List of protocols and ports [Документация VAS Experts]

This is an old revision of the document!


List of protocols and ports

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
appiq-mgmt467412.2Application serversBuilt-inAs neededAppIQ-Mgmt is used in HP Storage Essentials for secure storage resource monitoring.
dhct-status467512.2Data transferBuilt-inAs neededDHCT-Status provides diagnostics and reporting for digital home communications terminals.
dhct-alerts467612.2Data transferBuilt-inAs neededDHCT-Alerts transmits alert signals from home media devices to service providers securely.
bcs467712.2Network servicesBuilt-inAs neededA protocol for BCS (Business Control System), managing business control operations.
traversal467812.2Network servicesBuilt-inAs neededGeneric NAT Traversal protocol to allow secure peer-to-peer communications.
mgesupervision467912.2Application serversBuilt-inAs neededMGESupervision provides secure monitoring of UPS and energy systems in industrial environments.
mgemanagement468012.2Application serversBuilt-inAs neededMGEManagement protocol is used in UPS and energy systems for configuration and control.
parliant468112.2Mobile protocolsBuilt-inAs neededParliant protocol manages encrypted voicemail sync and telephony integration for desktop apps.
finisar468212.2Application serversBuilt-inAs neededFinisar protocol supports secure monitoring and control of optical communication test tools.
spike468312.2Data transferBuilt-inAs neededSPIKE protocol delivers secure sensor telemetry in surveillance and monitoring networks.
rfid-rp1468412.2Tunneling, secure, ssl, pkiBuilt-inAs neededRFID-RP1 is a secure protocol for real-time positioning and tag tracking in high-security RFID systems.
autopac468512.2Tunneling, secure, ssl, pkiBuilt-inAs neededAutoPAC automates proxy auto-configuration updates and distribution for secure browsing environments.
msp-os468612.2Application serversBuilt-inAs neededMSP-OS protocol is used in managed service provider tools for secure operating system control.
nst468712.2Network servicesBuilt-inAs neededNST (Network Status Tool) protocol monitors device states and sends secure alerts.
mobile-p2p468812.2Mobile protocolsBuilt-inAs neededMobile-P2P supports encrypted peer discovery and direct data transfer between phones.
altovacentral468912.2Data basesBuilt-inAs neededAltovaCentral is used to coordinate schema and secure configuration for database-related apps.
prelude469012.2Tunneling, secure, ssl, pkiBuilt-inAs neededPrelude is a security information management protocol for gathering encrypted alerts from intrusion detection systems.
mtn469112.2Network servicesBuilt-inAs neededSecure messaging protocol used in MTN operator or carrier backbones.
conspiracy469212.2Instant messengersBuilt-inAs neededConspiracy protocol is used in decentralized or peer-synced chat tools with encrypted overlays.
netxms-agent470012.2Debugging and measurementBuilt-inAs neededNetXMS-Agent communicates performance and configuration data from endpoints to monitoring servers.

Описание

Was this information helpful?