Walter.Web.FireWall 2020.12.19.1

Prefix Reserved
There is a newer version of this package available.
See the version list below for details.
dotnet add package Walter.Web.FireWall --version 2020.12.19.1                
NuGet\Install-Package Walter.Web.FireWall -Version 2020.12.19.1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="Walter.Web.FireWall" Version="2020.12.19.1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Walter.Web.FireWall --version 2020.12.19.1                
#r "nuget: Walter.Web.FireWall, 2020.12.19.1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install Walter.Web.FireWall as a Cake Addin
#addin nuget:?package=Walter.Web.FireWall&version=2020.12.19.1

// Install Walter.Web.FireWall as a Cake Tool
#tool nuget:?package=Walter.Web.FireWall&version=2020.12.19.1                

The application firewall that can be used in .NET 5.0, .Net CORE 3.1 and .NET standard 2.1 applications that
     would benefit for protection against several types of attacks and is easily activated by service integration.

     services.AddFireWall(FireWallTrail.License, FireWallTrail.DomainKey
     , domainName: new Uri("https://www.your-domain.com/", UriKind.Absolute)
     , options => {
     //your options
     });

     You can get started with the firewall
     using the samples shown in
     https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf

     We are developing the website so best to use the PDF and the online documentation at
     https://firewallapi.asp-waf.com/
     for now.

Product Compatible and additional computed target framework versions.
.NET net5.0 is compatible.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp3.0 was computed.  netcoreapp3.1 is compatible. 
.NET Standard netstandard2.1 is compatible. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages (11)

Showing the top 5 NuGet packages that depend on Walter.Web.FireWall:

Package Downloads
Walter.Web.FireWall.EventLog

Reporting interface for the firewall and the windows to support structured logging to the windows EventLog. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseEventLogLogging(options=>{ options.LogName = "FireWall"; options.SourceName = "www.your-domain.com"; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf

Walter.Web.FireWall.SqlLogger

Package that enable SQL Server database storage and logging to NuGet package Walter.Web.Firewall The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseDataBase(ConfigurationManager.ConnectionStrings["FireWallState"].ConnectionString) .UseFireWallReportingDatabase(ConfigurationManager.ConnectionStrings["FireWallReporting"].ConnectionString); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf

Walter.Web.FireWall.Geo.Native

Free FireWall native Geo-country code API with limited accuracy. The Package adds functionality to NuGet package Walter.Web.Firewall More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf This free API library may not give accurate results as it uses unchecked public domain data

Walter.Web.FireWall.SMTPLogger

The Package adds E-Mail based reporting functionality to NuGet package Walter.Web.Firewall and allows for the logging of incidents via E-Mail by using a E-Mail buffer and sends the emails at configured intervals. The NuGet package is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your firewall settings }).UseSMTPReportingDatabase(options =>{ options.Archive = TimeSpan.FromDays(180); options.Server = "mail.server.com"; options.UserName = "noreply@your-domain.com"; options.Password = "pa$$w0rd1234"; options.Port = 8889; options.From = "noreply@your-domain.com"; options.IgnoreServerCertificateErrors = true; options.DefaultEmail = "webmaster@your-domain.com"; options.Archive = TimeSpan.FromDays(60); options.MailingList.AddRange(new[] { new EMailAddress("Security Admin","security@your-domain.com") { Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.FireWallAdministrationViolations | EMailRoles.UnauthorizedPhysicalFilesViolation }, new EMailAddress("WAF","info@your-domain.com"){ Frequency= TimeSpan.FromHours(1), Roles= EMailRoles.ProductUpdates | EMailRoles.OwnAccountRelatedViolations } , }); }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as on-line at https://www.asp-waf.com/NuGet

Walter.Web.FireWall.DiskLogger

Reporting interface for the firewall and the windows to support logging to disk as well as start Post-Reporting work-flows like PowerShel scripts or executables. The Package extends the reporting functionality to NuGet package Walter.Web.Firewall and is easily activated by dependency injection during service configuration services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }).UseDiskLogging(opt=>{ opt.DataDirectory = @"D:\Web-FireWall\FireWall"; opt.PowerShellOption = PowerShellFilesOption.GenerateIfMissing; opt.Commandline = new System.Diagnostics.ProcessStartInfo(@"D:\jobs\FireWall.bat"){UseShellExecute = true}; }); More information on how to use this Add-On is available in this manual https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
2024.11.20.644 129 11/21/2024
2024.11.15.421 247 11/15/2024
2024.11.11.1334 143 11/14/2024
2024.11.6.1222 261 11/6/2024
2024.10.28.1605 286 10/28/2024
2024.10.28.1335 222 10/28/2024
2024.10.19.1525 251 10/20/2024
2024.10.18.1315 230 10/19/2024
2024.9.27.1406 274 9/27/2024
2024.9.17.1417 330 9/17/2024
2024.9.12.1923 366 9/12/2024
2024.9.6.1352 417 9/7/2024
2024.9.1.1159 333 9/1/2024
2024.8.26.1150 362 8/26/2024
2024.8.19.1411 382 8/19/2024
2024.8.17.1000 372 8/17/2024
2024.8.12.1622 355 8/13/2024
2024.8.5.1010 313 8/5/2024
2024.8.1.1545 394 8/16/2024
2024.7.28.629 179 7/28/2024
2024.7.26.1512 219 7/26/2024
2024.7.26.828 192 7/26/2024
2024.7.11.1604 327 7/11/2024
2024.7.9.1520 339 7/9/2024
2024.7.4.1425 379 7/4/2024
2024.7.3.1249 318 7/3/2024
2024.7.2.1536 396 7/2/2024
2024.6.28.953 384 6/28/2024
2023.11.13.1117 1,519 11/13/2023
2023.10.26.1502 1,388 10/29/2023
2023.10.12.1926 1,517 10/12/2023
2023.9.14.812 1,644 9/14/2023
2023.9.7.1748 1,667 9/7/2023
2023.9.7.1241 1,670 9/7/2023
2023.9.6.1001 1,639 9/6/2023
2023.9.5.1246 1,649 9/5/2023
2023.9.5.1032 1,644 9/5/2023
2023.8.31.1522 1,657 8/31/2023
2023.8.29.1040 1,733 8/29/2023
2023.8.17.901 1,779 8/17/2023
2023.8.9.1314 1,876 8/9/2023
2023.8.2.750 1,920 8/2/2023
2023.7.12.830 1,937 7/12/2023
2023.7.5.1419 2,069 7/6/2023
2023.6.14.1628 2,110 6/14/2023
2023.6.11.1304 2,177 6/11/2023
2023.5.30.1640 2,143 5/30/2023
2023.5.4.1552 2,248 5/4/2023
2023.5.1.1524 2,139 5/1/2023
2023.4.29.910 2,344 4/29/2023
2023.4.12.1236 2,343 4/12/2023
2023.3.22.1456 2,472 3/22/2023
2023.3.14.1356 2,563 3/14/2023
2023.3.1.810 2,636 3/1/2023
2023.2.25.11857 2,618 2/25/2023
2023.2.22.27 2,598 2/22/2023
2023.2.15.1413 2,682 2/15/2023
2023.2.11.1628 2,776 2/11/2023
2023.1.11.534 2,924 1/11/2023
2022.12.30.711 2,937 12/30/2022
2022.12.15.1108 2,932 12/15/2022
2022.12.14.648 2,991 12/14/2022
2022.11.27.1059 3,067 11/27/2022
2022.11.21.338 3,137 11/21/2022
2022.11.14.1819 3,194 11/14/2022
2022.11.13.917 3,177 11/13/2022
2022.10.31.740 5,630 11/1/2022
2022.10.15.652 5,995 10/15/2022
2022.10.1.810 6,375 10/1/2022
2022.9.26.1444 6,414 9/26/2022
2022.9.14.1508 6,585 9/14/2022
2022.9.14.809 6,594 9/14/2022
2022.9.8.1009 6,771 9/8/2022
2022.8.20.1007 6,687 8/20/2022
2022.8.1.1 6,681 7/31/2022
2022.7.1300 7,001 7/1/2022
2022.7.31.1016 6,959 7/31/2022
2022.7.15.841 7,007 7/15/2022
2022.6.21.647 6,833 6/21/2022
2022.5.18.638 6,916 5/19/2022
2022.5.16.853 7,057 5/19/2022
2022.5.16.816 7,043 5/16/2022
2022.5.4.1010 7,014 5/4/2022
2022.4.10.947 7,452 4/10/2022
2022.4.10.925 7,517 4/10/2022
2022.4.10.828 7,321 4/10/2022
2022.4.1.1545 7,618 4/1/2022
2022.3.31.823 6,369 3/31/2022
2022.3.26.1103 7,624 3/26/2022
2022.3.26.820 7,182 3/26/2022
2022.3.25.840 6,470 3/26/2022
2022.2.16.1131 7,735 2/17/2022
2022.2.16.834 7,504 2/17/2022
2022.2.15.824 1,310 2/17/2022
2022.2.11.1452 1,493 2/17/2022
2022.2.11.931 1,318 2/17/2022
2022.2.5.1114 7,869 2/5/2022
2022.1.17.1158 9,067 1/17/2022
2022.1.10.1505 9,144 1/10/2022
2022.1.10.537 9,205 1/10/2022
2022.1.5.1139 8,753 1/8/2022
2021.12.28.1452 9,946 12/28/2021
2021.12.16.812 9,617 12/16/2021
2021.11.23.1528 16,137 11/24/2021
2021.11.21.925 16,547 11/22/2021
2021.11.19.847 10,955 11/19/2021
2021.11.18.1824 9,984 11/16/2021
2021.11.10.852 11,155 11/10/2021
2021.11.9.2021 10,833 11/9/2021
2021.11.8.2109 8,201 11/9/2021
2021.11.8.1612 8,824 11/8/2021
2021.11.7.1021 8,587 11/8/2021
2021.11.3.1612 8,773 11/4/2021
2021.11.1.1102 7,648 11/1/2021
2021.10.25.1206 9,305 10/25/2021
2021.10.23.1310 9,191 10/25/2021
2021.10.19.1522 9,092 10/19/2021
2021.10.16.1325 9,152 10/18/2021
2021.10.9.1119 293 10/9/2024
2021.10.6.1546 9,106 10/6/2021
2021.10.5.1450 9,150 10/5/2021
2021.10.4.1155 9,120 10/5/2021
2021.10.1.753 9,318 10/1/2021
2021.9.27.1005 8,591 9/28/2021
2021.9.26.1913 9,457 9/26/2021
2021.9.19.1015 7,411 9/19/2021
2021.9.17.1702 5,247 9/17/2021
2021.9.17.1449 11,874 9/17/2021
2021.9.13.1600 7,060 9/13/2021
2021.9.12.1100 4,895 9/13/2021
2021.9.11.2004 8,357 9/11/2021
2021.9.9.1110 9,036 9/9/2021
2021.9.7.1901 9,041 9/8/2021
2021.9.7.1121 9,336 9/7/2021
2021.9.6.1518 8,600 9/7/2021
2021.9.4.1124 9,219 9/4/2021
2021.9.2.708 8,548 9/4/2021
2021.9.0.1259 8,424 9/2/2021
2021.8.2200 8,079 8/23/2021
2021.8.2100 9,072 8/23/2021
2021.8.22.900 9,025 8/22/2021
2021.8.18.1500 8,933 8/18/2021
2021.8.18.930 8,985 8/18/2021
2021.8.14.1600 8,721 8/16/2021
2021.8.14.829 3,836 8/14/2021
2021.8.9.1105 8,755 8/9/2021
2021.8.8.1612 8,508 8/8/2021
2021.8.8.1138 7,634 8/8/2021
2021.8.6.1044 8,630 8/6/2021
2021.8.4.1355 9,081 8/5/2021
2021.7.30.2118 9,055 7/31/2021
2021.7.27.926 8,889 7/28/2021
2021.7.23.931 8,915 7/26/2021
2021.7.22.1456 8,408 7/23/2021
2021.7.15.1547 8,489 7/15/2021
2021.7.13.812 8,457 7/13/2021
2021.7.8.1527 8,736 7/10/2021
2021.7.5.1649 7,440 7/5/2021
2021.6.29.1453 8,803 6/30/2021
2021.6.26.1753 9,267 6/27/2021
2021.6.25.1849 8,963 6/25/2021
2021.6.24.1518 8,718 6/24/2021
2021.6.20.729 8,425 6/20/2021
2021.6.15.2006 8,303 6/15/2021
2021.6.14.2025 8,203 6/15/2021
2021.6.13.2035 8,394 6/14/2021
2021.6.12.1154 7,776 6/13/2021
2021.6.9.1120 8,003 6/9/2021
2021.6.3.1509 7,767 6/3/2021
2021.5.31.1533 7,965 5/31/2021
2021.5.31.1415 7,912 5/31/2021
2021.5.25.1732 6,896 5/25/2021
2021.5.24.1128 7,655 5/24/2021
2021.5.24.1019 7,537 5/24/2021
2021.5.12.1054 7,536 5/12/2021
2021.5.12.637 5,819 5/12/2021
2021.5.10.1442 6,977 5/11/2021
2021.5.8.1226 7,445 5/8/2021
2021.5.6.2037 6,607 5/6/2021
2021.5.5.1901 7,593 5/6/2021
2021.5.3.1621 7,719 5/4/2021
2021.5.1.905 7,935 5/1/2021
2021.4.28.1511 7,895 4/28/2021
2021.4.20.1520 7,706 4/21/2021
2021.4.16.949 1,217 4/21/2021
2021.4.16.738 7,930 4/21/2021
2021.4.14.1216 8,116 4/16/2021
2021.4.9.1538 7,876 4/13/2021
2021.4.8.947 8,000 4/13/2021
2021.4.6.1235 8,017 4/6/2021
2021.4.5.1653 7,680 4/5/2021
2021.4.1.913 7,936 4/1/2021
2021.3.31.2003 7,864 4/1/2021
2021.3.18.1622 8,367 3/18/2021
2021.3.3.1259 7,709 3/3/2021
2021.3.2.1415 8,146 3/2/2021
2021.3.1.11 7,681 2/28/2021
2021.3.1.1 7,947 2/27/2021
2021.3.1 7,586 2/27/2021
2021.2.23.6 6,841 2/23/2021
2021.2.23.4 1,262 2/23/2021
2021.2.21.1 7,498 2/21/2021
2021.2.20.1 7,459 2/20/2021
2021.2.19.2 7,379 2/19/2021
2021.2.18.6 6,410 2/19/2021
2021.2.17.1 7,398 2/17/2021
2021.2.16.1 7,841 2/16/2021
2021.2.15.3 7,732 2/15/2021
2021.2.15.1 7,758 2/14/2021
2021.2.14.3 7,216 2/14/2021
2021.2.12.6 7,574 2/12/2021
2021.2.12.2 7,780 2/12/2021
2021.2.11.1 6,041 2/11/2021
2021.2.10.1 7,194 2/10/2021
2021.2.8.1 7,661 2/9/2021
2021.2.7.2 7,744 2/7/2021
2021.2.7.1 7,950 2/6/2021
2020.12.27.1 7,222 12/27/2020
2020.12.26.5 7,256 12/27/2020
2020.12.26.4 1,217 12/27/2020
2020.12.26.3 7,228 12/27/2020
2020.12.19.1 7,809 12/19/2020
2020.12.16.1 7,199 12/16/2020
2020.12.15.1 7,912 12/15/2020
2020.12.14.5 13,173 12/14/2020

Major releases that add functionality other than optimization and minor bug fixing
     19 December 2020
     - Update package references
     - Integrate LookWhoisTalking repository for reporting
     
     16 December 2020
     - Update text reporting showing days left in license and active and maximum concurrent users

     15 December 2020
     - Update text report generating local time and no longer users UTC date/time
     - Update user agent cashing

     14 December 2020
     - Update package references
     - Update WHOIS query infrastructure
     - Add publicity for concurrent user count
     - Add country field to State date when a database is used

     12 December 2020
     - Update WHOIS query engine to query IP address requester and not IP address of reverse DNS of the ISP or Data center
     - Update package references
     - Compile with Language version 9.0

     05 December 2020
     - Update default license implementation
     - Update NuGet Package references
     - Update database storage SQL script for State objects

     04 December 2020
     - Bug in SQL script for database storage migration
     - Extend health Logging interface to contain references to failed update script
     - Update package references
     - Change Json data size from a byte[] of 4000 to 8000 to facilitate bigger datasets for firewall state objects when stored to database

     03 December 2020
     - Extend IFirewall interface for reporting features
     See https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IFireWall.GetVisitStats.htm
     https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IFireWall.GetPhishyVisitStats.htm

     02 December 2020
     - Update country definition of a WHOIS entry if the country is unknown and a geography plugin is used

     01 December 2020
     - Update Connection string application name in connection from default .net message to application name when database storage is used to save state and no application name was provided.
     - Update IFireWall.Whois() method to map LAN IP addresses to the firewall contact details
     - Extend Incident classes to update for IWHOIS data for use in the management interfaces

     27 November 2020
     - Bug Fix cookie options set secure only if web application is using TLS connection

     22 November 2020
     - Update compiler hints improving .net Core 3.1 and .Net 5.0 compiled binaries
     - Fix bug in update script for incident database

     20 November 2020
     - update packages to .net core 3.1.404

     17 November 2020
     - Update documentation
     - Annotate return types IFireWall, IPageRequest, IIncidentDatabase, IUserIdentity, IFureWallUser, IFireWallConfig and more
     - Extend IIncidentDatabase management API interface
     - Change nullability of some types

     14 November 2020
     - Add support for IWhoisBackGroundProcessor for NuGet Package
     Documentation at https://firewallapi.asp-waf.com/?topic=html/T-Microsoft.Extensions.DependencyInjection.WhoisWhoisBackGroundProcessorExtensions.htm
     - Add access to the default instance for most of the propiatary storage classes for the firewall allowing direct access for advance use interface
     IResetRepository:  https://firewallapi.asp-waf.com/?topic=html/M-Walter.Web.FireWall.Infrastructure.Repositories.IResetRepository.Instance.htm
     IWhoisRepository:  https://firewallapi.asp-waf.com/html/M-Walter.Web.FireWall.Infrastructure.IWhoisRepository.Instance.htm
     IIncidentDatabase: https://firewallapi.asp-waf.com/html/M-Walter.Web.FireWall.RuleEngine.IIncidentDatabase.Instance.htm

     13 November 2020
     - Update the way that default interface object created and will capture missing interfaces when a custom FireWall instance
     used extension methods in service registration but the constructor does not capture the interface.
     - Fix Spelling and update documentation

     12 November 2020
     - Update IPageRequest allow to read block cookie reasons using ContainsBlockCookie method allowing you to log the reasons documented

     11 November 2020
     - Update packages and support .Net 5.0

     08 November 2020
     Update signatures FireWallBase for null validly testing by the compiler and IntelliSense

     01 November 2020
     - Add overload methods to override default storage location and data retention for firewall database state per data type

     30 October 2020
     - implement database state for firewall

     15 October 2020
     - Update User blocking message
     - Add FireWall exception handler event
     - Reduce firewall footprint when using CookieFactory in Firewall
     - Improve GDPR action by cashing Cookie requests between HttGet and HttpPost AJAX callbacks


     14 October 2020
     - Update to .net core 3.1.4

     12 October 2020
     1. Change Database logging interface providing access to full IPageRequest interface

     09 October 2020
     1. Fix bug in UserAgent database storage creation script
     2. Update ToDo message generated when finding security issue in application

     08 October 2020
     1 update documentation
     2 update filter improve dependency independence

     06 October 2020
     1. Update Browser data
     2. Add extension method to service configuration to better configure UserAgent storage
     3. Improved user agent cashing and device recognition
     documentation at: https://firewallapi.asp-waf.com/?topic=html/AllMembers.T-Walter.Web.FireWall.Browser.IUserAgent.htm

     05 October 2020
     1. Update NuGet Package References
     2. Update EULA
     3. Provide access to browser and browser meta data of IUserAgent in IPageRequest.User.UserAgent

     1 October 2020
     1. Add interactions to IPageRequest for on a Root page if User discovery is used
     2. Update NuGet package References
     3. Fix bug where user cookie was always a session cookie



     30 September 2020
     1. Sort result for text based reporting

     29 September 2020
     1. Integrate Lazy logging from Walter.dll
     2. Fix bug on license validator
     3. Update FireWall session storage interface
     4. Update NugetPackage references

     24 September 2020
     1. fix index error on ILogger interface in Guard Module
     2. Include Minify data to reporting interface

     23 September 2020
     1. Add Minification to the reporting data class

     22 September 2020
     1. Add User type filters that allow the firewall to reject BOT's and Malicious users
     documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.BlockBotsFilter.htm
     documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.BlockMaliciousUserFilter.htm

     19 September 2020
     1. Add Minify attribute
     documentation at https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.MinifyAttribute.htm
     2. Add Firewall disk manipulation detection event
     documentation at https://firewallapi.asp-waf.com/?topic=html/E-Walter.Web.FireWall.FireWallBase.OnDiskManipulation.htm
     3. Add User GDPR cookie solution using transparent encryption and IPageRequest.User cookie capabilities
     documentation at https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Web.FireWall.IUserIdentity.WriteCookie.htm
     https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.CookieConfig.UseTransparentEncryption.htm

     16 September 2020
     1. Streamline the FileWall tag helpers
     2. Update Disk logging NuNet Package now in Walter.Web.FireWall.DiskLogging NuGet Package
     3. Update ILogging NuNet Package now in Walter.Web.FireWall.ILogging NuGet Package
     4. Update package references

     14 September 2020
     1. Update package references
     2. Add NoCashAttribute
     https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.NoCacheAttribute.htm
     3. Add ModelFilter attribute
     https://firewallapi.asp-waf.com/?topic=html/T-Walter.Web.FireWall.Filters.ModelFilterAttribute.htm

     09 September 2020
     1. Add access to Rules class for advanced configuration before rule engine uses it to generated default rules
     https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.IFireWallConfig.htm

     2. Add access to RuleEngine configuration for runtime PEN scripts detection by making RulesConfig.BlockedPatterns Property public
     https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.BlockedPatterns.htm

     3. Update documentation and sample documentation in on-line help and manual
     https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf

     4. Fix issue where sometimes a user gets rejected for being in the wrong group without having a filter defined.
     https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.RejectUsersByDefault.htm


     08 September 2020
     1. Add OnRootPageRequestDisposed and OnResourceSend event to FireWallBase class as well as IFireWall interface
     Methods allow for post processing in proprietary projects
     https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.FireWallBase.htm
     2. Provide access to default rules for UrlValidationPatterns
     https://firewallapi.asp-waf.com/?topic=html/P-Walter.Web.FireWall.Configurations.RulesConfig.BlockedPatterns.htm

     2. Fix bug where sometimes users would be blocked as no user rule was defined

     06 September 2020
     1. update documentation
     2. Update terms
     3. Update NuGet package references

     04 September 2020
     1. update documentation
     2. Add manual blocking on event

     03 September 2020
     1. Add events for firewall management
     https://firewallapi.asp-waf.com/?topic=html/Events.T-Walter.Web.FireWall.IFireWall.htm
     2. Add method for using custom IFireWall implementation using base class
     https://firewallapi.asp-waf.com/?topic=html/M-Walter.Web.FireWall.FireWallBase.-ctor.htm

     27 August 2020
     1. Update License test for machine name in URL allowing it as a valid local licensed domain as LocalHost
     2. Update documentation
     3. Save incidents to disk in clear json format making it easier to validate blocking incidents
     4. Show RuleId and ViolationId in Page if triggered and enabled

     26 August 2020
     1. Export FireWall base to the framework for custom implementation of IFireWall

     22 August 2020
     1. Alter default cookie names
     2. Set CRF token settings based on firewall settings
     3. update text report to associate fictitious user nr to incident details