This is an old revision of the document!
List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
Поиск:
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| unikeypro | 4127 | 12.2 | Data bases | Built-in | As needed | UniKeyPro protocol manages secure license checks and access validation in UniKey-protected DBs. |
| nufw | 4128 | 12.2 | Data bases | Built-in | As needed | NuFW protocol adds user authentication to Netfilter firewalls, securing DB-related sessions. |
| nuauth | 4129 | 12.2 | Data bases | Built-in | As needed | NuAuth is a secure user authentication system for firewalls and database access control. |
| fronet | 4130 | 12.2 | Network services | Built-in | As needed | A protocol for Fronet, potentially a front-end network service or communication layer. |
| stars | 4131 | 12.2 | Network services | Built-in | As needed | STARS (System for Tracking and Registration Services) handles distributed object updates. |
| nuts_dem | 4132 | 12.2 | Network services | Built-in | As needed | NUTS-DEM delivers secure distributed event messaging in testbed or emulation networks. |
| nuts_bootp | 4133 | 12.2 | Data transfer | Built-in | As needed | NUTS-BOOTP is a custom bootstrap protocol used in secure academic computing networks. |
| nifty-hmi | 4134 | 12.2 | Data transfer | Built-in | As needed | Nifty-HMI is a secure interface protocol for accessing human-machine interfaces in automation systems. |
| cl-db-attach | 4135 | 12.2 | Data transfer | Built-in | As needed | CL-DB-Attach handles encrypted attachment and syncing of client DB instances in clustering environments. |
| cl-db-request | 4136 | 12.2 | Network services | Built-in | As needed | A protocol for CL DB Request (Client Database Request), requesting database access. |
| cl-db-remote | 4137 | 12.2 | Network services | Built-in | As needed | A protocol for CL DB Remote (Client Database Remote), accessing remote databases. |
| nettest | 4138 | 12.2 | Network services | Built-in | As needed | NetTest supports traffic simulation and diagnostics for throughput and error rates. |
| thrtx | 4139 | 12.2 | Network services | Built-in | As needed | High-throughput data transmission protocol for large-scale telemetry bursts. |
| cedros_fds | 4140 | 12.2 | Network services | Built-in | As needed | A protocol for Cedros Fraud Detection Service, for financial transaction monitoring. |
| oirtgsvc | 4141 | 12.2 | Debugging and measurement | Built-in | As needed | OIRTGSvc delivers secure telemetry for real-time geolocation services. |
| oidocsvc | 4142 | 12.2 | Remote control | Built-in | As needed | Oracle Intelligent Document Service. |
| oidsr | 4143 | 12.2 | Application servers | Built-in | As needed | OIDSR is used in Oracle Internet Directory for secure data synchronization and replication. |
| vvr-control | 4145 | 12.2 | Network services | Built-in | As needed | Veritas Volume Replicator control protocol handles storage volume sync and commands. |
| tgcconnect | 4146 | 12.2 | Network services | Built-in | As needed | TGCConnect manages encrypted control for TGC industrial automation gateways. |
| vrxpservman | 4147 | 12.2 | Network services | Built-in | As needed | VRXProcessServiceManager handles process sync for virtual lab or simulation tools. |
Was this information helpful?