List of protocols and ports [Документация VAS Experts]

List of protocols and ports

  1. Built-in protocols — updated along with the SSG software version. Installing a new version requires a DPI reboot, which causes traffic interruption.
    If needed, they can be supplemented with up-to-date attributes from the VAS Cloud. This is only necessary for complex protocols, but the option is available for all.
  2. Cloud protocols created by VAS Experts — are periodically updated from the VAS Cloud. This ensures that popular applications remain up-to-date as their behavior changes.
  3. Custom (user-defined) protocols — protocols created by users via the GUI using VAS Cloud tools. These have higher priority than those loaded from the VAS Cloud, and within them, IP:PORT takes precedence over IP and CIDR. It is possible to add a protocol based on IP, SNI, or AS. Guide.

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
mloadd142712.2Debugging and measurementBuilt-inAs neededMLoadd protocol measures system load across multi-host deployments for scheduling optimization.
informatik-lm142812.2Application serversBuilt-inAs neededInformatik-LM is a license management protocol for Informatik document imaging software.
nms142912.2Application serversBuilt-inAs neededNMS (Network Management System) handles SNMP or custom telemetry collection in secured IT networks.
tpdu143012.2Application serversBuilt-inAs neededTPDU (Transport Protocol Data Unit) is a legacy OSI protocol supporting secure layered transport services.
rgtp143112.2Data transferBuilt-inAs neededRGTP (Routing Ground Terminal Protocol) is used in satellite or military comms for encrypted telemetry.
blueberry-lm143212.2Application serversBuilt-inAs neededBlueberry-LM is a license manager protocol for Blueberry software tools.
mssql143312.2Data basesBuilt-inAs neededMSSQL protocol handles encrypted client-server database communication with Microsoft SQL Server.
ms-sql-m143412.2Data basesBuilt-inAs neededMS-SQL-M is a secure protocol for monitoring and managing Microsoft SQL Server instances.
ibm-cics143512.2Network servicesBuilt-inAs neededA protocol for IBM CICS (Customer Information Control System), managing transactions.
saism143612.2Mobile protocolsBuilt-inAs neededSAISM is used for secure system alert and incident synchronization in high-assurance environments.
tabula143712.2Network servicesBuilt-inAs neededTabula protocol used in FPGA or programmable chip configuration and control.
eicon-server143812.2Application serversBuilt-inAs neededEicon-Server protocol is used for secure access to WAN and voice gateways in legacy networks.
eicon-x25143912.2Voice over IPBuilt-inAs neededA protocol related to the X.25 networking standard, used for packet-switched communications.
eicon-slp144012.2Mobile protocolsBuilt-inAs neededEicon-SLP enables secure signaling in legacy ISDN and WAN Eicon equipment.
cadis-1144112.2Application serversBuilt-inAs neededCADIS-1 is a protocol used for encrypted content exchange in CAD design collaboration tools.
cadis-2144212.2Application serversBuilt-inAs neededCADIS-2 complements CADIS-1 with enhanced geometry streaming and session control.
ies-lm144312.2Application serversBuilt-inAs neededIES-LM is a licensing protocol for Integrated Engineering Software applications.
marcam-lm144412.2Application serversBuilt-inAs neededMarcam-LM is a license manager protocol for Marcam manufacturing and simulation tools.
proxima-lm144512.2Application serversBuilt-inAs neededProxima-LM is a license manager protocol used for controlling access to Proxima applications.
ora-lm144612.2Application serversBuilt-inAs neededORA-LM is Oracle's license manager protocol used for access and validation.

Описание

Was this information helpful?