List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
ds-srv440012.2Data basesBuilt-inAs neededDS-SRV is a directory service protocol that manages secure access to metadata or schema repositories.
ds-srvr440112.2Application serversBuilt-inAs neededDS-Srvr is the directory server protocol for LDAP or Active Directory infrastructure.
ds-clnt440212.2Application serversBuilt-inAs neededDS-Clnt is the client-side protocol for directory service lookups and secure authentication.
ds-user440312.2Network servicesBuilt-inAs neededA protocol for Distributed System User, managing user interactions in distributed systems.
ds-admin440412.2Application serversBuilt-inAs neededDS-Admin is used to securely manage directory services in LDAP-based identity systems.
ds-mail440512.2Network servicesBuilt-inAs neededA protocol for Distributed System Mail, managing mail in distributed systems.
ds-slp440612.2Tunneling, secure, ssl, pkiBuilt-inAs neededDS-SLP is a secure variant of Service Location Protocol used in directory-enabled networks.
nacagent440712.2Network servicesBuilt-inAs neededNAC agent reporting health and posture data for network access control.
slscc440812.2Network servicesBuilt-inAs neededSLS Command and Control protocol used in smart lighting or sensor systems.
netcabinet-com440912.2Video, picturesBuilt-inAs neededNetCabinet-Com is a secure document and video distribution system for corporate intranet streaming.
itwo-server441012.2Network servicesBuilt-inAs neededA protocol for ITwo Server, serving data in ITwo networked systems.
found441112.2Network servicesBuilt-inAs neededA protocol tied to device discovery or network management, though specifics are limited; it may relate to the Foundstone security tools ecosystem.
netrockey6442512.2Network servicesBuilt-inAs neededNetRockey6 is a license key and authentication protocol for protected applications.
beacon-port-2442612.2Application serversBuilt-inAs neededBeacon-Port-2 is used in secure telemetry and beacon tracking for asset location or broadcasting.
drizzle442712.2Tunneling, secure, ssl, pkiBuilt-inAs neededDrizzle protocol is associated with the Drizzle database, supporting secure, lightweight client-server communication.
omviserver442812.2Instant messengersBuilt-inAs neededOMVIServer handles secure video analytics and messaging in video management infrastructure.
omviagent442912.2Application serversBuilt-inAs neededOMVIAGENT is used in HP OpenView for securely collecting infrastructure performance data.
rsqlserver443012.2Application serversBuilt-inAs neededRSQLServer is a remote SQL access protocol used to securely query distributed databases.
wspipe443112.2Application serversBuilt-inAs neededWSPipe protocol enables encrypted data transmission over websocket-like structures.
l-acoustics443212.2Application serversBuilt-inAs neededL-Acoustics protocol is used in professional sound systems for secure device control.

Was this information helpful?