List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| sshell | 614 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | SShell is a secure shell alternative or wrapper used in constrained environments or embedded devices. |
| cryptoadmin | 624 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CryptoAdmin is a management protocol used for secure configuration of cryptographic services and key stores. |
| ldaps | 636 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | LDAPS is the secure version of the Lightweight Directory Access Protocol, running over TLS. |
| mcns-sec | 638 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | This protocol is used for secure tunneling or encrypted communication over networks. It typically supports SSL/TLS, PKI-based authentication, or VPN-like capabilities to ensure confidentiality, integrity, and secure session transport. |
| tinc | 655 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Tinc is an open-source VPN daemon that uses tunneling and encryption to create secure private networks over the internet. |
| avocent-proxy | 1078 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Avocent Proxy is used in remote KVM and infrastructure management systems for encrypted out-of-band access. |
| qsm-proxy | 1164 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | QSM-Proxy is a secure tunneling service used for data replication and snapshot management across distributed systems. |
| pkt-krb-ipsec | 1293 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | PKT-KRB-IPSec combines Kerberos and IPsec to create a secure authentication and encryption tunneling mechanism. |
| dproxy | 1296 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | DProxy is a lightweight dynamic proxy protocol for securely forwarding application traffic through controlled network paths. |
| sdproxy | 1297 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | SDProxy is a service discovery proxy used in microservices and containerized environments for routing and registration. |
| krb5gatekeeper | 1318 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Krb5Gatekeeper is a secure gateway enforcing Kerberos-based authentication for access control. |
| esbroker | 1342 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | ESBroker is a broker protocol used in enterprise service bus or analytics systems to securely route encrypted events. |
| hybrid | 1424 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Hybrid is a tunneling protocol used for combining encrypted and non-encrypted traffic flows in edge networks. |
| funkproxy | 1505 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | FunkProxy is associated with Funk Software and provides secure tunneling for remote authentication and RADIUS services. |
| dpi-proxy | 1795 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | DPI-Proxy supports encrypted proxying and traffic inspection in Deep Packet Inspection systems. |
| bluectrlproxy | 2277 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | BlueCtrlProxy is a secure proxy service used in remote Bluetooth device control and tunneling. |
| proxy-gateway | 2303 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Proxy-Gateway is a generic label for an encrypted middle-layer used to securely route internal service requests. |
| ace-proxy | 2335 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | ACE-Proxy supports Application Control Engines in securely forwarding application-layer traffic. |
| plgproxy | 2790 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | PLGProxy is a plugin-based proxy tunneling service used to extend secure routing functions in modular networks. |
| csvr-proxy | 3190 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CSVR-Proxy handles plain-text or internal proxying of custom service routing in controlled networks. |
Was this information helpful?