List of protocols [Документация VAS Experts]

This is an old revision of the document!


List of protocols

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
epp70012.2Network servicesBuilt-inAs neededA protocol for Enhanced Print Protocol, improving networked printing services.
lmp70112.2Network servicesBuilt-inAs neededLMP (Link Management Protocol) manages links in optical and transport networks.
iris-beep70212.2Network servicesBuilt-inAs neededA protocol for IRIS BEEP (Blocks Extensible Exchange Protocol), exchanging blocks.
elcsd70412.2Debugging and measurementBuilt-inAs neededELCSD (Electronic License Certificate Service Daemon) manages license status and reporting.
agentx70512.2Debugging and measurementBuilt-inAs neededAgentX is a sub-agent communication protocol used in SNMP master agent architectures.
silc70612.2Network servicesBuilt-inAs neededSecure Internet Live Conferencing protocol supports encrypted chat and conferencing.
borland-dsj70712.2Application serversBuilt-inAs neededBorland-DSJ is a streaming and control protocol for multimedia playback in Borland tools.
entrust-kmsh70912.2Application serversBuilt-inAs neededEntrust-KMSH is the secure key management session handler used in Entrust cryptographic modules.
entrust-ash71012.2Application serversBuilt-inAs neededEntrust-ASH is a secure authentication service handler in Entrust PKI infrastructure.
cisco-tdp71112.2Network servicesBuilt-inAs neededA protocol for Cisco TDP (Tag Distribution Protocol), distributing tags in Cisco networks.
tbrpf71212.2Network servicesBuilt-inAs neededTopology Dissemination Based on Reverse-Path Forwarding used in mobile ad-hoc networks.
iris-xpc71312.2Network servicesBuilt-inAs neededA protocol for IRIS XPC (Extended Procedure Call), extending procedure calls.
iris-xpcs71412.2Network servicesBuilt-inAs neededA protocol for IRIS XPCS (Extended Procedure Call Secure), securing procedure calls.
iris-lwz71512.2Network servicesBuilt-inAs neededA protocol for IRIS LWZ (Lightweight Zip), compressing data in IRIS networks.
pana71612.2Network servicesBuilt-inAs neededProtocol for carrying Authentication for Network Access (PANA) in IP-based networks.
netviewdm172912.2Application serversBuilt-inAs neededNetViewDM1 is an IBM NetView module for secure device monitoring in enterprise systems.
netviewdm273012.2Application serversBuilt-inAs neededNetViewDM2 extends DM1 with additional performance data metrics.
netviewdm373112.2Application serversBuilt-inAs neededNetViewDM3 supports alerts and configuration management in the IBM NetView suite.
netgw74112.2Network servicesBuilt-inAs neededNetGW protocol bridges legacy and modern protocols in industrial network gateways.
netrcs74212.2Network servicesBuilt-inAs neededNetRCS enables encrypted remote command and control for enterprise infrastructure.

Was this information helpful?