HVV期间,所服务客户的TOPSEC防火墙太老了,一级传下来几百个ip地址,都手动复制粘贴,太累。所以做个脚本,来实现批量添加ip
所用到的Python模块:requests、time
requests模块:
requests模块用来发包,构建数据包
//requests.post(url,params,headers,data)
time模块:
time模块用来设置程序等待
//time.sleep()
具体代码
import requests
import time #导入模块
requests.packages.urllib3.disable_warnings() #设定默认忽略无证书告警
requests = requests.session()
print(" ### input rule group name please ### ")
raw_rule_group = str(input("specified rule group: "))
rule_group = raw_rule_group.encode("gb2312") #指定封禁规则组
file = open("ip.txt","r+")
file_content = file.read()
file_content = file_content.replace(" ","\n")
file.close()
file = open("ip.txt","w+")
file.write(file_content)
file.close()
file = open("ip.txt","r")
file_content = file.readlines()
for i in range(0, len(file_content)):
file_content[i] = file_content[i].rstrip(‘\n‘) #去掉文件中的换行符
banned_ip = list(file_content)
file.close() #得到文件中的ip地址
cookie_file = open("cookie.txt","r")
raw_cookie = str(cookie_file.read())
cookie_file.close()
cookie = {"session_id_443":raw_cookie} #配置cookie
param = {
"Url":"HostObj",
"Act":"Edit",
"Name":rule_group
} #配置包实体内容
for n in range(len(banned_ip)):
data = {
"def_host_edt_but":"确定",
"def_host_mac":"00:00:00:00:00:00",
"def_host_name":rule_group,
"name_hidden":rule_group
}
data.setdefault("def_host_ipad",[]).append(banned_ip)
r_p = requests.post("https://172.28.220.254/cgi/maincgi.cgi",params=param,cookies=cookie,data=data,verify=False) #带上参数发包
print(" ### finish ### ")
#print(r_p.text)
time.sleep(9)
程序需要“ip.txt”、“cookie.txt”两个文档配合
Python工具 | TOPSEC-NGFW4000-批量IP封阻器(Simple-banip)
原文:https://www.cnblogs.com/biboli/p/PythonTool-TOPSEC-NGFW4000-SimpleBanip.html