WO2006108344A1 - Procede de realisation de reseau prive virtuel - Google Patents
Procede de realisation de reseau prive virtuel Download PDFInfo
- Publication number
- WO2006108344A1 WO2006108344A1 PCT/CN2006/000572 CN2006000572W WO2006108344A1 WO 2006108344 A1 WO2006108344 A1 WO 2006108344A1 CN 2006000572 W CN2006000572 W CN 2006000572W WO 2006108344 A1 WO2006108344 A1 WO 2006108344A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vpn
- parameters
- site
- private network
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
Definitions
- the present invention relates to the field of network communication technologies, and in particular, to a method for implementing a virtual private network. Background technique
- L2TP Layer 2 Tunneling Protocol
- the port 2 VLAN 20 user is divided into the L2TP group 3, and all the user hosts accessing the port 2 VLAN 20 form a VPN site, and the site is associated with the L2TP group 3, L2TP.
- Group3 corresponds to the L2TP configuration, including the L2TP network server (LNS) address, tunnel key, number of sessions, encapsulation format, quality of service (QoS) mechanism, load balancing mechanism, etc., so that the control plane and forwarding plane can be used to the user.
- LNS L2TP network server
- QoS quality of service
- Host information, VPN sites, and VPNs are identified and processed.
- a method for implementing a virtual private network comprising the steps of:
- the VPN device After the VPN device receives the private network data from the VPN site, determining the VPN to which the private network data belongs according to the correspondence between the operation parameter and the VPN site, and recording the corresponding VPN parameter, and forwarding according to the VP parameter;
- the VPN device receives the VPN packet from the public network, the VPN and the user parameters to which the VPN packet belongs are determined according to the correspondence between the operation parameter and the VPN site, and are assigned to the VPN device.
- the VPN operation parameters are statically configured through the command line interface or the WEB or network management interface.
- the VPN operation parameters are dynamically configured through authentication, authorization, charging/policy.
- the step B described therein includes:
- the user parameters include: a user, a domain, an Internet service provider, and/or an Internet content provider and/or an application service provider, a user group.
- the service parameters include: at least one of data, video, voice, service in a specified session, and session information.
- FIG. 1 is a block diagram of a general VPN architecture
- FIG. 5 is a schematic diagram of a VPN networking of the packet in the present invention.
- FIG. 7 is a schematic diagram of a VPN networking of the service in the present invention.
- step 201 configuring VPN operation parameter information, where the VPN operation parameters include: user parameters, message parameters, service parameters, network parameters, and the like. Depending on the actual needs, you can configure one or both. There are several ways to configure it, such as:
- the user parameters may be users, domains, ISP/ICP/ASP (Internet Service Provider, Internet Content Provider, Application Service Provider), user group, and the like.
- the packet parameters can be physical layer packets, data link layer packets, network layer packets, and all parameters included in the transport layer packets.
- the business parameters can be data, video, voice, business and/or session information in a given session.
- the correspondence between the VPN sites determines the VPN and user parameters to which they belong, and sends private network data to the VPN sites to which they belong.
- the specific sending process is as follows:
- the VPN operation information and the VPN site information are stripped of all VPN encapsulations in the VPN packet, and the VPN is decapsulated.
- Private network data
- FIG. 3 is a schematic diagram of networking based on user-defined VPN in the present invention:
- the user group defined by the user, domain, ISP/ICP/ASP, and other methods on the VPN device for example, according to the user's
- a certain type of attribute is divided into the same user group, typically as: All asymmetric digital subscriber line (loop) (ADSL) or wireless local area network (WLAN) access users, all the same service level (SLA) It is divided by means of accessing users.
- ADSL digital subscriber line
- WLAN wireless local area network
- SLA service level
- the management plane establishes users, domains, ISP/ICP/ASP, user groups through various static configuration methods such as command line interface CLI/WEB/network management, or various dynamic configuration modes such as AAA (authentication, authorization, and accounting)/policy.
- the correspondence with the VPN site forms information such as user information tables (including users, domains, ISP information, etc.) and VPN configuration tables.
- the so-called establishment of users, domains, ISP / ICP / ASP, user groups and other VPN sites, that is, a user, domain, ISP / ICP / ASP and all hosts under the user group are divided into a designated VPN All the hosts in the specified VPN are all members of the internal site. All the internal members of the VPN use the configured VPN mechanism and use the corresponding VPN functions, such as a corresponding tunnel and session function.
- a domain 168 is divided into L2TP Group1
- users of the 168 domain such as the user name of the authentication, such as "xxQ168, yyQ168, cw3 ⁇ 4168"
- a VPN site generally having an internal index or name, or VPN ID
- this VPN site and L2TP Groupl corresponding to various configurations of L2TP, including but not limited to LNS (L2TP network server) address, tunnel key, number of sessions, encapsulation format, QoS mechanism, load balancing mechanism, etc.
- LNS L2TP network server
- the association is performed so that the control plane and the forwarding plane can identify and process user host information, VPN sites, and VPNs.
- multiple users can be divided according to the account number, which may be a regular account such as a certain segment, a certain character or characters are special characters, or may be an exhaustive account.
- the corresponding division can also be performed.
- User groups that can be defined in other ways (for example, according to a certain type of attributes of the user, the same is the same user group, typically such as all ADSL or WL AN access users, all access users of the same SLA, etc.) Divide.
- the forwarding plane uses the standard VPN forwarding process to receive user data packets.
- the user information table (including the user, domain, and ISP information) is used to determine the private network data packets.
- the private network session is used to perform table lookup and encapsulation.
- VPN information and encapsulation find the corresponding public network routing, forwarding, encapsulation information and encapsulation, and finally form a packet containing private network data that can be forwarded on the public network, and then forwarded to the designated VPN tunnel peer through the public network.
- the peer end of the VPN tunnel performs corresponding lookup and decapsulation according to the protocol.
- the VPN site is distinguished by packet classification. Different packets are classified into corresponding VPNs by using different classifications, so that the network parameters, user division modes, and applications can be provided.
- VPN A and VPN B have two sites respectively.
- To determine the internal network range of each VPN site that is, the network range of the VPN internal device and/or the host, various parameters of the network packet and the corresponding relationship between the combination and the VPN site are established on the VPN device.
- QoS Quality of Service
- QoS Quality of Service
- the network packet parameters include parameters of all physical layer packets, data link layer packets, network packets, transport layer packets, and high-level packets.
- the common parameters include Ethernet triplets and IP addresses. Five-tuple, QoS marking (CoS, TOS/DSCP, MPLS EXP), IP version type (IPv4/IPv6), and various protocols identified in various network packet parameters.
- the management plane establishes the packet information table by using various static configuration modes such as CLI/WEB/network management, or multiple dynamic configuration modes such as AAA/policy, to establish various parameters of the network packet and the corresponding relationship between the combination and each VPN site. (including various network parameters and their combined rules.
- the network packet parameters include all physical layer packets, Layer 2 packets, Layer 3 packets, Layer 4 packets, and high-level messages.
- the parameters included in the network include Ethernet triplet, IP quintuple, QoS marking (CoS, TOS/DSCP, MPLS EXP), IP version type (IPv4/IPv6), and various network message parameters.
- Various protocols, combination rules are ones that use one or more free combinations according to the VPN establishment requirements, VP and table settings.
- a VPN site may be divided according to one or a certain number of packet parameters, or a VPN site may be classified according to a combination of one or a certain rule.
- the same user host can use multiple packets at the same time. Each packet may correspond to a different VPN site.
- the user host can still be logically divided into multiple logical hosts according to rules. Different logical hosts can be considered to be divided into different VPN sites. All VPN internal members use the configured corresponding VPN mechanism, such as a corresponding tunnel and session. Host for VPN sites The user can use the corresponding VPN function.
- the DSCP of the QoS tag is 6 packets corresponding to the L2TP Group1, and all users with the DSCP of 6 in the QoS tag are classified into a VPN site (generally having an internal index or name, Or VPN ID), and the VPN site and L2TP Groupl (corresponding to various configurations of L2TP, including but not limited to LNS address, tunnel key, number of sessions, encapsulation format, QoS mechanism, load balancing mechanism, etc.)
- the control plane and the forwarding plane can identify and process user host information, VPN sites, and VPNs.
- IP quintuple QoS marking (CoS, T0S/DSCP, MPLS EXP), IP version type (IPv4/IPv6), and various protocols identified in various network parameters
- QoS marking CoS, T0S/DSCP, MPLS EXP
- IP version type IPv4/IPv6
- Multiple packets can be divided, such as the source MAC address of the Ethernet triplet, the destination MAC address, the protocol, and the source IP address of the IP quintuple, the source protocol port, the destination IP address, the destination protocol port, and the protocol type.
- QoS marking CoS, T0S/DSCP, MPLS EXP
- IP version type IP version type
- various network packet parameters are classified by the packet analysis, that is, traffic classification.
- the control plane needs to maintain internal routes, labels, and forwarding tables of the VPN site; maintain VPN site tunnels and session tables; maintain public network routes, labels, and forwarding tables.
- the VPN module establishes a corresponding channel according to the VPN information (or may be manually established through the management plane), and provides corresponding routing, labeling, forwarding, and encapsulation information according to a public network protocol, such as a routing protocol or a label protocol.
- a public network protocol such as a routing protocol or a label protocol.
- the forwarding plane uses the standard VPN forwarding process. After receiving the user data packet, it determines the private network data packet according to the packet information table. It searches and encapsulates the packet according to the private network session, and finds the corresponding VPN information and encapsulation. Public network routing, forwarding, encapsulation information, and encapsulation, ultimately A packet containing the private network data that can be forwarded on the public network is formed, and then forwarded to the designated VPNP channel peer through the public network. The VPNP tunnel peer performs corresponding lookup and decapsulation according to the protocol.
- the VPN device After receiving the VPN packet from the public network, the VPN device determines the VPN and the corresponding user parameters based on the correspondence between the packet and the VPN site, that is, finds the corresponding tunnel, session, or identifier through the VPN parameters in the packet. Then, the corresponding VPN operation parameters and the VPN site information are obtained through the corresponding association relationship. At this time, the corresponding user parameters are obtained according to the VPN operation parameters, the VPN packets are decapsulated to obtain the private network data, and then sent to the corresponding VPN site. Private network data.
- FIG. 7 is a schematic diagram of a service-based VPN division networking in the present invention:
- the service distinguishes the VPN site and establishes the correspondence between different services and VPN sites, so that it can provide the division method and application independent of network parameters, users, and messages.
- the management plane establishes the correspondence between the service and the VPN site through various static configuration modes such as CLI/WEB/network management or multiple dynamic configuration modes such as AAA/policy.
- the division of services includes data, video, voice, specifying services in a session, and session information. Generally, it is necessary to track the service call and establishment process, and then divide the VPN according to the established service information, or specify a session by manual configuration. Or the data stream subdivided in a session is a certain service to divide the VPN. At this time, the service type is judged according to the information monitored during the service establishment process, for example, tracking H. 323/H.
- VPN site may be classified according to one or several services. Since many businesses contain one or more protocols, the same department Service packets do not have fixed packet rules. Therefore, using services to divide VPNs is more conducive to meeting the needs of different services.
- the forwarding plane uses the standard VPN forwarding process to receive user data packets and determine the private network data packets according to the service information table (including data, video, voice, and service specified in a session).
- Table and encapsulation find the corresponding VPN information and encapsulation, find the corresponding public network routing, forwarding, encapsulation information, and encapsulation, and finally form a packet containing private network data that can be forwarded on the public network, and then forwarded to the designated network through the public network.
- the peer end of the VPN tunnel, the peer end of the VPN tunnel performs corresponding lookup and decapsulation according to the protocol.
- the VPN device After receiving the VPN packet from the public network, the VPN device determines the VPN and the corresponding user parameters based on the correspondence between the packet and the VPN site, decapsulates the VPN packet, and obtains the private network data.
- the VPN site sends private network data.
- the present invention also provides a combination of VPNs based on multiple ways, and the implementation process thereof is as shown in FIG. 9:
- the management plane adopts multiple static configuration modes such as CLI/WEB/network management or multiple dynamic configuration modes such as AAA/policy. According to multiple modes of devices, interfaces, networks, users, messages, and services. Establish a correspondence with the VPN site, and form information such as various information tables, VPs, and tables. In a specific configuration, VPN sites can be divided into different users, different services, and different applications according to one or several methods.
- a VPN can be divided by a dedicated line interface for a certain customer, a VPN is divided according to a subnet or a network segment for a part of a subnet, a VPN is divided according to a service for a cell access user, and a VPN is classified according to a packet for a specific user/network according to a packet parameter.
- a packet parameter for a user, one or more of a plurality of ways based on a device, an interface, a network, a user, a message, a service, and the like are divided into VPNs.
- the control plane establishes private network routes, session information, and the like through a private network protocol, such as a routing protocol (dynamic routing protocol or statically configured routing protocol), a Layer 2 session-related protocol, a label protocol, etc.
- the network protocol provides service tracking and analysis functions to identify the services included in the session. Of course, you can also statically configure or dynamically specify what services are used in a session. Then, the corresponding information is used to determine whether the VPN is the VPN and the corresponding VPN information.
- the VPN module establishes a corresponding tunnel according to the VPN information (which can also be manually established through the management plane), and provides corresponding information according to public network protocols, such as routing protocols and label protocols. Routing, labeling, forwarding, and encapsulation information.
- the forwarding plane uses the standard VPN forwarding process, receives the user data packet, determines the private network data packet according to the corresponding information table, performs table lookup and encapsulation according to the private network session, finds the corresponding VPN information and encapsulation, and searches for the corresponding
- the public network routes, forwarding, encapsulation information, and encapsulation, and finally form a packet containing the private network data that can be forwarded on the public network, and then forwarded to the designated VPN tunnel peer through the public network.
- the VPN tunnel peer corresponds to the protocol. Check and unpack and so on.
- the VPN device After receiving the VPN packet from the public network, the VPN device determines the VPN and the corresponding user parameters based on the correspondence between the packet and the VPN site, decapsulates the VPN packet, and obtains the private network data.
- the VPN site sends private network data.
- VPNs There are two ways to combine VPNs in different ways. Generally, there are two ways to combine the various network parameters and operational parameters according to priorities or policy expressions to make a reasonable distinction and application of VPN.
- the VPNs are differentiated and forwarded in the manner specified in the mode group according to the order of priority.
- the priority itself is not limited, and multiple priorities can be used, including but not limited to level 5, level 10, level 100, level 255, and so on.
- configuration mode group # 1 or name is "mode group ⁇ : priority 5 based on business parameters.
- the mode group is applied to the port connecting the large client with VPN access.
- the priority of the configuration according to the mode group is from high to low, and a reasonable division is performed. If a certain method is hit, the method is used.
- the policy rules are in the form of: including network parameters, user parameters, message parameters, service parameters, and relational operations (including but not limited to and/or, or, no, belonging, not belonging, equal to, not equal to), fuzzy matching An expression that combines (any, a wildcard * representing an arbitrary value, a wildcard that represents a single value, and a regular expression).
- a certain type of user uses a VPN to the ISP, and all HTTP packets are sent to a VPN for content filtering, and incoming from port 5. All use one VPN, others are divided according to network parameters.
- the policy group and the mode and the priority mode can also be used at the same time.
- the policy group priority or mode group priority is used to coexist.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
La présente invention a trait à un procédé de réalisation de réseau privé virtuel comprenant les étapes suivantes: l'établissement de paramètres de fonctionnement de réseau virtuel privé, les paramètres de fonctionnement comprenant les paramètres d'utilisateur et/ou les paramètres de message et/ou les paramètres de service, et établissement une relation correspondante entre les paramètres de fonctionnement et les sites de réseau privé virtuel; lorsqu'un équipement de réseau privé virtuel reçoit les données de réseau privé à partir de sites de réseau privé virtuel, l'équipement de réseau privé virtuel détermine le réseau privé virtuel auquel appartiennent les données selon la relation de correspondance entre les paramètres de fonctionnement et les sites de réseau privé virtuel, et enregistre les données selon les paramètres de réseau privé virtuel, et transmet les données selon les paramètres du réseau privé virtuel. Lors de la réception du message de réseau privé virtuel en provenance du réseau public, l'équipement de réseau privé virtuel détermine le réseau privé virtuel auquel le message appartient et les paramètres d'utilisateur selon la relation entre les paramètres de fonctionnement et les sites de réseau privé virtuel, et transmet les données de réseau privé au sites de réseau privé virtuel auxquels le message appartient. Grâce à la présente invention, le réseau privé virtuel peut fournir divers services sans affecter la planification du réseau, et offre une meilleure satisfaction de besoins de tout type de services et d'applications.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNB2005100642589A CN100518138C (zh) | 2005-04-12 | 2005-04-12 | 实现虚拟专用网的方法 |
| CN200510064258.9 | 2005-04-12 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006108344A1 true WO2006108344A1 (fr) | 2006-10-19 |
Family
ID=37078168
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2006/000572 Ceased WO2006108344A1 (fr) | 2005-04-12 | 2006-03-31 | Procede de realisation de reseau prive virtuel |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN100518138C (fr) |
| WO (1) | WO2006108344A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114884876A (zh) * | 2022-04-14 | 2022-08-09 | 烽火通信科技股份有限公司 | 跨网络平面通信方法、设备及可读存储介质 |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101917228B (zh) * | 2010-07-30 | 2014-04-30 | 武汉烽火网络有限责任公司 | 集团用户有线专网的实现方法 |
| CN103634171A (zh) * | 2012-08-24 | 2014-03-12 | 中兴通讯股份有限公司 | 一种动态配置方法及装置、系统 |
| CN103685310B (zh) * | 2013-12-27 | 2017-01-04 | 恒为科技(上海)股份有限公司 | 一种用于虚拟专用拨号网中动态数据注入的装置及其方法 |
| CN103905285A (zh) * | 2014-04-06 | 2014-07-02 | 陈桂芳 | 一种实现同一mac地址用户划分到多个不同vlan的方法 |
| CN105636151B (zh) * | 2015-06-29 | 2017-08-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种网络连接方法及电子设备 |
| CN111327531B (zh) * | 2018-12-17 | 2022-08-02 | 中兴通讯股份有限公司 | 基于vdc的路由配置方法、装置、设备及可读存储介质 |
| CN112887158B (zh) * | 2021-03-19 | 2022-02-08 | 中国电子科技集团公司第三十研究所 | 一种基于域模式的设备通信规则配置方法 |
| CN116781428B (zh) * | 2023-08-24 | 2023-11-07 | 湖南马栏山视频先进技术研究院有限公司 | 一种基于虚拟专用网络vpn流量的转发系统 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1356806A (zh) * | 2001-12-31 | 2002-07-03 | 刘军民 | 实现局域网虚通道传送的数据转发方法 |
| WO2002099571A2 (fr) * | 2001-06-01 | 2002-12-12 | Fujitsu Network Communications Inc. | Systeme et procede de mise en place de regles d'acheminement dans une topologie limitee |
| CN1516401A (zh) * | 2003-01-06 | 2004-07-28 | 华为技术有限公司 | 基于虚拟局域网的实现多角色主机的方法 |
-
2005
- 2005-04-12 CN CNB2005100642589A patent/CN100518138C/zh not_active Expired - Fee Related
-
2006
- 2006-03-31 WO PCT/CN2006/000572 patent/WO2006108344A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2002099571A2 (fr) * | 2001-06-01 | 2002-12-12 | Fujitsu Network Communications Inc. | Systeme et procede de mise en place de regles d'acheminement dans une topologie limitee |
| CN1356806A (zh) * | 2001-12-31 | 2002-07-03 | 刘军民 | 实现局域网虚通道传送的数据转发方法 |
| CN1516401A (zh) * | 2003-01-06 | 2004-07-28 | 华为技术有限公司 | 基于虚拟局域网的实现多角色主机的方法 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114884876A (zh) * | 2022-04-14 | 2022-08-09 | 烽火通信科技股份有限公司 | 跨网络平面通信方法、设备及可读存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1848799A (zh) | 2006-10-18 |
| CN100518138C (zh) | 2009-07-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7650637B2 (en) | System for ensuring quality of service in a virtual private network and method thereof | |
| EP3706374B1 (fr) | Fonctionnalité point à multipoint dans un réseau en dérivation | |
| CN100508480C (zh) | 一种涉及以太网接入系统的设备和方法 | |
| CN110635935A (zh) | 为用户接口的相应服务接口使用多个evpn路由 | |
| JP2004529546A (ja) | 仮想私設網(vpn)承知顧客構内装置(cpe)エッジルータ | |
| KR101458779B1 (ko) | 콘텐트 기반 브리징을 지원하기 위한 이더넷 네트워크에 대한 콘텐트 기반 vlan 분류 및 프레임워크 | |
| CN102201990B (zh) | 一种用于自治网络的业务控制方法及系统 | |
| EP1875668B1 (fr) | Système et procédé échelonnables pour un trafic d'abonné dsl sur un réseau ethernet | |
| CN101816168A (zh) | Vrrp和学习网桥cpe | |
| WO2007124679A1 (fr) | Procédé et système de communication en réseau | |
| CN100518138C (zh) | 实现虚拟专用网的方法 | |
| EP1646188B1 (fr) | Procede d'isolation securise de services de reseau ethernet | |
| KR20060059877A (ko) | 이더넷 접근 시스템에 관한 장치 및 방법 | |
| CN100373892C (zh) | 一种可路由的虚交换方法 | |
| CN112737951B (zh) | 一种公私网混合场景下端到端sr控制方法、系统和可读存储介质 | |
| JP2004528756A (ja) | サービス拒否攻撃に耐えるために、仮想私設網(vpn)およびベストエフォートトラフィックを隔離するシステム、方法および装置 | |
| KR100462853B1 (ko) | 가상사설망 서비스 및 가입자 구분이 가능한레이블에지라우터의 라인 프로세서에서의 데이터 처리방법 | |
| JP2004533149A (ja) | IPQoSのサービス拒否攻撃に耐えるための仮想私設網を採用するシステム、方法および装置 | |
| RU2319313C2 (ru) | Способ реализации защитного изолирования сервисов сети ethernet | |
| CN101087299A (zh) | 业务流分类处理方法及其设备 | |
| Held | Quality of service in a Cisco networking environment | |
| KR20120071112A (ko) | 이종 망 간의 단대단 큐오에스 제공 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
| NENP | Non-entry into the national phase |
Ref country code: RU |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 06722224 Country of ref document: EP Kind code of ref document: A1 |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 6722224 Country of ref document: EP |