List of protocols [Документация VAS Experts]

This is an old revision of the document!


List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
unikeypro412712.2Data basesBuilt-inAs neededUniKeyPro protocol manages secure license checks and access validation in UniKey-protected DBs.
nufw412812.2Data basesBuilt-inAs neededNuFW protocol adds user authentication to Netfilter firewalls, securing DB-related sessions.
nuauth412912.2Data basesBuilt-inAs neededNuAuth is a secure user authentication system for firewalls and database access control.
fronet413012.2Network servicesBuilt-inAs neededA protocol for Fronet, potentially a front-end network service or communication layer.
stars413112.2Network servicesBuilt-inAs neededSTARS (System for Tracking and Registration Services) handles distributed object updates.
nuts_dem413212.2Network servicesBuilt-inAs neededNUTS-DEM delivers secure distributed event messaging in testbed or emulation networks.
nuts_bootp413312.2Data transferBuilt-inAs neededNUTS-BOOTP is a custom bootstrap protocol used in secure academic computing networks.
nifty-hmi413412.2Data transferBuilt-inAs neededNifty-HMI is a secure interface protocol for accessing human-machine interfaces in automation systems.
cl-db-attach413512.2Data transferBuilt-inAs neededCL-DB-Attach handles encrypted attachment and syncing of client DB instances in clustering environments.
cl-db-request413612.2Network servicesBuilt-inAs neededA protocol for CL DB Request (Client Database Request), requesting database access.
cl-db-remote413712.2Network servicesBuilt-inAs neededA protocol for CL DB Remote (Client Database Remote), accessing remote databases.
nettest413812.2Network servicesBuilt-inAs neededNetTest supports traffic simulation and diagnostics for throughput and error rates.
thrtx413912.2Network servicesBuilt-inAs neededHigh-throughput data transmission protocol for large-scale telemetry bursts.
cedros_fds414012.2Network servicesBuilt-inAs neededA protocol for Cedros Fraud Detection Service, for financial transaction monitoring.
oirtgsvc414112.2Debugging and measurementBuilt-inAs neededOIRTGSvc delivers secure telemetry for real-time geolocation services.
oidocsvc414212.2Remote controlBuilt-inAs neededOracle Intelligent Document Service.
oidsr414312.2Application serversBuilt-inAs neededOIDSR is used in Oracle Internet Directory for secure data synchronization and replication.
vvr-control414512.2Network servicesBuilt-inAs neededVeritas Volume Replicator control protocol handles storage volume sync and commands.
tgcconnect414612.2Network servicesBuilt-inAs neededTGCConnect manages encrypted control for TGC industrial automation gateways.
vrxpservman414712.2Network servicesBuilt-inAs neededVRXProcessServiceManager handles process sync for virtual lab or simulation tools.

Was this information helpful?