List of protocols and ports
- Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all. - Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
- Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.
Поиск:
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| fprams | 4122 | 12.2 | Instant messengers | Built-in | As needed | FPRAMS is used in secure facility messaging or alarm sync services. |
| z-wave | 4123 | 12.2 | Network services | Built-in | As needed | Mesh protocol used in home automation for secure low-bandwidth device communication. |
| tigv2 | 4124 | 12.2 | Network services | Built-in | As needed | TIGv2 adds encryption and schema validation to original TIG telemetry streams. |
| opsview-envoy | 4125 | 12.2 | Network services | Built-in | As needed | Opsview-Envoy relays secure telemetry from agents to Opsview monitoring controllers. |
| ddrepl | 4126 | 12.2 | Network services | Built-in | As needed | A protocol for DDRepl (Distributed Data Replication), replicating data in networks. |
| unikeypro | 4127 | 12.2 | Data bases | Built-in | As needed | UniKeyPro protocol manages secure license checks and access validation in UniKey-protected DBs. |
| nufw | 4128 | 12.2 | Data bases | Built-in | As needed | NuFW protocol adds user authentication to Netfilter firewalls, securing DB-related sessions. |
| nuauth | 4129 | 12.2 | Data bases | Built-in | As needed | NuAuth is a secure user authentication system for firewalls and database access control. |
| fronet | 4130 | 12.2 | Network services | Built-in | As needed | A protocol for Fronet, potentially a front-end network service or communication layer. |
| stars | 4131 | 12.2 | Network services | Built-in | As needed | STARS (System for Tracking and Registration Services) handles distributed object updates. |
| nuts_dem | 4132 | 12.2 | Network services | Built-in | As needed | NUTS-DEM delivers secure distributed event messaging in testbed or emulation networks. |
| nuts_bootp | 4133 | 12.2 | Data transfer | Built-in | As needed | NUTS-BOOTP is a custom bootstrap protocol used in secure academic computing networks. |
| nifty-hmi | 4134 | 12.2 | Data transfer | Built-in | As needed | Nifty-HMI is a secure interface protocol for accessing human-machine interfaces in automation systems. |
| cl-db-attach | 4135 | 12.2 | Data transfer | Built-in | As needed | CL-DB-Attach handles encrypted attachment and syncing of client DB instances in clustering environments. |
| cl-db-request | 4136 | 12.2 | Network services | Built-in | As needed | A protocol for CL DB Request (Client Database Request), requesting database access. |
| cl-db-remote | 4137 | 12.2 | Network services | Built-in | As needed | A protocol for CL DB Remote (Client Database Remote), accessing remote databases. |
| nettest | 4138 | 12.2 | Network services | Built-in | As needed | NetTest supports traffic simulation and diagnostics for throughput and error rates. |
| thrtx | 4139 | 12.2 | Network services | Built-in | As needed | High-throughput data transmission protocol for large-scale telemetry bursts. |
| cedros_fds | 4140 | 12.2 | Network services | Built-in | As needed | A protocol for Cedros Fraud Detection Service, for financial transaction monitoring. |
| oirtgsvc | 4141 | 12.2 | Debugging and measurement | Built-in | As needed | OIRTGSvc delivers secure telemetry for real-time geolocation services. |
Описание
Was this information helpful?