使用 C++ 防火墙 开关和添加白名单

简介: 使用 C++ 防火墙 开关和添加白名单

以下代码示例练习 Windows 防火墙配置文件; 显示当前配置文件、关闭防火墙、打开防火墙并添加应用程序。

/*
    Copyright (c) Microsoft Corporation
    SYNOPSIS
        Sample code for the Windows Firewall COM interface.
*/
#include <windows.h>
#include <crtdbg.h>
#include <netfw.h>
#include <objbase.h>
#include <oleauto.h>
#include <stdio.h>
#pragma comment( lib, "ole32.lib" )
#pragma comment( lib, "oleaut32.lib" )
HRESULT WindowsFirewallInitialize(OUT INetFwProfile** fwProfile)
{
    HRESULT hr = S_OK;
    INetFwMgr* fwMgr = NULL;
    INetFwPolicy* fwPolicy = NULL;
    _ASSERT(fwProfile != NULL);
    *fwProfile = NULL;
// Create an instance of the firewall settings manager.
    hr = CoCreateInstance(
            __uuidof(NetFwMgr),
NULL,
            CLSCTX_INPROC_SERVER,
            __uuidof(INetFwMgr),
            (void**)&fwMgr
            );
if (FAILED(hr))
    {
printf("CoCreateInstance failed: 0x%08lx\n", hr);
goto error;
    }
// Retrieve the local firewall policy.
    hr = fwMgr->get_LocalPolicy(&fwPolicy);
if (FAILED(hr))
    {
printf("get_LocalPolicy failed: 0x%08lx\n", hr);
goto error;
    }
// Retrieve the firewall profile currently in effect.
    hr = fwPolicy->get_CurrentProfile(fwProfile);
if (FAILED(hr))
    {
printf("get_CurrentProfile failed: 0x%08lx\n", hr);
goto error;
    }
error:
// Release the local firewall policy.
if (fwPolicy != NULL)
    {
        fwPolicy->Release();
    }
// Release the firewall settings manager.
if (fwMgr != NULL)
    {
        fwMgr->Release();
    }
return hr;
}
void WindowsFirewallCleanup(IN INetFwProfile* fwProfile)
{
// Release the firewall profile.
if (fwProfile != NULL)
    {
        fwProfile->Release();
    }
}
HRESULT WindowsFirewallIsOn(IN INetFwProfile* fwProfile, OUT BOOL* fwOn)
{
    HRESULT hr = S_OK;
    VARIANT_BOOL fwEnabled;
    _ASSERT(fwProfile != NULL);
    _ASSERT(fwOn != NULL);
    *fwOn = FALSE;
// Get the current state of the firewall.
    hr = fwProfile->get_FirewallEnabled(&fwEnabled);
if (FAILED(hr))
    {
printf("get_FirewallEnabled failed: 0x%08lx\n", hr);
goto error;
    }
// Check to see if the firewall is on.
if (fwEnabled != VARIANT_FALSE)
    {
        *fwOn = TRUE;
printf("The firewall is on.\n");
    }
else
    {
printf("The firewall is off.\n");
    }
error:
return hr;
}
HRESULT WindowsFirewallTurnOn(IN INetFwProfile* fwProfile)
{
    HRESULT hr = S_OK;
    BOOL fwOn;
    _ASSERT(fwProfile != NULL);
// Check to see if the firewall is off.
    hr = WindowsFirewallIsOn(fwProfile, &fwOn);
if (FAILED(hr))
    {
printf("WindowsFirewallIsOn failed: 0x%08lx\n", hr);
goto error;
    }
// If it is, turn it on.
if (!fwOn)
    {
// Turn the firewall on.
        hr = fwProfile->put_FirewallEnabled(VARIANT_TRUE);
if (FAILED(hr))
        {
printf("put_FirewallEnabled failed: 0x%08lx\n", hr);
goto error;
        }
printf("The firewall is now on.\n");
    }
error:
return hr;
}
HRESULT WindowsFirewallTurnOff(IN INetFwProfile* fwProfile)
{
    HRESULT hr = S_OK;
    BOOL fwOn;
    _ASSERT(fwProfile != NULL);
// Check to see if the firewall is on.
    hr = WindowsFirewallIsOn(fwProfile, &fwOn);
if (FAILED(hr))
    {
printf("WindowsFirewallIsOn failed: 0x%08lx\n", hr);
goto error;
    }
// If it is, turn it off.
if (fwOn)
    {
// Turn the firewall off.
        hr = fwProfile->put_FirewallEnabled(VARIANT_FALSE);
if (FAILED(hr))
        {
printf("put_FirewallEnabled failed: 0x%08lx\n", hr);
goto error;
        }
printf("The firewall is now off.\n");
    }
error:
return hr;
}
HRESULT WindowsFirewallAppIsEnabled(
            IN INetFwProfile* fwProfile,
            IN const wchar_t* fwProcessImageFileName,
            OUT BOOL* fwAppEnabled
            )
{
    HRESULT hr = S_OK;
    BSTR fwBstrProcessImageFileName = NULL;
    VARIANT_BOOL fwEnabled;
    INetFwAuthorizedApplication* fwApp = NULL;
    INetFwAuthorizedApplications* fwApps = NULL;
    _ASSERT(fwProfile != NULL);
    _ASSERT(fwProcessImageFileName != NULL);
    _ASSERT(fwAppEnabled != NULL);
    *fwAppEnabled = FALSE;
// Retrieve the authorized application collection.
    hr = fwProfile->get_AuthorizedApplications(&fwApps);
if (FAILED(hr))
    {
printf("get_AuthorizedApplications failed: 0x%08lx\n", hr);
goto error;
    }
// Allocate a BSTR for the process image file name.
    fwBstrProcessImageFileName = SysAllocString(fwProcessImageFileName);
if (fwBstrProcessImageFileName == NULL)
    {
        hr = E_OUTOFMEMORY;
printf("SysAllocString failed: 0x%08lx\n", hr);
goto error;
    }
// Attempt to retrieve the authorized application.
    hr = fwApps->Item(fwBstrProcessImageFileName, &fwApp);
if (SUCCEEDED(hr))
    {
// Find out if the authorized application is enabled.
        hr = fwApp->get_Enabled(&fwEnabled);
if (FAILED(hr))
        {
printf("get_Enabled failed: 0x%08lx\n", hr);
goto error;
        }
if (fwEnabled != VARIANT_FALSE)
        {
// The authorized application is enabled.
            *fwAppEnabled = TRUE;
printf(
"Authorized application %lS is enabled in the firewall.\n",
                fwProcessImageFileName
                );
        }
else
        {
printf(
"Authorized application %lS is disabled in the firewall.\n",
                fwProcessImageFileName
                );
        }
    }
else
    {
// The authorized application was not in the collection.
        hr = S_OK;
printf(
"Authorized application %lS is disabled in the firewall.\n",
            fwProcessImageFileName
            );
    }
error:
// Free the BSTR.
    SysFreeString(fwBstrProcessImageFileName);
// Release the authorized application instance.
if (fwApp != NULL)
    {
        fwApp->Release();
    }
// Release the authorized application collection.
if (fwApps != NULL)
    {
        fwApps->Release();
    }
return hr;
}
HRESULT WindowsFirewallAddApp(
            IN INetFwProfile* fwProfile,
            IN const wchar_t* fwProcessImageFileName,
            IN const wchar_t* fwName
            )
{
    HRESULT hr = S_OK;
    BOOL fwAppEnabled;
    BSTR fwBstrName = NULL;
    BSTR fwBstrProcessImageFileName = NULL;
    INetFwAuthorizedApplication* fwApp = NULL;
    INetFwAuthorizedApplications* fwApps = NULL;
    _ASSERT(fwProfile != NULL);
    _ASSERT(fwProcessImageFileName != NULL);
    _ASSERT(fwName != NULL);
// First check to see if the application is already authorized.
    hr = WindowsFirewallAppIsEnabled(
            fwProfile,
            fwProcessImageFileName,
            &fwAppEnabled
            );
if (FAILED(hr))
    {
printf("WindowsFirewallAppIsEnabled failed: 0x%08lx\n", hr);
goto error;
    }
// Only add the application if it isn't already authorized.
if (!fwAppEnabled)
    {
// Retrieve the authorized application collection.
        hr = fwProfile->get_AuthorizedApplications(&fwApps);
if (FAILED(hr))
        {
printf("get_AuthorizedApplications failed: 0x%08lx\n", hr);
goto error;
        }
// Create an instance of an authorized application.
        hr = CoCreateInstance(
                __uuidof(NetFwAuthorizedApplication),
NULL,
                CLSCTX_INPROC_SERVER,
                __uuidof(INetFwAuthorizedApplication),
                (void**)&fwApp
                );
if (FAILED(hr))
        {
printf("CoCreateInstance failed: 0x%08lx\n", hr);
goto error;
        }
// Allocate a BSTR for the process image file name.
        fwBstrProcessImageFileName = SysAllocString(fwProcessImageFileName);
if (fwBstrProcessImageFileName == NULL)
        {
            hr = E_OUTOFMEMORY;
printf("SysAllocString failed: 0x%08lx\n", hr);
goto error;
        }
// Set the process image file name.
        hr = fwApp->put_ProcessImageFileName(fwBstrProcessImageFileName);
if (FAILED(hr))
        {
printf("put_ProcessImageFileName failed: 0x%08lx\n", hr);
goto error;
        }
// Allocate a BSTR for the application friendly name.
        fwBstrName = SysAllocString(fwName);
if (SysStringLen(fwBstrName) == 0)
        {
            hr = E_OUTOFMEMORY;
printf("SysAllocString failed: 0x%08lx\n", hr);
goto error;
        }
// Set the application friendly name.
        hr = fwApp->put_Name(fwBstrName);
if (FAILED(hr))
        {
printf("put_Name failed: 0x%08lx\n", hr);
goto error;
        }
// Add the application to the collection.
        hr = fwApps->Add(fwApp);
if (FAILED(hr))
        {
printf("Add failed: 0x%08lx\n", hr);
goto error;
        }
printf(
"Authorized application %lS is now enabled in the firewall.\n",
            fwProcessImageFileName
            );
    }
error:
// Free the BSTRs.
    SysFreeString(fwBstrName);
    SysFreeString(fwBstrProcessImageFileName);
// Release the authorized application instance.
if (fwApp != NULL)
    {
        fwApp->Release();
    }
// Release the authorized application collection.
if (fwApps != NULL)
    {
        fwApps->Release();
    }
return hr;
}
HRESULT WindowsFirewallPortIsEnabled(
            IN INetFwProfile* fwProfile,
            IN LONG portNumber,
            IN NET_FW_IP_PROTOCOL ipProtocol,
            OUT BOOL* fwPortEnabled
            )
{
    HRESULT hr = S_OK;
    VARIANT_BOOL fwEnabled;
    INetFwOpenPort* fwOpenPort = NULL;
    INetFwOpenPorts* fwOpenPorts = NULL;
    _ASSERT(fwProfile != NULL);
    _ASSERT(fwPortEnabled != NULL);
    *fwPortEnabled = FALSE;
// Retrieve the globally open ports collection.
    hr = fwProfile->get_GloballyOpenPorts(&fwOpenPorts);
if (FAILED(hr))
    {
printf("get_GloballyOpenPorts failed: 0x%08lx\n", hr);
goto error;
    }
// Attempt to retrieve the globally open port.
    hr = fwOpenPorts->Item(portNumber, ipProtocol, &fwOpenPort);
if (SUCCEEDED(hr))
    {
// Find out if the globally open port is enabled.
        hr = fwOpenPort->get_Enabled(&fwEnabled);
if (FAILED(hr))
        {
printf("get_Enabled failed: 0x%08lx\n", hr);
goto error;
        }
if (fwEnabled != VARIANT_FALSE)
        {
// The globally open port is enabled.
            *fwPortEnabled = TRUE;
printf("Port %ld is open in the firewall.\n", portNumber);
        }
else
        {
printf("Port %ld is not open in the firewall.\n", portNumber);
        }
    }
else
    {
// The globally open port was not in the collection.
        hr = S_OK;
printf("Port %ld is not open in the firewall.\n", portNumber);
    }
error:
// Release the globally open port.
if (fwOpenPort != NULL)
    {
        fwOpenPort->Release();
    }
// Release the globally open ports collection.
if (fwOpenPorts != NULL)
    {
        fwOpenPorts->Release();
    }
return hr;
}
HRESULT WindowsFirewallPortAdd(
            IN INetFwProfile* fwProfile,
            IN LONG portNumber,
            IN NET_FW_IP_PROTOCOL ipProtocol,
            IN const wchar_t* name
            )
{
    HRESULT hr = S_OK;
    BOOL fwPortEnabled;
    BSTR fwBstrName = NULL;
    INetFwOpenPort* fwOpenPort = NULL;
    INetFwOpenPorts* fwOpenPorts = NULL;
    _ASSERT(fwProfile != NULL);
    _ASSERT(name != NULL);
// First check to see if the port is already added.
    hr = WindowsFirewallPortIsEnabled(
            fwProfile,
            portNumber,
            ipProtocol,
            &fwPortEnabled
            );
if (FAILED(hr))
    {
printf("WindowsFirewallPortIsEnabled failed: 0x%08lx\n", hr);
goto error;
    }
// Only add the port if it isn't already added.
if (!fwPortEnabled)
    {
// Retrieve the collection of globally open ports.
        hr = fwProfile->get_GloballyOpenPorts(&fwOpenPorts);
if (FAILED(hr))
        {
printf("get_GloballyOpenPorts failed: 0x%08lx\n", hr);
goto error;
        }
// Create an instance of an open port.
        hr = CoCreateInstance(
                __uuidof(NetFwOpenPort),
NULL,
                CLSCTX_INPROC_SERVER,
                __uuidof(INetFwOpenPort),
                (void**)&fwOpenPort
                );
if (FAILED(hr))
        {
printf("CoCreateInstance failed: 0x%08lx\n", hr);
goto error;
        }
// Set the port number.
        hr = fwOpenPort->put_Port(portNumber);
if (FAILED(hr))
        {
printf("put_Port failed: 0x%08lx\n", hr);
goto error;
        }
// Set the IP protocol.
        hr = fwOpenPort->put_Protocol(ipProtocol);
if (FAILED(hr))
        {
printf("put_Protocol failed: 0x%08lx\n", hr);
goto error;
        }
// Allocate a BSTR for the friendly name of the port.
        fwBstrName = SysAllocString(name);
if (SysStringLen(fwBstrName) == 0)
        {
            hr = E_OUTOFMEMORY;
printf("SysAllocString failed: 0x%08lx\n", hr);
goto error;
        }
// Set the friendly name of the port.
        hr = fwOpenPort->put_Name(fwBstrName);
if (FAILED(hr))
        {
printf("put_Name failed: 0x%08lx\n", hr);
goto error;
        }
// Opens the port and adds it to the collection.
        hr = fwOpenPorts->Add(fwOpenPort);
if (FAILED(hr))
        {
printf("Add failed: 0x%08lx\n", hr);
goto error;
        }
printf("Port %ld is now open in the firewall.\n", portNumber);
    }
error:
// Free the BSTR.
    SysFreeString(fwBstrName);
// Release the open port instance.
if (fwOpenPort != NULL)
    {
        fwOpenPort->Release();
    }
// Release the globally open ports collection.
if (fwOpenPorts != NULL)
    {
        fwOpenPorts->Release();
    }
return hr;
}
int __cdecl wmain(int argc, wchar_t* argv[])
{
    HRESULT hr = S_OK;
    HRESULT comInit = E_FAIL;
    INetFwProfile* fwProfile = NULL;
// Initialize COM.
    comInit = CoInitializeEx(
0,
                COINIT_APARTMENTTHREADED | COINIT_DISABLE_OLE1DDE
                );
// Ignore RPC_E_CHANGED_MODE; this just means that COM has already been
// initialized with a different mode. Since we don't care what the mode is,
// we'll just use the existing mode.
if (comInit != RPC_E_CHANGED_MODE)
   {
        hr = comInit;
if (FAILED(hr))
        {
printf("CoInitializeEx failed: 0x%08lx\n", hr);
goto error;
        }
   }
// Retrieve the firewall profile currently in effect.
    hr = WindowsFirewallInitialize(&fwProfile);
if (FAILED(hr))
    {
printf("WindowsFirewallInitialize failed: 0x%08lx\n", hr);
goto error;
    }
// Turn off the firewall.
    hr = WindowsFirewallTurnOff(fwProfile);
if (FAILED(hr))
    {
printf("WindowsFirewallTurnOff failed: 0x%08lx\n", hr);
goto error;
    }
// Turn on the firewall.
    hr = WindowsFirewallTurnOn(fwProfile);
if (FAILED(hr))
    {
printf("WindowsFirewallTurnOn failed: 0x%08lx\n", hr);
goto error;
    }
// Add Windows Messenger to the authorized application collection.
    hr = WindowsFirewallAddApp(
            fwProfile,
L"%ProgramFiles%\\Messenger\\msmsgs.exe",
L"Windows Messenger"
            );
if (FAILED(hr))
    {
printf("WindowsFirewallAddApp failed: 0x%08lx\n", hr);
goto error;
    }
// Add TCP::80 to list of globally open ports.
    hr = WindowsFirewallPortAdd(fwProfile, 80, NET_FW_IP_PROTOCOL_TCP, L"WWW");
if (FAILED(hr))
    {
printf("WindowsFirewallPortAdd failed: 0x%08lx\n", hr);
goto error;
    }
error:
// Release the firewall profile.
    WindowsFirewallCleanup(fwProfile);
// Uninitialize COM.
if (SUCCEEDED(comInit))
    {
        CoUninitialize();
    }
return 0;
}
目录
相关文章
|
算法 前端开发 网络安全
【Example】C++ 用于编译时封装的 Pimpl 演示 (编译防火墙 Private-IMPL)
什么是 Private-IMPL ? 即【隐藏实现的方式】,如果你还停留在学习的阶段,那这种方式对你的代码几乎毫无用处。 但是如果你走入到真实项目当中,这种方式又显得尤为重要。
149 0
|
网络协议 Linux 网络安全
Linux 下设置防火墙白名单(RHEL 6 和 CentOS 7)
版权声明:本文为博主原创文章,未经博主允许不得转载。 https://blog.csdn.net/catoop/article/details/50476099 进入Linux 命...
1501 0
|
4月前
|
运维 网络协议 安全
小白带你学习linux的防火墙
小白带你学习linux的防火墙
144 1
|
6月前
|
安全 Linux 网络安全
Linux一些防火墙实战知识
本文介绍了如何在Linux中设置防火墙和开放端口,以提高服务器的安全性。首先,使用firewalld作为防火墙软件包,并确保firewalld服务正在运行。然后,通过添加服务来定义允许的服务端口,可以使用firewall-cmd命令查看当前已定义的服务,并使用firewall-cmd命令添加服务。添加规则后,需要重新加载firewalld配置以使更改生效。在某些情况下,需要打开特定的端口,例如HTTP端口80和HTTPS端口443。可以使用firewall-cmd命令打开端口,并将规则添加到相应的区域。。。确实都是工作中日常中会用到的一些命令
|
6月前
|
安全 Linux 网络安全
百度搜索:蓝易云【linux iptables安全技术与防火墙】
请注意,iptables的具体使用方法和配置选项可能会有所不同,取决于Linux发行版和版本。管理员应该参考相关文档和资源,以了解适用于其特定环境的最佳实践和配置方法。
466 0
百度搜索:蓝易云【linux iptables安全技术与防火墙】
|
6月前
|
开发框架 网络协议 Ubuntu
【Linux】配置网络和firewall防火墙(超详细介绍+实战)
【Linux】配置网络和firewall防火墙(超详细介绍+实战)
1189 0
|
1月前
|
存储 安全 网络协议
使用 firewall-cmd 管理 Linux 防火墙端口
本文将介绍如何使用 firewall-cmd 工具在 Linux 系统中进行简单端口管理,包括开放、查询、关闭等操作。通过实例展示相关命令的用法,希望能对大家有所帮助。
85 0
|
7月前
|
关系型数据库 Linux 网络安全
Linux系统下安装mariaDB数据库及防火墙
Linux系统下安装mariaDB数据库及防火墙
111 0
|
4月前
|
网络协议 Linux 网络安全
linux服务器防火墙的开启及关闭
linux服务器防火墙的开启及关闭
196 1