List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
unot505512.2Network servicesBuilt-inAs neededUnified Notification Transport used for alert broadcasting in distributed platforms.
intecom-ps1505612.2Data transferBuilt-inAs neededIntecom-PS1 supports initial session setup in Intecom VoIP environments.
intecom-ps2505712.2Data transferBuilt-inAs neededIntecom-PS2 handles encrypted signaling for business telephony systems by Intecom.
locus-disc505812.2Network servicesBuilt-inAs neededLocus-Disc handles secure discovery of localized devices in geo-spatial networks.
sds505912.2Data transferBuilt-inAs neededSDS (Secure Data Sync) enables encrypted synchronization of critical data between nodes.
sip506012.2Voice over IPBuilt-inAs neededSession Initiation Protocol, used to establish and manage multimedia sessions such as voice and video calls over the internet.
sip-tls506112.2Voice over IPBuilt-inAs neededSecure SIP, which is the SIP protocol secured with TLS (Transport Layer Security) for encryption.
na-localise506212.2Tunneling, secure, ssl, pkiBuilt-inAs neededNA-Localise is used in secure network automation platforms for encrypted node discovery.
csrpc506312.2Tunneling, secure, ssl, pkiBuilt-inAs neededCSRPC (Control System RPC) is used in SCADA or automation environments for secure command execution.
ca-1506412.2RTPBuilt-inAs neededCould be a Conditional Access system for encrypted media streams.
ca-2506512.2RTPBuilt-inAs neededAnother Conditional Access channel, for secured video transmissions.
stanag-5066506612.2Network servicesBuilt-inAs neededMilitary protocol standard for HF radio data transfer (NATO STANAG 5066).
authentx506712.2Tunneling, secure, ssl, pkiBuilt-inAs neededAuthentX is a secure authentication platform used in federated identity and policy enforcement systems.
bitforestsrv506812.2Instant messengersBuilt-inAs neededBitForestSrv protocol manages encrypted telemetry and messaging from blockchain services.
i-net-2000-npr506912.2Video, picturesBuilt-inAs neededINET-2000-NPR is a network port registry used in legacy streaming or secure online broadcast systems.
vtsas507012.2Application serversBuilt-inAs neededVTSAS is a secure alerting system for video transmission software platforms.
powerschool507112.2Application serversBuilt-inAs neededPowerSchool protocol is used by educational platforms to securely manage student records and data syncing.
ayiya507212.2Data transferBuilt-inAs neededAYIYA is an IPv6 tunneling protocol that provides secure encapsulation over IPv4 networks.
tag-pm507312.2Application serversBuilt-inAs neededTAG-PM (Television Audience Guide) protocol supports media metadata delivery in broadcast systems.
alesquery507412.2Data basesBuilt-inAs neededALESQuery is used in secure law enforcement database access and query portals.

Was this information helpful?