List of protocols [Документация VAS Experts]

This is an old revision of the document!


List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
opsec-sam1818312.2UnknownBuilt-inAs neededopsec-sam operates on port 18183 and provides session authentication management in OPSEC-based infrastructures.
opsec-lea1818412.2UnknownBuilt-inAs neededopsec-lea operates on port 18184 and supports Log Export API (LEA) in Check Point firewalls for security event logging.
opsec-omi1818512.2UnknownBuilt-inAs neededopsec-omi operates on port 18185 and enables Open Management Interface services for Check Point OPSEC integration.
ohsc1818612.2UnknownBuilt-inAs neededohsc operates on port 18186 and supports secure communications in OHSC systems used in healthcare or compliance.
opsec-ela1818712.2UnknownBuilt-inAs neededopsec-ela operates on port 18187 and manages encrypted log access in OPSEC event logging systems.
checkpoint-rtm1824112.2UnknownBuilt-inAs neededCheck Point Real-Time Monitoring protocol for firewall and security event tracking.
iclid1824212.2UnknownBuilt-inAs needediclid operates on port 18242 and provides device identification services in ICL enterprise systems.
clusterxl1824312.2UnknownBuilt-inAs neededCheck Point ClusterXL protocol for high availability and load-balanced firewall clusters.
gv-pf1826212.2UnknownBuilt-inAs neededgv-pf operates on port 18262 and supports grid visualization or processing features in GV-PF compute frameworks.
ac-cluster1846312.2UnknownBuilt-inAs neededac-cluster operates on port 18463 and supports node communication in high-performance or distributed AC clustering systems.
rds-ib1863412.2UnknownBuilt-inAs neededrds-ib operates on port 18634 and supports RDS-IB for remote desktop services over InfiniBand.
rds-ip1863512.2UnknownBuilt-inAs neededrds-ip operates on port 18635 and facilitates RDS-IP for remote desktop services over IP networks.
ique1876912.2UnknownBuilt-inAs neededique operates on port 18769 and supports communication between devices in the iQue handheld console ecosystem.
infotos1888112.2UnknownBuilt-inAs neededinfotos operates on port 18881 and supports information transport services in INFOTOS middleware applications.
apc-necmp1888812.2UnknownBuilt-inAs neededapc-necmp operates on port 18888 and supports NECMP (Network Environmental Control Management Protocol) used in APC systems.
igrid1900012.2UnknownBuilt-inAs neededigrid operates on port 19000 and enables communication for interactive grid computing platforms.
j-link1902012.2UnknownBuilt-inAs neededj-link operates on port 19020 and facilitates debugging and communication for Segger J-Link hardware.
opsec-uaa1919112.2UnknownBuilt-inAs neededopsec-uaa operates on port 19191 and supports user authorization auditing in Check Point security environments.
ua-secureagent1919412.2UnknownBuilt-inAs neededua-secureagent operates on port 19194 and supports UserAuthority SecureAgent for secure authentication and access control in enterprise environments.
keysrvr1928312.2UnknownBuilt-inAs neededkeysrvr operates on port 19283 and manages cryptographic key exchange and distribution in secure environments.

Was this information helpful?