List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| csrpc | 5063 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | CSRPC (Control System RPC) is used in SCADA or automation environments for secure command execution. |
| authentx | 5067 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | AuthentX is a secure authentication platform used in federated identity and policy enforcement systems. |
| llrp | 5084 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | LLRP (Low Level Reader Protocol) is used for RFID reader communication, often tunneled in enterprise networks. |
| encrypted-llrp | 5085 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Encrypted LLRP is a secure extension of the Low Level Reader Protocol for RFID systems to ensure encrypted tag data transmission. |
| nbt-pc | 5133 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | NBT-PC is a secure extension of NetBIOS over TCP used in protected environments for remote device communication. |
| rmonitor_secure | 5145 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | RMonitor_Secure is a secure monitoring agent protocol for IT or SCADA environments. |
| atmp | 5150 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | ATMP (Ascend Tunnel Management Protocol) is a lightweight tunneling protocol developed for secure VPN connections. |
| bsfsvr-zn-ssl | 5321 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | BSFSVR-ZN-SSL is an SSL-secured protocol used in backup or restore server coordination in enterprise environments. |
| wsdapi-s | 5358 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | WSDAPI-S is a secure variant of the Web Services on Devices API, used in service discovery and management over TLS. |
| ms-s-sideshow | 5361 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | MS-S-Sideshow is a Microsoft protocol enabling encrypted auxiliary device communication such as external displays or widgets. |
| securitychase | 5399 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | SecurityChase is a financial platform’s secure API used for encrypted transaction processing or identity verification. |
| excerpts | 5401 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Excerpts protocol supports selective tunneling of encrypted media or document blocks. |
| telaconsole | 5428 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | TelaConsole is a secure remote console protocol used for accessing and managing virtual or physical servers. |
| ttl-publisher | 5462 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | TTL-Publisher is a secure telemetry feed for Time-To-Live status or network metrics. |
| ttlpriceproxy | 5463 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | TTLPriceProxy supports encrypted financial pricing feeds in algorithmic trading networks. |
| mysql-proxy | 6446 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | MySQL-Proxy is a middleware tool for inspecting, filtering, and encrypting MySQL client-server traffic. |
| sunproxyadmin | 8081 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | SunProxyAdmin is a Sun Microsystems protocol used for secure administrative control over proxy server instances. |
| gt-proxy | 9889 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | GT-Proxy is used to securely tunnel traffic from gaming clients or geographic telemetry systems. |
| ezproxy-2 | 10102 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | EZproxy-2 is a load-balanced or secondary instance of the EZproxy service used in academic networks. |
| ghvpn | 12009 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | GHVPN is a proprietary VPN protocol providing encrypted peer-to-peer tunnels in enterprise or gaming networks. |
Was this information helpful?