List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| ezproxy | 26260 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | EZproxy is a web proxy server developed by OCLC, used by libraries to provide off-campus access to licensed electronic resources. |
| pmcdproxy | 44322 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | PMCDProxy is used in Performance Co-Pilot (PCP) to securely tunnel performance metric data across hosts. |
| GRE | 49198 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | GRE (Generic Routing Encapsulation) is a tunneling protocol developed by Cisco to encapsulate a wide variety of network layer protocols. |
| PPPoE Session Stage | 65300 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | PPPoE Session Stage is the authenticated phase of PPP over Ethernet, securing user access. |
| DoH | 49235 | 12.2 | Tunneling, secure, ssl, pki | Built-in | 2025-01-27 | DoH (DNS-over-HTTPS) encrypts DNS queries to prevent eavesdropping and tampering over HTTPS. |
| TLS_UNKNOWN | 49259 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | TLS_Unknown is a placeholder label for encrypted protocols that use TLS but do not match a known signature or port range. |
| DoT | 49281 | 12.4 | Tunneling, secure, ssl, pki | Built-in | As needed | DoT (DNS-over-TLS) is a protocol for encrypting DNS traffic using TLS. |
| DTLS | 49287 | 12.4 | Tunneling, secure, ssl, pki | Built-in | As needed | DTLS (Datagram Transport Layer Security) provides TLS-equivalent security for UDP-based applications. |
| doq | 49318 | 13.2-BETA6 | Tunneling, secure, ssl, pki | Built-in | As needed | |
| videotex | 516 | 12.2 | Video, pictures | Built-in | As needed | Videotex is an early standard for interactive TV and online content delivery over telecommunications networks. |
| nmsp | 537 | 12.2 | Video, pictures | Built-in | As needed | NMSP (Network Media Streaming Protocol) is used in Cisco-based platforms for encrypted video/audio transmission. |
| rtsp | 554 | 12.2 | Video, pictures | Built-in | As needed | RTSP (Real Time Streaming Protocol) is a network control protocol for establishing and managing streaming media sessions. |
| philips-vc | 583 | 12.2 | Video, pictures | Built-in | As needed | Philips VC is a protocol for Philips video conferencing systems supporting encrypted media transport. |
| keyserver | 584 | 12.2 | Video, pictures | Built-in | As needed | KeyServer is used for DRM and license verification in secure video streaming platforms. |
| password-chg | 586 | 12.2 | Video, pictures | Built-in | As needed | Password-Chg is a secure service protocol supporting encrypted user credential updates. |
| eyelink | 589 | 12.2 | Video, pictures | Built-in | As needed | EyeLink is a secure video streaming protocol used in biometrics or surveillance platforms. |
| cadview-3d | 649 | 12.2 | Video, pictures | Built-in | As needed | CADView-3D protocol is used to stream 3D CAD content securely to web or enterprise viewers. |
| d-cinema-rrp | 1173 | 12.2 | Video, pictures | Built-in | As needed | D-Cinema-RRP is a protocol used for digital cinema playback, ensuring secure and DRM-protected delivery. |
| periscope | 1230 | 12.2 | Video, pictures | Built-in | As needed | Periscope protocol supports real-time mobile live-streaming with encrypted viewer interaction. |
| hermes | 1248 | 12.2 | Video, pictures | Built-in | As needed | Hermes protocol supports secure streaming and file synchronization in real-time content delivery systems. |
Was this information helpful?