List of protocols [Документация VAS Experts]

List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
zigbee-ips1775612.2UnknownBuilt-inAs neededzigbee-ips operates on port 17756 and provides secure IPv6 transport for ZigBee networks using IPSec-like mechanisms.
sw-orion1777712.2UnknownBuilt-inAs neededsw-orion operates on port 17777 and enables system monitoring, telemetry, or alerting functions in SolarWinds Orion platforms.
biimenu1800012.2UnknownBuilt-inAs neededbiimenu may be used for messaging or chat services (port 18000).
radpdf1810412.2UnknownBuilt-inAs neededradpdf operates on port 18104 and facilitates RadPDF for PDF rendering or management over networks.
racf1813612.2UnknownBuilt-inAs neededracf operates on port 18136 and is used by RACF (Resource Access Control Facility) for security and access control.
opsec-cvp1818112.2UnknownBuilt-inAs neededopsec-cvp operates on port 18181 and enables content vectoring protocol services in firewall and proxy integrations.
opsec-ufp1818212.2UnknownBuilt-inAs neededopsec-ufp operates on port 18182 and handles unified firewall policy services in Check Point OPSEC architecture.
opsec-sam1818312.2UnknownBuilt-inAs neededopsec-sam operates on port 18183 and provides session authentication management in OPSEC-based infrastructures.
opsec-lea1818412.2UnknownBuilt-inAs neededopsec-lea operates on port 18184 and supports Log Export API (LEA) in Check Point firewalls for security event logging.
opsec-omi1818512.2UnknownBuilt-inAs neededopsec-omi operates on port 18185 and enables Open Management Interface services for Check Point OPSEC integration.
ohsc1818612.2UnknownBuilt-inAs neededohsc operates on port 18186 and supports secure communications in OHSC systems used in healthcare or compliance.
opsec-ela1818712.2UnknownBuilt-inAs neededopsec-ela operates on port 18187 and manages encrypted log access in OPSEC event logging systems.
checkpoint-rtm1824112.2UnknownBuilt-inAs neededCheck Point Real-Time Monitoring protocol for firewall and security event tracking.
iclid1824212.2UnknownBuilt-inAs needediclid operates on port 18242 and provides device identification services in ICL enterprise systems.
clusterxl1824312.2UnknownBuilt-inAs neededCheck Point ClusterXL protocol for high availability and load-balanced firewall clusters.
gv-pf1826212.2UnknownBuilt-inAs neededgv-pf operates on port 18262 and supports grid visualization or processing features in GV-PF compute frameworks.
ac-cluster1846312.2UnknownBuilt-inAs neededac-cluster operates on port 18463 and supports node communication in high-performance or distributed AC clustering systems.
rds-ib1863412.2UnknownBuilt-inAs neededrds-ib operates on port 18634 and supports RDS-IB for remote desktop services over InfiniBand.
rds-ip1863512.2UnknownBuilt-inAs neededrds-ip operates on port 18635 and facilitates RDS-IP for remote desktop services over IP networks.
ique1876912.2UnknownBuilt-inAs neededique operates on port 18769 and supports communication between devices in the iQue handheld console ecosystem.

Was this information helpful?