List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| csvr-sslproxy | 3191 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CSVR-SSLProxy is a secure proxy for application layer services requiring encrypted transport and inspection. |
| flamenco-proxy | 3210 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Flamenco-Proxy is a secure application-layer proxy used in orchestration or coordination of web services. |
| awg-proxy | 3277 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | AWG-Proxy is used for secure tunneling between access gateways and backend resources in multi-tenant systems. |
| opsession-prxy | 3307 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | OpSession Proxy supports remote desktop gateway services in secure IT administration environments. |
| trnsprntproxy | 3346 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Transparent Proxy handles secure traffic redirection at the gateway layer without endpoint configuration. |
| castorproxy | 3450 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CastorProxy is a secure intermediary protocol used in enterprise environments to manage authentication or content filtering. |
| nesh-broker | 3507 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | NESH-Broker is a broker protocol for encrypted service coordination in multi-tiered systems. |
| must-p2p | 3514 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | MUST-P2P is a secure peer-to-peer protocol used for multimedia streaming and encrypted content delivery. |
| beserver-msg-q | 3527 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | BEServer-Msg-Q is used in Symantec Backup Exec for secure messaging between agents and server daemons. |
| ni-visa-remote | 3537 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | NI-VISA-Remote is a secure protocol used by National Instruments for remote instrumentation over encrypted channels. |
| symantec-sim | 3547 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Symantec-SIM is a secure information management protocol used to aggregate and encrypt security events for centralized analysis. |
| esimport | 3564 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | ESImport protocol is used to securely ingest encrypted logs or telemetry into Elasticsearch pipelines. |
| splitlock-gw | 3647 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | SplitLock-GW is a secure gateway protocol used to enforce split tunneling and traffic segmentation. |
| vxcrnbuport | 3652 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | VXCRNBUPort is a secure port used by Veritas NetBackup in clustered or virtualized backup environments. |
| tsp | 3653 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | TSP (Tunnel Setup Protocol) is used for managing secure tunnel initialization, often in IPv6-over-IPv4 configurations. |
| vaprtm | 3654 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | VAPRTM is a secure control tunnel used in virtual appliance monitoring or telemetry management. |
| abatemgr | 3655 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | AbateMgr is a security configuration management tool for remote policy distribution. |
| immedianet-bcn | 3657 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | ImmediaNet-BCN is a secure protocol used in broadcast control networks for encrypted AV distribution. |
| cas-mapi | 3682 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CAS-MAPI is used in secure messaging infrastructure, combining MAPI with secure access layers (e.g., Certificate Authority Systems). |
| e-woa | 3728 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | E-WOA (Encrypted Web of Applications) is a secure communication protocol in web-based enterprise integration. |
Was this information helpful?