List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
csvr-sslproxy319112.2Tunneling, secure, ssl, pkiBuilt-inAs neededCSVR-SSLProxy is a secure proxy for application layer services requiring encrypted transport and inspection.
flamenco-proxy321012.2Tunneling, secure, ssl, pkiBuilt-inAs neededFlamenco-Proxy is a secure application-layer proxy used in orchestration or coordination of web services.
awg-proxy327712.2Tunneling, secure, ssl, pkiBuilt-inAs neededAWG-Proxy is used for secure tunneling between access gateways and backend resources in multi-tenant systems.
opsession-prxy330712.2Tunneling, secure, ssl, pkiBuilt-inAs neededOpSession Proxy supports remote desktop gateway services in secure IT administration environments.
trnsprntproxy334612.2Tunneling, secure, ssl, pkiBuilt-inAs neededTransparent Proxy handles secure traffic redirection at the gateway layer without endpoint configuration.
castorproxy345012.2Tunneling, secure, ssl, pkiBuilt-inAs neededCastorProxy is a secure intermediary protocol used in enterprise environments to manage authentication or content filtering.
nesh-broker350712.2Tunneling, secure, ssl, pkiBuilt-inAs neededNESH-Broker is a broker protocol for encrypted service coordination in multi-tiered systems.
must-p2p351412.2Tunneling, secure, ssl, pkiBuilt-inAs neededMUST-P2P is a secure peer-to-peer protocol used for multimedia streaming and encrypted content delivery.
beserver-msg-q352712.2Tunneling, secure, ssl, pkiBuilt-inAs neededBEServer-Msg-Q is used in Symantec Backup Exec for secure messaging between agents and server daemons.
ni-visa-remote353712.2Tunneling, secure, ssl, pkiBuilt-inAs neededNI-VISA-Remote is a secure protocol used by National Instruments for remote instrumentation over encrypted channels.
symantec-sim354712.2Tunneling, secure, ssl, pkiBuilt-inAs neededSymantec-SIM is a secure information management protocol used to aggregate and encrypt security events for centralized analysis.
esimport356412.2Tunneling, secure, ssl, pkiBuilt-inAs neededESImport protocol is used to securely ingest encrypted logs or telemetry into Elasticsearch pipelines.
splitlock-gw364712.2Tunneling, secure, ssl, pkiBuilt-inAs neededSplitLock-GW is a secure gateway protocol used to enforce split tunneling and traffic segmentation.
vxcrnbuport365212.2Tunneling, secure, ssl, pkiBuilt-inAs neededVXCRNBUPort is a secure port used by Veritas NetBackup in clustered or virtualized backup environments.
tsp365312.2Tunneling, secure, ssl, pkiBuilt-inAs neededTSP (Tunnel Setup Protocol) is used for managing secure tunnel initialization, often in IPv6-over-IPv4 configurations.
vaprtm365412.2Tunneling, secure, ssl, pkiBuilt-inAs neededVAPRTM is a secure control tunnel used in virtual appliance monitoring or telemetry management.
abatemgr365512.2Tunneling, secure, ssl, pkiBuilt-inAs neededAbateMgr is a security configuration management tool for remote policy distribution.
immedianet-bcn365712.2Tunneling, secure, ssl, pkiBuilt-inAs neededImmediaNet-BCN is a secure protocol used in broadcast control networks for encrypted AV distribution.
cas-mapi368212.2Tunneling, secure, ssl, pkiBuilt-inAs neededCAS-MAPI is used in secure messaging infrastructure, combining MAPI with secure access layers (e.g., Certificate Authority Systems).
e-woa372812.2Tunneling, secure, ssl, pkiBuilt-inAs neededE-WOA (Encrypted Web of Applications) is a secure communication protocol in web-based enterprise integration.

Was this information helpful?