• shell telnet 路由器


    #!/usr/bin/expect -f
    
    spawn  telnet 172.16.1.80
    expect "login" {
            send   "admin
    "
            expect {
                    "Password" { send "admin
    " }
                    }
            }
    
    expect ">"  {send "show   interface  all  status
    "}
    expect ">"  {send "exit
    "}
    
    expect eof
    exit 0
    #!/bin/sh
    up_port="GE1 GE2  GE3 GE4 GE5 GE6 GE7 XGE1 XGE2"
    tmp=`../plugin//wk.exp > /tmp/.log.wk`
    
    route_status=`grep Up /tmp/.log.wk`
    port=`echo  "$route_status" |awk  -F' '  '{print $1}'`
    
    for x  in $up_port
    do
            echo $port |grep -w  $x &> /dev/null #||  echo 'port:' $x 'is down'
            if [ $? = 1 ];then
                    case $x  in
                        "GE1" )
                            echo "alarm" "critical"  "is" "$x SGSN601 Data interrupt";;
                        "GE2" )
                            echo "alarm" "critical" "is" "$x SGSN602 Data interrupt";;
                        "GE3" )
                            echo "alarm" "critical" "is" "$x SGSN603 Data interrupt";;
                        "GE4" )
                            echo "alarm" "critical" "is" "$x SGSN207 Data interrupt";;
                        "GE5" )
                            echo "alarm" "critical" "is" "$x SGSN501 Data interrupt";;
                        "GE6" )
                            echo "alarm" "critical" "is" "$x SGSN504 Data interrupt";;
                        "GE7" )
                            echo "alarm" "critical" "is" "$x SGSN505 Data interrupt";;
                        "XGE1" )
                            echo "alarm" "critical" "is" "$x SGSN201&202&203 Data interrupt";;
                        "XGE2" )
                            echo "alarm" "critical" "is" "$x Platform collect Data interrupt";;
                    esac
            fi
    done
  • 相关阅读:
    Exp8 Web综合
    Exp7 网络欺诈防范
    更新Linux下openssl路径和库路径
    CVE-2019-5786漏洞利用复现
    Exp6 MSF应用基础
    CVE-2020-11651漏洞利用复现
    Exp5 信息搜集与漏洞扫描
    Exp4 恶意代码分析
    快速搭建SpringBoot项目
    Java split() 方法注意事项
  • 原文地址:https://www.cnblogs.com/bokun-wang/p/3887441.html
Copyright © 2020-2023  润新知