This is an old revision of the document!
List of protocols
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
Поиск:
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| k-block | 287 | 12.2 | Network services | Built-in | As needed | A protocol for K-Block, a key or block-level network security protocol. |
| novastorbakcup | 308 | 12.2 | Backup | Built-in | As needed | NovaStorBackup protocol handles encrypted backup sessions between client and vault systems. |
| entrusttime | 309 | 12.2 | Debugging and measurement | Built-in | As needed | EntrustTime is a secure timestamp authority protocol used in PKI and document validation. |
| bhmds | 310 | 12.2 | Network services | Built-in | As needed | A protocol for BHMDS (Business Host Management Data Service), managing business host data. |
| asip-webadmin | 311 | 12.2 | Web browsing | Built-in | As needed | Apple System Integration Protocol Web Administration, used for managing Apple systems. |
| vslmp | 312 | 12.2 | Network services | Built-in | As needed | VSLM Protocol supports variable subnet licensing and session state control. |
| magenta-logic | 313 | 12.2 | Application servers | Built-in | As needed | Magenta-Logic protocol is used in secure workflow or logic programming systems. |
| opalis-robot | 314 | 12.2 | Application servers | Built-in | As needed | Opalis-Robot is a workflow automation protocol from Microsoft System Center Orchestrator suite. |
| dpsi | 315 | 12.2 | Network services | Built-in | As needed | A protocol for DPSI (Distributed Processing System Interface), enabling distributed computing. |
| decauth | 316 | 12.2 | Network services | Built-in | As needed | A protocol for DECAuth (Distributed Enterprise Control Authentication), authenticating users. |
| zannet | 317 | 12.2 | Network services | Built-in | As needed | Zannet telemetry sync protocol for encrypted zero-trust overlay networks. |
| pkix-timestamp | 318 | 12.2 | Debugging and measurement | Built-in | As needed | PKIX-Timestamp protocol handles trusted timestamping in public key infrastructure systems. |
| ptp-event | 319 | 12.2 | Debugging and measurement | Built-in | As needed | PTP-Event handles event message transport in Precision Time Protocol networks. |
| ptp-general | 320 | 12.2 | Debugging and measurement | Built-in | As needed | PTP-General transmits management and sync messages in IEEE 1588 time sync systems. |
| pip | 321 | 12.2 | Network services | Built-in | As needed | PIP protocol provides network transport and telemetry for distributed printers. |
| rtsps | 322 | 12.2 | Network services | Built-in | As needed | Real-Time Streaming Protocol Secure — provides encrypted media session signaling. |
| rpki-rtr | 323 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | RPKI-RTR is a router protocol for retrieving validated routing information from RPKI caches. |
| rpki-rtr-tls | 324 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | RPKI-RTR-TLS is a secure TLS-based version of the RPKI-Router protocol for BGP validation. |
| texar | 333 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Texar is a secure remote access or telemetry protocol, potentially used in defense or aerospace systems. |
| pdap | 344 | 12.2 | Data transfer | Built-in | As needed | PDAP is a remote access protocol for synchronized access to personal data assistants. |
Was this information helpful?