Password = "pa$$w0rd1234"; options.Port = 8889; options.From = "noreply@your-domain.com"; options.IgnoreServerCertificateErrors = true; options.DefaultEmail = "webmaster@your-domain.com"; options.Archive = TimeSpan.FromDays(60); options.MailingList.AddRange(new[] { new EMailAddress("Security Admin","security@your-domain.com") { Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.FireWallAdministrationViolations | EMailRoles.UnauthorizedPhysicalFilesViolation }, new EMailAddress("WAF","info@your-domain.com"){ Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.ProductUpdates | EMailRoles.OwnAccountRelatedViolations } , }); }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as on-line at https://www.asp-waf.com/NuGet
Reporting interface for the firewall and the windows to support structured logging to the windows EventLog. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseEventLogLogging(options=>{ options.LogName = "FireWall"; options.SourceName = "www.your-domain.com"; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf
Cookie store for use with the firewall allowing to not store any GDPR data in cookies but keep all references local. You can read and write these cookies using the User in the page request object that is injected in all your controllers. To integrate the Cookie Store database use the UseDBCookieStore extension method as shown bellow services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseDBCookieStore(); You can see how to use it using this online documentation here: https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IUserIdentity.WriteCookie.htm Read about reading such a cookie is documented here: https://firewallapi.asp-waf.com/?topic=html/M-Walter.Web.FireWall.IUserIdentity.TryReadCookie.htm
Use MaxMind Geo data service or API keys to make the Walter.Web.IFireWall interface geographically aware allowing you to block requests for certain countries and enables you to render a different result based on the region or country the request came from. The Package adds functionality to NuGet package Walter.Web.Firewall services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseGeography(directory:new DirectoryInfo("d:\\MaxMind")); This assumes that data files are in d:\MaxMind folder leave blank if you use App_Data and in your application configuration you can set blocking scope like this app.UseFireWall() .UseGeoBlockingMiddleware(options => { options.Block(new[]{GeoLocation.China ,GeoLocation.RussianFederation}); }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf
Use the Userstack service to extend the firewall's UserAgent meta data. To use the software use dependency injection during services registration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com/", UriKind.Absolute) , options => { //your firewall settings }).UseUserStackDBUserAgentStore(connectionString:Configuration.GetConnectionString("UserAgents"), option => { option.ApiKey = "123456789";//enter your key option.Https = false;//set false if you use free version }); Have a look at the documentation at:https://firewallapi.asp-waf.com/?topic=html/Methods.T-Microsoft.Extensions.DependencyInjection.UserStackBuilderExtensions.htm
An ASP.NET Core middleware for request filtering.
Reporting interface for the firewall and the windows to support structured logging to the ILogging frameworks. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }).UseILoggerLogging(options:option=> { option.Level = Microsoft.Extensions.Logging.LogLevel.Critical; option.NameSpace = "MyApplication.FireWall.Logger"; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as on-line at documentation at https://www.asp-waf.com/NuGet. This Add-On will work any license version of the firewall.
This package attempts to guard against false positives from antiviruses that flag Blazor Wasm as malware
Provides managed access to the Windows Firewall API in Windows via COM, in a trim and AOT compatible way.
A library for JavaScript that provides resilient peer-to-peer data streams through firewalls for live media.
HTTP request gatekeeper that uses LINQ validation rules on custom rule sets to keep your site safe
User when you would like to automatically process violations to capture the ISP for those that have attempted to penetrate your web application. To integrate the WHOIS resolver use the UseWhoisResolver extension method as shown bellow services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseWhoisBackGroundProcessor();
Library to control Window Firewall. This library use C:\Windows\System32\FirewallAPI.dll and C:\Windows\System32\hnetcfg.dll libraries. It is based on COM.
A library for .NET that extends IceLink to create WebRTC-compatible peer-to-peer audio/video data streams using IceLink. (Community Edition)
A library for JavaScript that extends IceLink to create WebRTC-compatible peer-to-peer audio/video data streams using IceLink.
PInvoke API (methods, structures and constants) imported from FirewallApi.dll for Windows Firewall with Advanced Security.
A library for JavaScript that extends WebSync to support easy management of IceLink peer-to-peer conferences.
A library for .NET that provides standards-based WebRTC/ORTC-compatible peer-to-peer media and data streams.
A library for .NET that extends IceLink to create peer-to-peer data streams from Simple clients. (Community Edition)
A library for .NET that extends WebSync to support easy management of IceLink peer-to-peer conferences. (Community Edition)
A library for .NET that includes AForge.NET-based video providers for IceLink's WebRTC extension. (Community Edition)
A library for .NET that includes NAudio-based audio providers for IceLink's WebRTC extension. (Community Edition)
Aikido Security Zen .NET Framework Firewall
C# high-level firewall library
A simple .NET Core WebSocket-based library for bidirectional, reliable and typesafe communication between a server and clients behind a firewall. See https://github.com/Xenoage/RpcLib for documentation and samples.
A safe, minimal .NET binding over WinDivert