WO2007006193A1 - Procédé permettant d’empêcher l’utilisateur d’obtenir les informations sur le réseau du fournisseur de service et équipement et service de celui-ci - Google Patents

Procédé permettant d’empêcher l’utilisateur d’obtenir les informations sur le réseau du fournisseur de service et équipement et service de celui-ci Download PDF

Info

Publication number
WO2007006193A1
WO2007006193A1 PCT/CN2006/000935 CN2006000935W WO2007006193A1 WO 2007006193 A1 WO2007006193 A1 WO 2007006193A1 CN 2006000935 W CN2006000935 W CN 2006000935W WO 2007006193 A1 WO2007006193 A1 WO 2007006193A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
user
packet
icmp
router
Prior art date
Application number
PCT/CN2006/000935
Other languages
English (en)
Chinese (zh)
Inventor
Fuyou Miao
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Publication of WO2007006193A1 publication Critical patent/WO2007006193A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Definitions

  • the present invention relates to the field of communications, and in particular, to a method, apparatus, and system for preventing a user from obtaining operator network information.
  • the IP protocol is the core part of the Internet Protocol series. It shields the underlying physical network with a unified routing mechanism, thus enabling wide-area interconnection of heterogeneous networks.
  • the IP protocol version currently used on the Internet is the IPv4 protocol.
  • the IP protocol has a strong ability to deliver messages, the IP protocol is not responsible for packet loss, duplication, delay, and out-of-order. Therefore, the IP protocol does not guarantee that packets can be delivered to the destination. Therefore, in order to improve the probability of successful IP packet delivery and accurately reflect the delivery of the message, the Internet Engineering Department (IETF) designed the Internet Control Message Protocol (ICMP).
  • IETF Internet Engineering Department
  • ICMP Internet Control Message Protocol
  • the Internet consists of a host that sends and receives messages and a router that relays messages.
  • ICMP is mainly used to transmit control and error reporting messages between network devices and nodes. That is, the purpose of the ICMP is to inform the source host of the problem in the network environment. The router feeds back the result of the message transmission back to the source host to achieve its purpose.
  • the ICMP user is mainly a router, and the receiver is the source of the IP packet.
  • the transmission process of the ICMP packet is as follows:
  • the related entity usually the upper layer entity, forms an ICMP packet.
  • the router fills in the ICMP message with the message type, the message code, the message checksum, and the data part of the message according to the determined fault type.
  • the router intercepts the IP address of the source sending host from the failed IP packet, and forms a new IP packet carrying the ICMP packet.
  • the router uses the channel to forward the IP packet to the source host through a certain route
  • the source host After receiving the IP packet carrying the ICMP packet, the source host extracts the ICMP packet, reads the field value of the ICMP packet, and determines the fault type of the faulty IP packet. The cause of the failure.
  • the IP packet carrying the ICMP packet does not have any priority in the process of the feedback transmission. It is forwarded in the same way as the normal IP packet. The only difference is that if the IP packet carrying the ICMP packet fails during the transmission, the packet is forwarded. The router of the IP packet will no longer generate any new error packets.
  • ICMP packets can be classified into two types of packets, namely, ICMP error reporting packets and ICMP information packets.
  • Destination host unreachable packet When the router or host fails to deliver packets to the destination host, it sends the destination host unreachable packet to the source host.
  • the source host suppresses the packet: When the router or the host discards the packet due to congestion, it sends the source host suppression packet to the source host, so that the source host knows that the packet transmission rate should be slowed down.
  • Timeout packet When the router receives a packet with a lifetime of zero, it sends a timeout packet to the source host in addition to discarding the packet. When the destination host cannot receive the entire contents of a packet within a predetermined period of time, it discards the received packet content and sends the excess packet to the source host.
  • Parameter problem message When the router or destination host finds that the value of the field in the header of the received packet is incorrect, it discards the packet and sends a parameter problem message to the source host.
  • the ICMP error report message is no longer sent to the ICMP error report message.
  • the ICMP error report message is not sent to all subsequent fragments of the first fragmented packet.
  • Echo Request and Echo Reply After the originating host or router sends a loopback request message to a specific destination host, the machine that receives the packet must send the host or router to the source. Return to the reply message.
  • Timestamp request and reply message This message is mainly used to ask a host or router to reply to the current date and time.
  • Mask address request message This message is mainly used to obtain the address mask of an interface from the subnet mask server.
  • Router inquiry and advertisement message This message is mainly used to understand whether the router connected to the network works normally.
  • the host broadcasts the router query message.
  • One or more routers that receive the inquiry message broadcast their routing information using a router advertisement message.
  • the network transmission path of the IP packet can be obtained by combining the functions of the two types of packets: the message request and the response message (information message) and the timeout message (error message).
  • ICMP traceroute There are two types of traceroute currently in use: ICMP traceroute and UDP traceroute based on User Datagram Protocol (UDP). Some software companies use ICMP traceroute, so traceRT issued on some operating systems uses ICMP traceroute, and other operating systems, such as Unix and some companies' routers, use UDP traceroute.
  • UDP traceroute User Datagram Protocol
  • TraceRoute determines the next operation based on the value of the packet lifetime (TTL, Time to Live):
  • the packet is discarded and an ICMP time-out message is sent to the source node.
  • the TTL of the received packet is not equal to 0, the TTL is decremented by 1 and the packet is forwarded to the upper layer for processing.
  • TraceRoute sets the value of TTL to be small, and deliberately causes the node on the path to return an ICMP timeout packet to obtain path information.
  • the ICMP traceroute works as follows:
  • ICMP traceroute uses ICMP Echo Request messages, ICMP Echo Reply messages, and ICMP TTL-expired messages.
  • the source host sends an ICMP Echo Request message.
  • the TTL of the first request packet is 1, and the TTL of the second request packet is 2, and then increments until the TTL is 30.
  • the intermediate router sends back ICMP TTL-expired ( ICMP type 11) packets to notify the source.
  • the host and the packet are dropped due to the TTL timeout. Therefore, the source host knows each router that passes through the packet, and the last destination host sends an ICMP Echo Reply packet.
  • the UDP traceroute works as follows:
  • UDP traceroute uses ICMP TTL-expired (type 11) packets, ICMP port uni-eachable (type 3, code 3) and UDP port >32768.
  • the source host sends a UDP packet, and the source port uses any random port# greater than 32768.
  • the intermediate router sends back ICMP TTL-expired packets, so that the originating host knows each router in the middle, and the last destination host sends back TTL-expired packets and ICMP port unreachable packets (because there is no application on any host).
  • the user can use ICMP traceroute and UDP traceroute to obtain node information and path information in the network, and can obtain multiple path information by changing the destination address of the packet.
  • the combination of information can produce a network topology.
  • the user cares about the quality of service.
  • the user does not have to care about which nodes to complete the transmission of the message.
  • the user obtains the path information and does not help to improve the user's satisfaction.
  • bad attackers can use the path information to attack the network. Therefore, users should be restricted from obtaining network path information.
  • a security defense method for the ICMP TraceRoute in the prior art is: limiting the router to return system information by changing the packet processing rules of the router.
  • the packet processing rules changed by this method are mainly as follows:
  • a security defense method for UDP TraceRoute in the prior art is to limit the router to return system information by changing the packet processing rules of the router.
  • the packet processing rules changed by this method are mainly as follows:
  • TTL timeout packet is blocked, so that the source host does not see the intermediate router.
  • an object of the present invention is to provide a method, apparatus, and system for preventing a user from obtaining operator network information, which can enable the operator network not to return the path information to the user, and can ensure that The TraceRoute feature can still be successfully used in the carrier network.
  • a method for preventing a user from obtaining operator network information including:
  • the edge router filters the received ICMP time-out packet of the Internet Control Message Protocol sent from the carrier network to the user network.
  • the filtering process in step B specifically includes:
  • the edge router discards the received ICMP time-out message sent from the carrier network to the user network.
  • the filtering process in step B specifically includes:
  • the edge router modifies the source address of the received ICMP timeout packet sent from the carrier network to the user network, and then forwards the packet normally.
  • the modifying the source address specifically includes:
  • the edge router modifies the source address of the received ICMP time-out message from the carrier network to the user network to its own address, and then forwards the packet normally.
  • the specific change of the source address includes:
  • the edge router modifies the source address of the received ICMP time-out message sent from the carrier network to the user network to a pre-designated address, and then forwards the packet normally.
  • the edge router after receiving the ICMP timeout message sent from the carrier network to the user network, the edge router further includes:
  • the edge router determines whether the source node of the ICMP timeout packet is from the operator network or the user network according to the attribute of the IP packet body carrying the ICMP timeout message, and if it is from the carrier network, performing the filtering operation, if From the user network, the received ICMP timeout packet is forwarded to the destination user network.
  • the attribute of the IP packet body includes an IP packet lifetime TTL or a hop limit Hop Limit.
  • the method is applicable to an IPv4 or IPv6 network.
  • An apparatus for preventing a user from obtaining information of an operator network the apparatus being implemented by a router, the router comprising:
  • Packet filtering module Used to filter the ICMP timeouts sent from the carrier network to the user network through the router.
  • the packet filtering module includes:
  • the packet discarding module is configured to discard the ICMP timeout packet sent from the carrier network to the user network.
  • the packet address modification module is used to modify the address of the ICMP timeout packet sent from the carrier network to the user network.
  • the router further includes:
  • the message source judging module is configured to determine whether the ICMP timeout message sent from the carrier network to the user network is from the operator network or the user network, and if it is from the operator network, triggering the message filtering module to process, if from the user Network, triggers the existence of the router
  • the forwarding module in the normal forwarding process is performed.
  • a system for preventing a user from obtaining operator network information including a user network and a network including a router operator, the router comprising:
  • the packet filtering module is configured to filter and process ICMP timeout packets sent from the carrier network to the user network.
  • the packet filtering module includes:
  • the packet discarding module is configured to discard the ICMP Super B packets sent from the carrier network to the user network.
  • the packet address modification module is used to modify the address of the ICMP timeout packet sent from the carrier network to the user network.
  • the router further includes:
  • the message source judging module is configured to determine whether the ICMP timeout message sent from the carrier network to the user network is from the operator network or the user network, and if it is from the operator network, triggering the message filtering module to process, if from the user
  • the network triggers the existing forwarding module in the router to perform normal forwarding processing.
  • the present invention filters the ICMP timeout packets sent to the user network through the edge of the network.
  • the filtering operation includes discarding or modifying the packets. Therefore, the carrier network is prevented from returning the ICMP timeout message including the carrier network path information to the user, or the returned ICMP timeout message cannot be used to generate the carrier network path information, and the carrier network can still be ensured in the carrier network.
  • Successfully used path tracking programs such as TraceRoute.
  • the present invention increases the judgment of the source of the ICMP timeout message, the ICMP timeout message from the user network is still normally forwarded to the user network.
  • FIG. 1 is a flow chart showing a specific process of the method of the present invention
  • FIG. 2 is a schematic diagram of networking in the embodiment of the present invention.
  • FIG. 3 is a schematic view showing the structure of the apparatus of the present invention.
  • the present invention provides a method and apparatus for preventing a user from obtaining operator network information.
  • the core of the present invention is: determining an edge router between the operator network and the user network; when the ICMP timeout message is sent to the user network through the operator network edge router, the network edge router filters the ICMP timeout message.
  • An edge router located in the carrier network, is used to connect the user network with the carrier network.
  • FIG. 1 The specific processing flow of the method of the present invention is as shown in FIG. 1 and includes the following steps:
  • Step 1-1 The user equipment sends an ICMP Echo or UDP packet to the destination user through the service provider network, and generates an ICMP timeout packet.
  • the user equipment which may be a host or a network of multiple hosts, routers, and switches, sends ICMP Echo packets from the ICMP TraceRoute function to the destination user through the carrier network, or sends multiple UDP TraceRoute functions. UDP packets in the middle.
  • the router discards the received ICMP Echo packet or UDP packet, and generates an ICMP timeout packet according to the IP protocol.
  • the destination address of the ICMP timeout packet is set to the address of the source user equipment.
  • the source address is set to the address of the router itself.
  • Step 1-2 The intermediate router or edge router in the carrier network receives the ICMP timeout packet.
  • the ICMP timeout packet generated in the step 1-1 is sent to the source user equipment through the carrier network. Therefore, the intermediate router or the edge router in the carrier network will receive the ICMP timeout packet. If the intermediate router receives the ICMP timeout packet, perform steps 1-3; if the edge router receives the ICMP timeout packet, For example, perform steps 1-4.
  • Step 1-3 The intermediate router forwards ICMP timeout packets normally.
  • the intermediate router forwards the received ICMP timeout packet according to the normal packet forwarding rules, and does not perform special processing on the packet.
  • Step 1-4 The edge router determines whether the timeout packet is sent from the carrier network to the user network.
  • the edge router After receiving the ICMP timeout packet, the edge router needs to determine whether the ICMP timeout packet is sent from the carrier network to the user network. If yes, go to Step 1-6; otherwise, go to Steps 1-5.
  • Step 1-5 The edge router forwards ICMP timeout packets normally.
  • the edge router forwards the received ICMP timeout packet according to the normal packet forwarding rules, and does not perform special processing on the packet.
  • Step 1 -6 The edge router filters the ICMP timeout packets.
  • the user_IMM timeout message can be prevented from obtaining network connection information in the carrier network.
  • steps 1-6 of the method of the present invention also proposes an improved solution, which is specifically described as follows:
  • the edge router uses the attributes of the IP packet body that carries the ICMP timeout packet to determine whether the source node that generates the ICMP timeout packet is from the carrier network or the user network.
  • the TTL of the packet generated by the node in the carrier network and the TTL of the packet generated by the node in the user network are allocated different ranges. Therefore, the judgment can be implemented according to the TTL value of the packet. .
  • it is an Ipv6 network, it determines whether the source node of the ICMP timeout packet is from the carrier network or the user network according to the Hop Limit.
  • the edge router After determining the source of the ICMP timeout packet, the edge router does not allow the ICMP timeout packet from the carrier network to be forwarded from the carrier network to the user network.
  • the ICMP timeout packet is filtered according to the above description. ; for ICMP timeouts from the user network The message is still forwarded normally to the user network.
  • the above improvement scheme has certain significance for the virtual private network (VPN), because two user networks/sites/sites in different geographical locations belong to the same customer, so that users in the same VPN can track the same one. In other users' networks/sites/sites of the VPN, users will not get information about the carrier network.
  • VPN virtual private network
  • the present invention also provides an embodiment of the method of the present invention, the networking of which is illustrated in Figure 2.
  • the CPN is a user equipment, which may be a host or a network of multiple hosts, routers, or switches.
  • the CPN may belong to the same or different individual users, home users, and enterprises.
  • User or content provider Internet Data Center (IDC).
  • IDC Internet Data Center
  • the PE is a carrier edge router. It is located at the boundary between the user network and the carrier network.
  • the PE needs to have two main functions:
  • P is the core router of the carrier. Its main functions are as follows: According to the ICMP protocol, the packets are forwarded normally; ICMP timeout packets are generated.
  • a path tracking process initiated by the user is as follows:
  • Hostl obtains the hop count N of the destination node from the returned Echo Reply packet, that is, the number of forwarding nodes that need to pass in the middle.
  • Hostl in CPN1 sends multiple ICMP Echo or UDP packets.
  • the edge routers of the PE1, PE2, PE3, and PE4 will check the packet to determine whether the packet is sent from the carrier network to the user network. If yes, the router reports the packet. The text is filtered; otherwise, the message continues to be forwarded.
  • PE1 receives the ICMP timeout packet sent by P2 to Host1, the packet is filtered. If the packet receives the ICMP timeout packet from Host4 to Host1, the device continues to forward the packet. The message will then arrive at PE1.
  • PE1 filters the packet.
  • PE1 continues to forward the packet after receiving the ICMP timeout packet sent by Host4 to Host1.
  • the path tracking procedure initiated by the carrier network is not affected: as shown in FIG. 2 For example, if PE1 initiates path tracking to PE4, the ICMP timeout packets returned from P1 and P2 are not discarded. PE1 can still obtain the complete path to PE4.
  • FIG. 1 A schematic structural view of the device of the present invention is shown in FIG.
  • the device is implemented by a router and the following modules are added to the router:
  • the packet filtering module is configured to filter the ICMP timeout packets sent from the carrier network to the user network.
  • the above packet filtering module includes the following modules:
  • a packet discarding module is configured to discard ICMP timeout packets sent from the carrier network to the user network. and / or,
  • the packet address modification module is configured to modify the address of the ICMP timeout packet sent from the carrier network to the user network through the router, so that the ICMP timeout packet cannot reach the user network, or the user cannot be processed according to the The ICMP timeout packet obtains the path information of the carrier network.
  • the above router may further include:
  • a message source judging module configured to determine an ICMP sent from the carrier network to the user network If the timeout packet is from the carrier network or the user network, if it is from the carrier network, the packet filtering module is triggered to process. If it is from the user network, the forwarding module existing in the router is triggered to perform normal forwarding processing.
  • the present invention further provides a system for preventing a user from obtaining operator network information, including a user network and a network including a router operator, and the router includes:
  • the packet filtering module is configured to filter the ICMP timeout packets sent from the carrier network to the user network.
  • the above packet filtering module includes the following modules:
  • the packet discarding module is configured to discard the ICMP timeout packet sent from the carrier network to the user network.
  • the packet address modification module is used to modify the address of the ICMP timeout message sent from the carrier network to the user network through the router.
  • the above router may further include:
  • the message source judging module is configured to determine whether the ICMP timeout message sent from the carrier network to the user network is from the operator network or the user network, and if it is from the operator network, triggering the message filtering module to process, if from the user
  • the network triggers the existing forwarding module in the router to perform normal forwarding processing.
  • the method, apparatus and system of the present invention are applicable to both IPv4 networks and IPv6 networks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L’invention concerne un procédé empêchant l’utilisateur d’obtenir les informations sur le réseau du fournisseur de services, ainsi que l’équipement et le système de celui-ci, où ledit procédé comprend principalement les étapes de : détermination du routeur de bordure entre le réseau du fournisseur de service et le réseau de l’utilisateur ; réalisation par le routeur de bordure d’un traitement de filtration pour le message de prolongation temporelle du protocole ICMP (Internet Control Message Protocol) qui est envoyé à partir du réseau du fournisseur vers le réseau de l’utilisateur. L’utilisation de la présente invention pourrait éviter au fournisseur de service de renvoyer à l’utilisateur le message de prolongation temporelle ICMP comprenant les informations relatives au chemin du réseau du fournisseur de service. La présente invention assure également la possibilité d’utiliser avec succès un programme de suivi de chemin tel que TraceRoute dans le réseau du fournisseur de service. En outre, du fait que la présente invention ajoute la détermination de la source du message de prolongation temporelle ICMP, elle pourrait transmettre le message de prolongation temporelle ICMP qui est normalement envoyé du réseau de l’utilisateur au réseau de l’utilisateur.
PCT/CN2006/000935 2005-07-07 2006-05-10 Procédé permettant d’empêcher l’utilisateur d’obtenir les informations sur le réseau du fournisseur de service et équipement et service de celui-ci WO2007006193A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510082717.6 2005-07-07
CNB2005100827176A CN100502352C (zh) 2005-07-07 2005-07-07 防止用户获得运营商网络信息的方法和装置

Publications (1)

Publication Number Publication Date
WO2007006193A1 true WO2007006193A1 (fr) 2007-01-18

Family

ID=37597914

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/000935 WO2007006193A1 (fr) 2005-07-07 2006-05-10 Procédé permettant d’empêcher l’utilisateur d’obtenir les informations sur le réseau du fournisseur de service et équipement et service de celui-ci

Country Status (2)

Country Link
CN (1) CN100502352C (fr)
WO (1) WO2007006193A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448912A (zh) * 2019-08-27 2021-03-05 中兴通讯股份有限公司 一种防报文攻击方法、装置及存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025483B (zh) * 2009-09-17 2012-07-04 国基电子(上海)有限公司 无线路由器及利用该无线路由器预防恶意扫描的方法
CN101964723B (zh) * 2010-07-30 2012-03-28 中国联合网络通信集团有限公司 一种通信运营商网络信息交互管理方法及系统
CN103986652B (zh) * 2014-05-22 2017-12-08 新华三技术有限公司 一种路由跟踪方法和装置
CN105828218B (zh) * 2016-04-19 2019-06-11 华为技术有限公司 一种检测组播流传输质量的方法、装置及系统
CN115412488A (zh) * 2021-05-28 2022-11-29 中兴通讯股份有限公司 信息处理方法、网络设备、网络系统及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892753A (en) * 1996-12-02 1999-04-06 International Business Machines Corporation System and method for dynamically refining PMTU estimates in a multimedia datastream internet system
US6463061B1 (en) * 1997-12-23 2002-10-08 Cisco Technology, Inc. Shared communications network employing virtual-private-network identifiers
US20030236913A1 (en) * 2002-06-25 2003-12-25 Hoban Adrian C. Network address translation for internet control message protocol packets

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892753A (en) * 1996-12-02 1999-04-06 International Business Machines Corporation System and method for dynamically refining PMTU estimates in a multimedia datastream internet system
US6463061B1 (en) * 1997-12-23 2002-10-08 Cisco Technology, Inc. Shared communications network employing virtual-private-network identifiers
US20030236913A1 (en) * 2002-06-25 2003-12-25 Hoban Adrian C. Network address translation for internet control message protocol packets

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WANG B.-T. ET AL.: "An IP traceback mechanism for reflective DoS attacks", ELECTRICAL AND COMPUTER ENGINEERINGS, 2004. CANADIAN CONFERENCE, vol. 2, 2 May 2004 (2004-05-02) - 5 May 2004 (2004-05-05), pages 901 - 904, XP010733971 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448912A (zh) * 2019-08-27 2021-03-05 中兴通讯股份有限公司 一种防报文攻击方法、装置及存储介质
CN112448912B (zh) * 2019-08-27 2023-08-01 中兴通讯股份有限公司 一种防报文攻击方法、装置及存储介质

Also Published As

Publication number Publication date
CN100502352C (zh) 2009-06-17
CN1893392A (zh) 2007-01-10

Similar Documents

Publication Publication Date Title
US20100061253A1 (en) Tracing connection paths through transparent proxies
WO2007006193A1 (fr) Procédé permettant d’empêcher l’utilisateur d’obtenir les informations sur le réseau du fournisseur de service et équipement et service de celui-ci
Cisco Cisco IOS IP and IP Routing Command Reference Release 12.1
Cisco Network Protocols Command Reference Part 1 Cisco IOS Release 11.3 IP Addressing, IP Services, IP Routing Protocols
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECNet Commands
Cisco Network Protocols Command Reference, Part 1 Cisco IOS Release 12.0 IP Addressing, IP Services, IP Routing Protocols
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands
Cisco DECnet Commands

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06741828

Country of ref document: EP

Kind code of ref document: A1