List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
sshell61412.2Tunneling, secure, ssl, pkiBuilt-inAs neededSShell is a secure shell alternative or wrapper used in constrained environments or embedded devices.
cryptoadmin62412.2Tunneling, secure, ssl, pkiBuilt-inAs neededCryptoAdmin is a management protocol used for secure configuration of cryptographic services and key stores.
ldaps63612.2Tunneling, secure, ssl, pkiBuilt-inAs neededLDAPS is the secure version of the Lightweight Directory Access Protocol, running over TLS.
mcns-sec63812.2Tunneling, secure, ssl, pkiBuilt-inAs neededThis protocol is used for secure tunneling or encrypted communication over networks. It typically supports SSL/TLS, PKI-based authentication, or VPN-like capabilities to ensure confidentiality, integrity, and secure session transport.
tinc65512.2Tunneling, secure, ssl, pkiBuilt-inAs neededTinc is an open-source VPN daemon that uses tunneling and encryption to create secure private networks over the internet.
avocent-proxy107812.2Tunneling, secure, ssl, pkiBuilt-inAs neededAvocent Proxy is used in remote KVM and infrastructure management systems for encrypted out-of-band access.
qsm-proxy116412.2Tunneling, secure, ssl, pkiBuilt-inAs neededQSM-Proxy is a secure tunneling service used for data replication and snapshot management across distributed systems.
pkt-krb-ipsec129312.2Tunneling, secure, ssl, pkiBuilt-inAs neededPKT-KRB-IPSec combines Kerberos and IPsec to create a secure authentication and encryption tunneling mechanism.
dproxy129612.2Tunneling, secure, ssl, pkiBuilt-inAs neededDProxy is a lightweight dynamic proxy protocol for securely forwarding application traffic through controlled network paths.
sdproxy129712.2Tunneling, secure, ssl, pkiBuilt-inAs neededSDProxy is a service discovery proxy used in microservices and containerized environments for routing and registration.
krb5gatekeeper131812.2Tunneling, secure, ssl, pkiBuilt-inAs neededKrb5Gatekeeper is a secure gateway enforcing Kerberos-based authentication for access control.
esbroker134212.2Tunneling, secure, ssl, pkiBuilt-inAs neededESBroker is a broker protocol used in enterprise service bus or analytics systems to securely route encrypted events.
hybrid142412.2Tunneling, secure, ssl, pkiBuilt-inAs neededHybrid is a tunneling protocol used for combining encrypted and non-encrypted traffic flows in edge networks.
funkproxy150512.2Tunneling, secure, ssl, pkiBuilt-inAs neededFunkProxy is associated with Funk Software and provides secure tunneling for remote authentication and RADIUS services.
dpi-proxy179512.2Tunneling, secure, ssl, pkiBuilt-inAs neededDPI-Proxy supports encrypted proxying and traffic inspection in Deep Packet Inspection systems.
bluectrlproxy227712.2Tunneling, secure, ssl, pkiBuilt-inAs neededBlueCtrlProxy is a secure proxy service used in remote Bluetooth device control and tunneling.
proxy-gateway230312.2Tunneling, secure, ssl, pkiBuilt-inAs neededProxy-Gateway is a generic label for an encrypted middle-layer used to securely route internal service requests.
ace-proxy233512.2Tunneling, secure, ssl, pkiBuilt-inAs neededACE-Proxy supports Application Control Engines in securely forwarding application-layer traffic.
plgproxy279012.2Tunneling, secure, ssl, pkiBuilt-inAs neededPLGProxy is a plugin-based proxy tunneling service used to extend secure routing functions in modular networks.
csvr-proxy319012.2Tunneling, secure, ssl, pkiBuilt-inAs neededCSVR-Proxy handles plain-text or internal proxying of custom service routing in controlled networks.

Was this information helpful?