[go: up one dir, main page]

WO2003061238A2 - Serveur multifonctionnel, notamment serveur coupe feu double - Google Patents

Serveur multifonctionnel, notamment serveur coupe feu double Download PDF

Info

Publication number
WO2003061238A2
WO2003061238A2 PCT/EP2003/000416 EP0300416W WO03061238A2 WO 2003061238 A2 WO2003061238 A2 WO 2003061238A2 EP 0300416 W EP0300416 W EP 0300416W WO 03061238 A2 WO03061238 A2 WO 03061238A2
Authority
WO
WIPO (PCT)
Prior art keywords
server
firewall
multifunctional
independent
servers
Prior art date
Application number
PCT/EP2003/000416
Other languages
German (de)
English (en)
Other versions
WO2003061238A3 (fr
Inventor
Reinhold Unrecht
Manfred Hainzinger
Jörg Hubert
Frank Siefert
Original Assignee
Amcornet Security Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amcornet Security Gmbh filed Critical Amcornet Security Gmbh
Priority to AU2003218637A priority Critical patent/AU2003218637A1/en
Publication of WO2003061238A2 publication Critical patent/WO2003061238A2/fr
Publication of WO2003061238A3 publication Critical patent/WO2003061238A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers

Definitions

  • Multi-function server in particular twin firewall server
  • the present invention relates to a multifunction server, in particular a twin server, with at least two independent servers, according to the preamble of claim 1.
  • a so-called dual or twin server from iTox is known in practice, which experts also call "Double Dragon".
  • This dual server was initially developed for Microsoft as an all-in-one solution for mirror server systems is sold by iTox as a 19 "rack installation unit.
  • the "Double Dragon” was designed as a compact mirror server for mirror server farms and in particular for the Microsoft Network (MSN) primarily for mapping radius functions in websites with a network card.
  • MSN Microsoft Network
  • a multifunction server in particular a twin server, with at least two independent servers is proposed for the first time, each of which has its own mainboard, at least its own CPU, hard disks, memory modules and / or network card, the servers in a common, in particular 19 ' c -rackable, housings are arranged.
  • the multifunction server according to the invention is distinguished by the fact that it is designed as an "intelligent net access security server" (short: INAS server), in particular as a twin firewall server.
  • the intelligent net access security servers contained in this server Independent servers are physically separated from each other, which offers the high security known so far only from separate individual systems operated simultaneously side by side, since in the unlikely event of a successful hacker attack on the first machine or on the first server in the Intelligent Net Access security server a hack or direct access to the subsequent machine whether physical separation is actually impossible.
  • the independent servers each have at least one firewall. This has the advantage that, for example, the first firewall can offer certain security rules or mechanisms for rough or primary protective measures and the subsequent firewalls can offer corresponding rules or mechanisms for refined or higher security or secondary protection with correspondingly high-performance data throughput.
  • the firewalls monitor each other in normal operation, preferably by means of a heartbeat function, and / or divide up the data traffic and / or coordinate the necessary monitoring measures or security rules with one another. This automatic or automatic comparison of the firewalls for mutual coordination and monitoring with each other offers maximum reliability and high availability in addition to optimum protection against unwanted external attacks. This ensures previously unknown high security against intruders.
  • the remaining server and / or the remaining firewall form a completely independent, functional unit to maintain the minimum necessary protection.
  • a user or operator of the intelligent net access security server according to the invention has the greatest possible probability of having permanently available access to the external Internet (WAN) with acceptable performance and sufficient basic security.
  • the Multi-function or twin-firewall server according to the invention can be designed such that in the event of a component failure, be it a firewall or even a server, the remaining components will maintain the full functionality of the overall system for the period until the defective components are replaced can, so that a user or operator does not experience any significant loss of performance. In principle, total failures that hardly any company or even a medium-sized company can afford today are excluded.
  • a further advantage of the multifunction server according to the invention is its compact design, for example in a 19 "rackable form with preferably one height, a maximum of two heights, which is an extremely space-saving solution compared to the current state of the art.
  • the multifunction server according to the invention is one Cost-effective solution compared to the extremely expensive concepts of the prior art, in which one or more firewalls have to be configured, administered, monitored and operated on corresponding separate individual machines, with a plurality of further individual servers for the operation of a mail server, web - Servers, FTP servers or the like are added, plus routers, gateways and the like, which can drive up costs extremely, such conventional systems are simply no longer acceptable for economically calculating companies and are not particularly difficult for medium-sized companies
  • the multifunction server according to the invention advantageously provides an inexpensive and at the same time powerful remedy.
  • At least one of the server applications such as a router, an FTP server, a web server, a proxy server, a mail server and a Citrix Nfuse functionality, runs on it DNS server, a VPN functionality or a virus scanner, but preferably all of these server applications.
  • the server applications such as a router, an FTP server, a web server, a proxy server, a mail server and a Citrix Nfuse functionality
  • the security applications have at least one, but preferably all, of the security features, such as, for example, a) dynamic packet filter (b) camouflage (masquerading), c) content filtering, d) translation of network addresses (network address translation), e) virus detection (virus scan), f) virtual private network (ip addresses secure) (VPN (ip-secure)), g) translation of portal addresses (port address translation), h) Filtering the Internet addresses (URL filtering) or i) Detecting attacks with the intention of sabotaging the computer or the LAN or putting services or the entire computer or the LAN out of operation (fill detection (DDoS / DoS / Intrusion) ) on.
  • the security features such as, for example, a) dynamic packet filter (b) camouflage (masquerading), c) content filtering, d) translation of network addresses (network address translation), e) virus detection (virus scan), f) virtual private network (ip addresses secure) (VPN (i
  • the multifunction server has a common interface which is provided for the administration of the applications running on it. This provides a central interface for configuration, installation and maintenance. This helps to save time for administrators, and the time-consuming and nerve-racking work from machine to machine and checking which machine is causing problems can also be eliminated.
  • Administration of security and internet applications is provided via the common interface, in particular via a web browser. This simplifies the operation of the security and Internet applications in a particularly advantageous manner, so that maintenance and administration is possible from anywhere, so that an administrator no longer has to go to the multifunction server according to the invention, but from every seat can do from any work.
  • a multifunction server is designed such that it is connected between an internal network (LAN) and an external network (WAN) and forms a demilitarized zone (DMZ).
  • LAN internal network
  • WAN external network
  • DMZ demilitarized zone
  • the multifunction server on the first stand-alone server is the gateway, the first firewall and the graphical Mapped user interface (GUI) and on the second independent server, the second firewall and the DMZ with, for example, at least mail, proxy, web server, and possibly the Citrix Nfuse functionality.
  • GUI graphical Mapped user interface
  • the first independent server carries redundant images or copies of the second firewall and the DMZ with the server applications running there, e.g. Mail, proxy, web server and possibly a Citrix Nfuse functionality, the second independent server carrying redundant images of the gateway of the first firewall and the graphical user interface (GUI).
  • GUI graphical user interface
  • the independent servers are physically separate from one another and also each have separate power supply units for the voltage supply. This extensive physical separation even offers security against failure of one downstream system in the event of failure of a main system, be it due to a short circuit or other events, since this physical separation, as far as possible, prevents physical events occurring on one machine from spreading from one machine to another.
  • the multifunction server is designed with at least six network cards, preferably three network cards per independent server.
  • a twin firewall server there is an optimal number of network interfaces available for communication.
  • communication of the firewalls via such network interfaces is provided.
  • the communication of the servers also takes place via such network interfaces.
  • the communication of the independent servers with the firewalls is also realized via network interfaces, be it from a server to a firewall and / or vice versa. This network interface-shaped communication offers optimal transparency and monitoring options for data traffic with consistently high quality and optimal or fast data throughput.
  • the multifunction server according to the invention is freely scalable.
  • the multifunction server according to the invention can thus grow with the requirements and expectations of the user or operator from an inexpensive entry-level solution to a variant that meets the requirements of average users and a high-end intelligent net access security server.
  • Fig. 1 in a schematically highly simplified diagram, the arrangement of the multifunction server according to the invention between the LAN and the WAN.
  • the multifunction server 1 is symbolized in FIG. 1 by the slightly elliptical circle.
  • a first firewall is symbolized on the two independent servers as a so-called firewall bridge 2 as an external interface to the external Internet (WAN).
  • WAN external Internet
  • a second firewall 4 which preferably runs on the second independent server and in which the router functionality and / or a gateway is symbolized with the machine symbol 6.
  • LAN internal network
  • DMZ demilitarized zone
  • the Intelligent Net Access Security Server can take over all functions for LAN and WAN.
  • the firewall bridge can be designed as a SonicWall firewall bridge and both the above-mentioned variant of its arrangement as a branch office to the Internet and as the last bastion in front of the internal network can be implemented.
  • Router 4 can also be configured as a D-Link router. However, it is also possible to integrate router or firewall concepts or products from other manufacturers.
  • the above-discussed invention of a multifunction server which is designed as an intelligent Net Access Security server (INAS server), offers one Maximum functionality with a minimum of components and hardware used, whereby scaling from an inexpensive INAS server light variant to a standard to classic variant to a premium variant is possible.
  • INAS server intelligent Net Access Security server
  • the present invention offers an all-in-one solution without compromising on security.
  • the INAS server combines firewall, server services and a real DMZ in one device. Optimal security can be guaranteed by the physical separation of the systems, whereby no compromises regarding security and functionality have to be accepted.
  • the hardware and software is scalable according to customer requirements. From the basic system to high-performance, everything is based on a uniform, modular hardware and software solution. A central administration of security and internet presence is given.
  • the firewall and all other functions on both machines can be administered via a common interface.
  • the firewall used offers all equipment and security features of all security products available on the market. These are, for example: Dynamic Packet Filter, Network Address Translation, Port Address Translation, Masquerading, Virus Scan, URL Filtering, Content Filtering, VPN (ip-secure) and / or Fill Detection (DoS / mtrusion).
  • the following components are fully integrated into the system and thus offer intelligent access: Apache web server, mail server, FTP server, Cytrix application server and / or proxy server.
  • the modular structure of the concept according to the invention and the open architecture of the firewall make the system extremely flexible and very versatile. It can be manufactured or set up as a pure firewall system for any company. It is also conceivable to have a firewall and mail server map on the INAS server. It is also possible to offer a firewall and a DMZ solution, whereby a virus scan, a web, mail and / or FTP server can run on the INAS server with firewall and real DMZ. The user or operator of an INAS server according to the invention can be assured of trouble-free support as well as upgrades without hardware replacement or new installation.
  • the INAS server according to the invention offers this functionality and security in a system of this scope for the first time.
  • the physically separate structure ensures the highest possible security.
  • Functionalities such as web, mail, FTP application servers are available on one device.
  • the complete administration takes place via a common user interface on any PC in the network. This means that all services and products, such as WWW servers, proxy servers, Nfuse servers, virus scanners, FTP servers, DHCP / DNS servers, mail servers and / or firewalls, are available in a correspondingly advantageously designed variant.
  • the INAS server according to the invention sets new standards for complete solutions with the highest possible security.
  • the INAS server according to the invention consists, for example, of two server systems integrated in a 19 "housing that only requires one height. If space is available in the rack, variants with two heights can also be provided. This This in turn has advantages when it comes to air conditioning or when optimizing the cooling.
  • An Intel motherboard can provide a conceivable configuration for each of the two independent servers. 900 Mhz Intel Celeron server processors are installed on it.
  • the INAS server has a total of six, ie three per independent server W
  • Network cards which can be, for example, 100 Mbit NIC cards.
  • 30 GB UDMA 100 HDD disks are proposed as hard disks.
  • the INAS server is not only available in a rack, but also as a stand-alone variant in its own tower as a desktop PC. 5
  • the firewall, the GUI and the login are provided on the first independent server system.
  • the second machine carries the firewall, the DHCP, proxy, VPN, mail, web, and / or Nfuse server as well as mobile PPTP functionality and NW tools.
  • the second PC system can be supplemented with a virus scan functionality and an FTP server.
  • a cluster capability can be provided with an INAS server premium type and load balancing and monitoring via heartbeat and the like can be scheduled.
  • 15 can, for example, be designed for up to 250 users.
  • the INAS server according to the invention offers further advantages. These are, for example, the central administration of security and server functions. Network monitoring, login and analysis on one machine. A high
  • Multilingualism offers communication in all directions. High availability, which can also be increased through clustering and load balancing, offers maximum performance for the capital to be spent.
  • the present invention proposes for the first time a multifunction server, in particular a twin server, with at least two independent ones Servers, each of which has its own mainboard, at least one of its own CPU, hard disk, memory modules and / or network card, the servers being arranged in a common, in particular 19 "rackable, housing.
  • the new multifunction server is intelligent Net access security server (INAS for short), in particular designed as a twin firewall server.
  • the firewalls run redundantly or in parallel on the two independent servers.
  • the firewalls monitor each other in normal operation, preferably using a heartbeat function, and / or share the data traffic and / or coordinate the necessary monitoring measures in the event of a failure of a server and / or a firewall, the remaining server and / or the remaining firewall form a fully independent functional unit to maintain the minimum necessary protection.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un serveur multifonctionnel, notamment un serveur coupe feu double, comportant au moins deux serveurs indépendants respectivement composés d'une carte mère, d'une unité centrale, de disques durs, de composants mémoire et/ou d'une carte réseau, lesdits serveurs étant logés dans un boîtier 19''. Le serveur multifonctionnel selon l'invention est conçu en tant que serveur de sécurité d'accès réseau intelligent, notamment en tant que serveur coupe feu double. Sur les deux serveurs indépendants, les coupe-feu fonctionnent de façon redondante ou parallèle, et se contrôlent mutuellement en fonctionnement normal, de préférence au moyen d'une fonction de fréquence cardiaque, et/ou se partagent le trafic de données, et/ou adaptent mutuellement les mesures de contrôle nécessaires. En cas de panne d'un serveur et/ou coupe-feu, le serveur et/ou coupe-feu restant forme une unité fonctionnelle indépendante assurant une protection minimale.
PCT/EP2003/000416 2002-01-17 2003-01-16 Serveur multifonctionnel, notamment serveur coupe feu double WO2003061238A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003218637A AU2003218637A1 (en) 2002-01-17 2003-01-16 Multifunctional server, in particular a twin-firewall server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10201655.0 2002-01-17
DE10201655A DE10201655C1 (de) 2002-01-17 2002-01-17 Multifunktions-Server,insbesondere Twin-Firewall-Server

Publications (2)

Publication Number Publication Date
WO2003061238A2 true WO2003061238A2 (fr) 2003-07-24
WO2003061238A3 WO2003061238A3 (fr) 2003-12-18

Family

ID=7712402

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2003/000416 WO2003061238A2 (fr) 2002-01-17 2003-01-16 Serveur multifonctionnel, notamment serveur coupe feu double

Country Status (3)

Country Link
AU (1) AU2003218637A1 (fr)
DE (1) DE10201655C1 (fr)
WO (1) WO2003061238A2 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1648136A1 (fr) * 2004-10-12 2006-04-19 Juniper Networks, Inc. Dispositif intelligent intégré de sécurité d'un réseau pour les applications à haute disponibilité
US7650634B2 (en) 2002-02-08 2010-01-19 Juniper Networks, Inc. Intelligent integrated network security device
EP2575313A1 (fr) * 2011-09-27 2013-04-03 NorCom Information Technology AG Pare-feu morphant
US8463859B2 (en) 2010-07-02 2013-06-11 Research In Motion Limited Email system including synchronization server(s) providing synchronization based upon synchronization indicators stored on mobile devices and related methods
EP2405618B1 (fr) * 2010-07-02 2013-11-20 BlackBerry Limited Système de courrier électronique incluant un ou des serveurs de synchronisation fournissant une synchronisation basée sur des indicateurs de synchronisation stockés dans des dispositifs mobiles et procédés correspondants

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6662870B1 (en) 2001-01-30 2003-12-16 Cdx Gas, L.L.C. Method and system for accessing subterranean deposits from a limited surface area
US6679322B1 (en) 1998-11-20 2004-01-20 Cdx Gas, Llc Method and system for accessing subterranean deposits from the surface
US6280000B1 (en) 1998-11-20 2001-08-28 Joseph A. Zupanick Method for production of gas from a coal seam using intersecting well bores
US7025137B2 (en) 2002-09-12 2006-04-11 Cdx Gas, Llc Three-dimensional well system for accessing subterranean zones
US7134494B2 (en) 2003-06-05 2006-11-14 Cdx Gas, Llc Method and system for recirculating fluid in a well system
US7100687B2 (en) 2003-11-17 2006-09-05 Cdx Gas, Llc Multi-purpose well bores and method for accessing a subterranean zone from the surface
US7207395B2 (en) 2004-01-30 2007-04-24 Cdx Gas, Llc Method and system for testing a partially formed hydrocarbon well for evaluation and well planning refinement
US7207390B1 (en) 2004-02-05 2007-04-24 Cdx Gas, Llc Method and system for lining multilateral wells

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5898830A (en) * 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
EP1143661B1 (fr) * 1999-06-10 2005-08-10 Alcatel Internetworking, Inc. Système et procédé pour la mise-à-jour automatique de l'accessibilité dans des réseaux virtuels privés
DE10016236C2 (de) * 2000-03-31 2003-12-24 Infineon Technologies Ag Modular aufgebauter Server
US6718383B1 (en) * 2000-06-02 2004-04-06 Sun Microsystems, Inc. High availability networking with virtual IP address failover

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7650634B2 (en) 2002-02-08 2010-01-19 Juniper Networks, Inc. Intelligent integrated network security device
US7734752B2 (en) 2002-02-08 2010-06-08 Juniper Networks, Inc. Intelligent integrated network security device for high-availability applications
US8326961B2 (en) 2002-02-08 2012-12-04 Juniper Networks, Inc. Intelligent integrated network security device for high-availability applications
US8332948B2 (en) 2002-02-08 2012-12-11 Juniper Networks, Inc. Intelligent integrated network security device
US8631113B2 (en) 2002-02-08 2014-01-14 Juniper Networks, Inc. Intelligent integrated network security device for high-availability applications
US8726016B2 (en) 2002-02-08 2014-05-13 Juniper Networks, Inc. Intelligent integrated network security device
US8959197B2 (en) 2002-02-08 2015-02-17 Juniper Networks, Inc. Intelligent integrated network security device for high-availability applications
US9100364B2 (en) 2002-02-08 2015-08-04 Juniper Networks, Inc. Intelligent integrated network security device
EP1648136A1 (fr) * 2004-10-12 2006-04-19 Juniper Networks, Inc. Dispositif intelligent intégré de sécurité d'un réseau pour les applications à haute disponibilité
US8463859B2 (en) 2010-07-02 2013-06-11 Research In Motion Limited Email system including synchronization server(s) providing synchronization based upon synchronization indicators stored on mobile devices and related methods
EP2405618B1 (fr) * 2010-07-02 2013-11-20 BlackBerry Limited Système de courrier électronique incluant un ou des serveurs de synchronisation fournissant une synchronisation basée sur des indicateurs de synchronisation stockés dans des dispositifs mobiles et procédés correspondants
EP2575313A1 (fr) * 2011-09-27 2013-04-03 NorCom Information Technology AG Pare-feu morphant

Also Published As

Publication number Publication date
DE10201655C1 (de) 2003-07-31
AU2003218637A1 (en) 2003-07-30
WO2003061238A3 (fr) 2003-12-18

Similar Documents

Publication Publication Date Title
DE10201655C1 (de) Multifunktions-Server,insbesondere Twin-Firewall-Server
DE69827351T2 (de) Mehrfach-virtuelle Wegsucher
DE60216218T2 (de) Persönlicher Firewall mit Platzabhängiger Funktionalität
DE602005005134T2 (de) Fehlertolerante Netzwerkarchitektur
DE60308700T2 (de) Dynamische fernkonfiguration eines webservers zur bereitstellung von kapazität auf anfrage
DE60109177T2 (de) Weiterleitung von IP Paketen für Leitweglenkung-Protokolen
DE102006037499A1 (de) Verfahren und System zum Entdecken und Bereitstellen von Beinahe-Echtzeit-Aktualisierungen von VPN-Topologien
DE102007025162A1 (de) Alarmgesteuerte Zugriffskontrolle in einem Unternehmensnetz
DE102018214007A1 (de) Zusammenwirken von Altvorrichtungen in virtualisierten Netzwerken
WO1996013924A1 (fr) Dispositif de transmission de flux de donnees dans des reseaux de transmission de donnees
DE102007036511B4 (de) System aus einer Vielzahl von Gargeräten
EP2456133A1 (fr) Nýud de réseau de commutation modulaire pour un réseau de communication
DE112019007214T5 (de) Dynamischer Client-Ausgleich zwischen Zweig-Gateways
DE112016002949B4 (de) VM-zu-VM-Verkehrs-Schätzung in Mehrmieterdatenzentren
DE112017006045B4 (de) Übertragungsvorrichtung und verfahren zum hinzufügen einer route
DE102021127361A1 (de) Skalierbare sd-wan-topologie und routenautomatisierung
WO2006076752A1 (fr) Systeme de securite informatique
DE60302833T2 (de) Auf Benutzerkennwort basierende Paketvermittlung in virtuellen Netzen
EP2421100A1 (fr) Module de connexion enfichable pour connecter un appareil électronique à un réseau de communication Ethernet
DE60313026T2 (de) Verfahren und gerät zur verteilung von datenpaketen von einem computer zu einem clustersystem
DE60217520T3 (de) Router discovery protokoll auf einem mobilen internetprotokoll basierendem netz
EP2436166B1 (fr) Interface de service
EP1844598B1 (fr) Procede et dispositif pour affecter des adresses de paquets d'une pluralite de dispositifs
DE102022101550A1 (de) Verfahren eines Filterns von Paketen in einem Netzwerk-Switch und zugehöriger Filter
EP1748619B1 (fr) Méthode pour effectuer une connection de communications directe et sécurisée entre deux réseaux

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP