List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
etlservicemgr900112.2Network servicesBuilt-inAs neededA protocol for ETL Service Manager, overseeing extract-transform-load processes.
dynamid900212.2UnknownBuilt-inAs neededdynamid operates on port 9002 and supports DynamID for dynamic identity management or authentication.
ogs-client900712.2UnknownBuilt-inAs neededogs-client operates on port 9007 and enables client-side communication in OGS (Open Game Server) systems.
ogs-server900812.2UnknownBuilt-inAs neededogs-server operates on port 9008 and handles server-side messaging for OGS (Open Game Server) environments.
pichat900912.2Instant messengersBuilt-inAs neededPiChat enables low-bandwidth, secure messaging on embedded or IoT Raspberry Pi systems.
sdr901012.2UnknownBuilt-inAs neededsdr operates on port 9010 and supports Session Directory Rendezvous for session management in multicast systems.
tambora902012.2UnknownBuilt-inAs neededtambora operates on port 9020 and supports data aggregation or analytics in the Tambora telemetry or monitoring platform.
panagolin-ident902112.2UnknownBuilt-inAs neededpanagolin-ident operates on port 9021 and manages identity verification in Panagolin secure communication tools.
paragent902212.2UnknownBuilt-inAs neededparagent operates on port 9022 and enables remote monitoring and management for Paragent endpoint systems.
swa-1902312.2UnknownBuilt-inAs neededswa-1 operates on port 9023 and provides initial access and authentication services for Secure Web Access environments.
swa-2902412.2UnknownBuilt-inAs neededswa-2 operates on port 9024 and supports mid-tier session functions in Secure Web Access protocols.
swa-3902512.2UnknownBuilt-inAs neededswa-3 operates on port 9025 and supports secure session transition and access control within Secure Web Access (SWA) environments.
swa-4902612.2UnknownBuilt-inAs neededswa-4 operates on port 9026 and facilitates advanced session management for SWA (Secure Web Access) systems.
versiera905012.2UnknownBuilt-inAs neededversiera operates on port 9050 and provides remote monitoring and management services in the Versiera IT infrastructure platform.
fio-cmgmt905112.2UnknownBuilt-inAs neededfio-cmgmt operates on port 9051 and enables management for FIO (Flexible IO Tester) or related data generation tools.
glrpc908012.2UnknownBuilt-inAs neededglrpc operates on port 9080 and provides remote procedure call support in distributed systems using GLRPC.
lcs-ap908212.2UnknownBuilt-inAs neededlcs-ap operates on port 9082 and supports LCS Application Protocol for location-based service applications.
emc-pp-mgmtsvc908312.2UnknownBuilt-inAs neededemc-pp-mgmtsvc operates on port 9083 and is used by EMC PowerPath Management Service for storage path management.
aurora908412.2UnknownBuilt-inAs neededaurora operates on port 9084 and enables connectivity for Aurora-based applications in cloud or analytics environments.
ibm-rsyscon908512.2UnknownBuilt-inAs neededibm-rsyscon operates on port 9085 and provides system console services for IBM enterprise platforms.

Was this information helpful?