List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
strexec-d502612.2Application serversBuilt-inAs neededStrExec-D delivers encrypted stream responses in grid computing environments.
strexec-s502712.2Application serversBuilt-inAs neededStrExec-S is a secure stream execution protocol for distributed services.
qvr502812.2Network servicesBuilt-inAs neededQVR (Quick Video Relay) protocol used in secure CCTV or remote surveillance streaming.
infobright502912.2Data basesBuilt-inAs neededInfobright protocol manages secure data loading and analytics in columnar databases.
surfpass503012.2Tunneling, secure, ssl, pkiBuilt-inAs neededSurfPass is a secure web proxy protocol used for filtering, authentication, and encrypted web traffic management.
dmp503112.2Instant messengersBuilt-inAs neededDMP (Distributed Management Protocol) is used for configuration and monitoring of smart environments.
signacert-agent503212.2Tunneling, secure, ssl, pkiBuilt-inAs neededSignaCert Agent is used in integrity verification systems to securely validate software and system baselines.
swxadmin504312.2Transactions, banking, tradingBuilt-inAs neededSWXAdmin manages administration for Swiss Exchange protocols in electronic securities trading.
lxi-evntsvc504412.2Instant messengersBuilt-inAs neededLXI-EvntSvc is used for secure device event broadcasting in test equipment environments.
osp504512.2Data transferBuilt-inAs neededOSP (Open Settlement Protocol) is used for secure authentication and routing in VoIP billing.
vpm-udp504612.2Network servicesBuilt-inAs neededVirtual Port Mapper protocol used in UDP-based tunneling systems.
iscape504712.2Data transferBuilt-inAs needediScape protocol is used for encrypted communication in infrastructure visualization platforms.
texai504812.2Instant messengersBuilt-inAs neededTexAI protocol supports AI-driven collaboration and telemetry exchange in secure sandboxed environments.
ivocalize504912.2Voice over IPBuilt-inAs neededVoIP service for online meetings and conferences.
mmcc505012.2RTPBuilt-inAs neededMultimedia Conference Control, used for RTP-based video conferencing.
ita-agent505112.2Transactions, banking, tradingBuilt-inAs neededITA-Agent is the operational interface for executing trades within intelligent financial agent systems.
ita-manager505212.2Transactions, banking, tradingBuilt-inAs neededITA-Manager coordinates intelligent trading agents in algorithmic trading environments.
rlm505312.2Application serversBuilt-inAs neededRLM is the Reprise License Manager protocol used to authorize software access across networks.
rlm-disc505312.2Application serversBuilt-inAs neededRLM-Disc is a license discovery protocol for Reprise License Manager in LAN environments.
rlm-admin505412.2Application serversBuilt-inAs neededRLM-Admin provides administrative access to license status and control in Reprise License Manager.