[go: up one dir, main page]

WO2000060451A2 - Multiserveur fournissant des services informatiques integres - Google Patents

Multiserveur fournissant des services informatiques integres Download PDF

Info

Publication number
WO2000060451A2
WO2000060451A2 PCT/CA2000/000348 CA0000348W WO0060451A2 WO 2000060451 A2 WO2000060451 A2 WO 2000060451A2 CA 0000348 W CA0000348 W CA 0000348W WO 0060451 A2 WO0060451 A2 WO 0060451A2
Authority
WO
WIPO (PCT)
Prior art keywords
server
multiserver
file
lan
mail
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CA2000/000348
Other languages
English (en)
Other versions
WO2000060451A3 (fr
Inventor
Andrew Dick
Jeff Baulch
John Kirchknopf
Brian Boni
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ntkcom Corp
Original Assignee
Ntkcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ntkcom Corp filed Critical Ntkcom Corp
Priority to CA002402883A priority Critical patent/CA2402883A1/fr
Priority to AU2000235475A priority patent/AU2000235475A1/en
Publication of WO2000060451A2 publication Critical patent/WO2000060451A2/fr
Publication of WO2000060451A3 publication Critical patent/WO2000060451A3/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • Figure 9 shows a networks screen of the configuration management interface 20 of the multiserver of Figure 1 ;
  • Figure 10 shows a users and groups screen of the configuration management interface 20 of the multiserver of Figure 1 ;
  • Figure 12 shows a print server screen of the configuration management interface 20 of the multiserver of Figure 1
  • Figure 13 shows a fax server screen of the configuration management interface 20 of the multiserver of Figure 1 ;
  • a fifth group of users are virtual domain e-mail account users, who are given an e-mail account on a sub-domain or virtual domain, allowing them to use the incoming and outgoing mail services of that domain.
  • Print server 24 is also implemented using the following software package, which is available pursuant to the Alladin Free Public License, for making all configured non- postscript printers compatible with postscript:
  • the virtual LAN user exists only for the purpose of forwarding e- mail messages to group members and does not have any other attributes of a LAN user.
  • a file entitled /root/MSconfig/dat/g Mail/GROUPNAME.dat is created for every e-mail enabled group. This file contains a list of the users who are members of the group. USERS
  • Data file /var/spool/fax/modems.dat is used by Hylafax to create unique file names for PDF format files in which received faxes are stored.
  • ADMINISTRATION - LOCKS Multiserver 10 is configured to be administered at two levels: management level and administration level. Access to the administration screens of configuration management interface 20 may be at either level, both of which require password authorization.
  • Fax Server on - fax services are on off - fax services are off
  • Specific - FTP server 28 of the primary domain is accessible to FTP surfers connecting from specified IP addresses
  • Internet - FTP server 28 of the primary domain is accessible to FTP surfers connecting from any IP address
  • the manager may change the management password by selecting change management password control 572, which brings up a change management password dialog box (not shown).
  • the management password is recorded in a data file /root/MSconfig/dat/mgmtpass.dat
  • Mount/unmount CD-ROM control 602 will initially read "Mount CD-ROM”. If the administrator selects mount/unmount CD-ROM control 602 and a CD-ROM has been placed in a CD-ROM drive connected to multiserver 10, then the CD-ROM is mounted by taking the following steps:
  • step 1 fails, an attempt is made to mount the CD-ROM as a Macintosh HFS CD- ROM. If this succeeds, the Macintosh file information is provided to Netatalk.
  • a dialog box (not shown) is opened to allow the administrator to enter one or more specific IP addresses from which LAN users will be able to access multiserver 10 by telnet.
  • a LAN user who accesses multiserver 10 by telnet is initially connected to his or her home directory. The LAN user may have access to the remainder of the file system of multiserver 10, depending on the LAN user's permissions and group membership. The following steps are taken when telnet accessibility is changed:
  • the only requirement in the DNS map is that the primary domain name (ntk.com in the example above) must always be hosted by the primary domain name server, indicated by
  • IP address or another IP address to be the host of the selected service is mapped
  • LAN user information section 152 lists the users which have been added to the system and groups of which each user is a member. Every LAN user is a member of the users group.
  • the administrator may add a user by selecting control 154, bringing up an add user dialog box (not shown).
  • the add user dialog box allows the administrator to define the new user's name, password, the groups to which the user belongs and an e- mail forwarding option.
  • Multiserver 10 provides the following e-mail forwarding options: a user's e-mail may not be forwarded at all, or it may be forwarded to another internet e-mail address, to a fax machine (the administrator must provide a telephone number in this case), or the user's e-mail may be processed by a custom procmail script.
  • the user is automatically given an e-mail address at the primary domain of multiserver 10.
  • a new user is added to multiserver 10 by taking the following steps:
  • the administrator To modify or remove a file share volume, the administrator must highlight the relevant file share volume in the file share volume information section 188 and then select control 192 to edit the configuration of the file share volume or control 194 to delete the file share volume.
  • the operations required to edit or delete a file share volume will be apparent from the above description of adding a file share volume.
  • printer entries would appear in the printer list (on both Macintosh and Windows workstations).
  • the three entries may be printerX_highres, printerX_medres and printerX_lowres.
  • Windows based workstations are generally capable of selecting the various features offered by different printers by means of specific print dialogs for different printers, this capability has been disabled in multiserver 10 and a standard print dialog has been substituted. Windows users are still able to select any combination of features by selecting the appropriate entry from the printer list. This has been done for consistency between MAC and Windows workstations but is not necessary.
  • Virtual printers are added to unix configuration file /etc/printcap and Netatalk data file /usr/local/atalk/etc/papd.conf for each combination of features available on the selected physical printer.
  • the number of virtual printers added for a specific physical printer will be defined in the printer definition file supplied with multiserver 10.
  • the printer definition file is identifed in /etc/printcap as an input filter used to pre-process queued files prior to being printed.
  • Each virtual printer will be published to LAN workstations 42.
  • An entry may be removed from the list of printers in the printer information section 212 by selecting the entry and selecting printer delete control 216. The steps listed above will be reversed to remove the printer.
  • the Hylafax central queueing agent faxq is added to the startup sequence to ensure that fax server 34 continues to run when multiserver 10 is restarted. If the administrator selects fax server off control 244, the fax server is disabled by taking the following steps: 1. The Hylafax central queueing agent faxq is stopped.
  • Hylafax central queueing agent faxq is removed from the startup sequence to ensure that fax server 34 does not run when multiserver 10 is restarted.
  • Primary domain information section 302 shows the domain name of the primary domain to be hosted by web server 34, the server name of the public and private web sites on the primary domain, the name assigned to the multiserver computer (the name by which the multiserver computer is identified by LAN workstations), the server names of the FTP and mail servers on the primary domain and the names of primary and secondary name servers for the primary domain.
  • Primary domain information section 302 also shows the IP address of the secondary name server. This field will show "N/A" unless the secondary name server is located on a computer other than multiserver 10. In that case, this field will show the IP address or URL of that computer.
  • Unix configuration file /etc/sysconfig/network is updated to reflect the primary domain name and the name of the multiserver computer.
  • VIRTU ALDOMAINNAME is created to contain the e-mail accounts and aliases for the virtual domain.
  • Data file /home/httpd/users .VIRTU ALDOMAINNAME is created to contain the names and encrypted passwords of guests of the private web site of the virtual domain.
  • BIND configuration file /etc/named.conf is updated.
  • Private access control area 356 allows the administrator to control authorized access by authorized FTP users (LAN users and virtual domain administrators) to the the file system of the multiserver computer. Each of these users has a specified portion of the file system multiserver 10 which they may access by FTP. In the case of LAN users, this specified area is the LAN user's home directory. In the case of virtual domain administrators, this specified area is the directory within the web-server file share volume in which the public and private web sites of the virtual domain are stored.
  • Authorized access is access which requires the user to provide a password in order to access a designated part of the file system of the multiserver computer.
  • Authorized access may be granted on two levels: “no access” prevents these users from accessing their specified portions of the file system; and “read & write” access allows authorized users to read, download from and write to the specified portions of the FTP server.
  • the administrator may configure multiserver 10 for no authorized FTP access by selecting no access control 358. The following steps are taken to configure no authorized FTP access:
  • the FTP Authorized Section setting in data file /root/MSconfig/dat/screens.dat is updated.
  • WU-FTPD configuration file /etc/ftpaccess is configured to deny all access to authorized FTP users.
  • a new record is created for the guest in data file /root/MSconfig/vDomains/VIRTUALDOMAIN.guests, where VIRTUALDOMAIN represents the name of a virtual or sub-domain.
  • the guest is added to the Apache guest registry for the private web site of the virtual domain using an htautopasswd script.
  • Each LAN user is added to the Apache guest registry for the private web site of the primary domain using the htautopasswdp script described above.
  • the administrator may select one of four mail relay settings: None, LAN, Specific or Internet.
  • None relay setting is chosen, by selecting relay no outgoing mail control 406, no LAN user or virtual domain e-mail account user may send internet e- mail.
  • the None relay setting is configured by taking the following steps: 1. Ensure that no core change is taking place. If a core change is taking place, an error is returned.
  • the LAN relay setting is configured by taking the following steps:
  • Sendmail configuration file /etc/mail/ip_allow is configured to allow e-mail to be relayed only from IP addresses selected by the administrator.
  • the relay internet outgoing mail option is chosen, by selecting relay internet outgoing mail control 412, the mail server 32 will relay internet e-mail which originates from any IP address. This option is configured by taking the following steps: 1 . Ensure that no core change is taking place. If a core change is taking place, an error is returned. 2. The Outgoing Mail Relay record in data file /root/MSconfig/dat/screens.dat is updated. 3.
  • Sendmail configuration file /etc/mail/ip_allow is configured to allow e-mail to be relayed only from any internet IP address.
  • the administrator may add a virtual domain administrator for a virtual domain by highlighting the virtual domain and selecting add virtual domain administrator control 416, which brings up an add virtual domain administrator dialog box (not shown).
  • the add virtual domain administrator dialog box allows the administrator to configure the account name of the virtual domain administrator, the virtual domain administrator's password, an e-mail forwarding option which can forward the virtual domain administrator's e-mail to another e-mail account, to a fax machine, by a custom script or not at all.
  • the new e-mail account name is added to the unix user registry with the primary (or default) group of virtualmail, no supplementary group, with the home directory /home/virtualmailaccounts/ACCOUNTNAME, where the
  • /home/virtualmailaccounts/ACCOUNTNAME.procmailrc are created or modified as required and the ownership of the .forward and .procmailrc files is set to the e-mail account.
  • Sendmail configuration file /etc/mail/virtusertable is updated by adding an e-mail account ALIAS ⁇ VIRTUALDOMAIN linked to the owner.
  • Add blocked address dialog box allows the administrator to enter the e-mail address or internet domain from which mail is to be blocked and the message which is to be returned to the sending address. Once this information has been entered, the blocked address or domain is added to the mail server 32 by taking the following steps:
  • Data file /root/MSconfig/dat/domainList.dat is checked to ensure that the blocked address or domain is not hosted by multiserver 10. If it is, an error is returned.
  • Data file /root/MSconfig/dat/screens.dat is checked to ensure that the blocked address or domain is not the primary domain or part of the primary domain. If it is, then an error is returned. 4. The blocked address or domain is added to data file
  • a blocked e-mail address or internet domain may be removed by selecting delete blocked mail address control 436.
  • Approved domain section 454 comprises an approved domain list 455, an add approved domain control 456 and a delete approved domain control 458.
  • Approved domain list 455 lists domains that a LAN user may access if the LAN workstation 42 he is using has been added to the LAN registry with an approved internet access policy.
  • a domain may be added to the approved domain list 455 by selecting add approved domain control 456, which brings up an add approved domain dialog box (not shown).
  • Add approved domain dialog box allows the administrator to enter the name of a domain, which is then added to the approved policy by taking the following steps:
  • Data file /root/MSconfig/dat restricted.dat is checked to ensure that the domain is not in the restricted domain list used for the restricted internet access policy. If it is, an error is returned.
  • a LAN user To send a fax using fax server 34, a LAN user must be a member of the faxblast group. The LAN user must take two steps to send a fax:
  • a fax control file (FCF) or a fax web file (FWF) must be created in or copied into the fax_blast file share volume.
  • FCF files must have the extension .fcf and a FWF must have the extension .fwf.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)
  • Facsimiles In General (AREA)

Abstract

L'invention concerne un multiserveur pouvant fournir des services de partage de fichiers, des services d'impression, des services de télécopie et des services d'hébergement de contenu sur Internet. Ces différents services sont fournis au moyen de progiciels accessibles au public, dont la configuration est intégrée par une interface unifiée de gestion de la configuration. Cette interface de gestion de la configuration configure automatiquement les progiciels sous-jacents en réponse à une information entrée par un administrateur. Les progiciels sous-jacents peuvent être changés sans que la présentation de l'interface de gestion de la configuration en soit modifiée, ce qui permet à l'administrateur de faire évoluer le système sans devoir apprendre à configurer les nouveaux progiciels.
PCT/CA2000/000348 1999-04-01 2000-03-31 Multiserveur fournissant des services informatiques integres Ceased WO2000060451A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CA002402883A CA2402883A1 (fr) 1999-04-01 2000-03-31 Multiserveur fournissant des services informatiques integres
AU2000235475A AU2000235475A1 (en) 1999-04-01 2000-03-31 Multiserver for providing integrated computer services

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12760999P 1999-04-01 1999-04-01
US60/127,609 1999-04-01

Publications (2)

Publication Number Publication Date
WO2000060451A2 true WO2000060451A2 (fr) 2000-10-12
WO2000060451A3 WO2000060451A3 (fr) 2001-02-22

Family

ID=22430985

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2000/000348 Ceased WO2000060451A2 (fr) 1999-04-01 2000-03-31 Multiserveur fournissant des services informatiques integres

Country Status (3)

Country Link
AU (1) AU2000235475A1 (fr)
CA (1) CA2402883A1 (fr)
WO (1) WO2000060451A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003081844A1 (fr) * 2002-03-22 2003-10-02 Siemens Aktiengesellschaft Procede pour la creation d'une base de donnees de configuration de reseau
EP1419462A4 (fr) * 2001-08-24 2006-07-12 Bigfix Inc Procede de requete a distance, mesure sure et communication sure d'informations de configuration d'un dispositif informatique reseaute
CN100397818C (zh) * 2005-04-30 2008-06-25 大竑企业股份有限公司 一种多功能伺服系统
EP1480383A3 (fr) * 2003-05-21 2011-07-27 Alcatel Lucent Serveur de secours de réseau commandé par la gestion de réseau

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5459584A (en) * 1988-09-22 1995-10-17 Audiofax, Inc. Facsimile telecommunications system and method
JP2786236B2 (ja) * 1989-03-27 1998-08-13 株式会社日立製作所 データ配送方法および装置
US5414812A (en) * 1992-03-27 1995-05-09 International Business Machines Corporation System for using object-oriented hierarchical representation to implement a configuration database for a layered computer network communications subsystem
US5513126A (en) * 1993-10-04 1996-04-30 Xerox Corporation Network having selectively accessible recipient prioritized communication channel profiles
US5761669A (en) * 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
AU3502597A (en) * 1996-06-25 1998-01-14 Mci Communications Corporation Intranet graphical user interface for sonet network management
US6112015A (en) * 1996-12-06 2000-08-29 Northern Telecom Limited Network management graphical user interface
US6131116A (en) * 1996-12-13 2000-10-10 Visto Corporation System and method for globally accessing computer services
AU5772998A (en) * 1997-01-28 1998-08-18 British Telecommunications Public Limited Company Managing operation of servers in a distributed computing environment
WO1999000958A1 (fr) * 1997-06-26 1999-01-07 British Telecommunications Plc Transmission de donnees

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1419462A4 (fr) * 2001-08-24 2006-07-12 Bigfix Inc Procede de requete a distance, mesure sure et communication sure d'informations de configuration d'un dispositif informatique reseaute
WO2003081844A1 (fr) * 2002-03-22 2003-10-02 Siemens Aktiengesellschaft Procede pour la creation d'une base de donnees de configuration de reseau
EP1480383A3 (fr) * 2003-05-21 2011-07-27 Alcatel Lucent Serveur de secours de réseau commandé par la gestion de réseau
CN100397818C (zh) * 2005-04-30 2008-06-25 大竑企业股份有限公司 一种多功能伺服系统

Also Published As

Publication number Publication date
WO2000060451A3 (fr) 2001-02-22
CA2402883A1 (fr) 2000-10-12
AU2000235475A1 (en) 2000-10-23

Similar Documents

Publication Publication Date Title
US6131120A (en) Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
US6944183B1 (en) Object model for network policy management
EP1014249B1 (fr) Système et méthode d'authentification automatique d'un utilisateur auprès de plusieurs serveurs par un seule accès
US6643694B1 (en) System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface
US7882152B2 (en) Selection and storage of policies in network management
US6871346B1 (en) Back-end decoupled management model and management system utilizing same
US5764918A (en) Communications node for transmitting data files over telephone networks
US6708187B1 (en) Method for selective LDAP database synchronization
US7096255B2 (en) System and method for providing a roster list of temporary contacts having expiration periods designated by a user in an instant messaging environment
EP1134955A1 (fr) Système de gestion de réseaux avec répertoire d'adresses de réseau d' utilisateurs et de dispositifs, fournissant listes d'access à routeurs et serveurs
US6275570B1 (en) System and method of provisioning subscribers in a messaging environment comprising two messaging systems
US8108494B1 (en) Systems and methods for managing converged workspaces
US20080168566A1 (en) Group access management system
US20080034420A1 (en) System and method of portal customization for a virtual private network device
WO2003021464A2 (fr) Acces a distance securise entre homologues
WO2000060451A2 (fr) Multiserveur fournissant des services informatiques integres
US7430600B2 (en) Method and device for making a portal in a computer system secure
Detterman Administration of a Unix computer network
Pop Comparative study of electronic mail systems
Ahn et al. Towards role-based administration in network information services
JPH02305140A (ja) Lan制御方法
Chris Controlling Ftp: Providing Secured Data Transfers
Jakalan Linux Web Servers Remote Administration
Edge et al. Server Security
Campbell Pro Windows Small Business Server 2003

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 2402883

Country of ref document: CA

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP