List of protocols and ports [Документация VAS Experts]

This is an old revision of the document!


List of protocols and ports

Поиск:

ProtocolIDDPI versionProtocol groupProtocol typeUpdateDescription
essbase142312.2Data basesBuilt-inAs neededEssbase is Oracle’s multidimensional database protocol used in OLAP and business analytics platforms.
hybrid142412.2Tunneling, secure, ssl, pkiBuilt-inAs neededHybrid is a tunneling protocol used for combining encrypted and non-encrypted traffic flows in edge networks.
zion-lm142512.2Application serversBuilt-inAs neededZion-LM is a license manager protocol for simulation or modeling software.
sais142612.2Mobile protocolsBuilt-inAs neededSAIS protocol handles secure access identity sync across authentication providers.
mloadd142712.2Debugging and measurementBuilt-inAs neededMLoadd protocol measures system load across multi-host deployments for scheduling optimization.
informatik-lm142812.2Application serversBuilt-inAs neededInformatik-LM is a license management protocol for Informatik document imaging software.
nms142912.2Application serversBuilt-inAs neededNMS (Network Management System) handles SNMP or custom telemetry collection in secured IT networks.
tpdu143012.2Application serversBuilt-inAs neededTPDU (Transport Protocol Data Unit) is a legacy OSI protocol supporting secure layered transport services.
rgtp143112.2Data transferBuilt-inAs neededRGTP (Routing Ground Terminal Protocol) is used in satellite or military comms for encrypted telemetry.
blueberry-lm143212.2Application serversBuilt-inAs neededBlueberry-LM is a license manager protocol for Blueberry software tools.
mssql143312.2Data basesBuilt-inAs neededMSSQL protocol handles encrypted client-server database communication with Microsoft SQL Server.
ms-sql-m143412.2Data basesBuilt-inAs neededMS-SQL-M is a secure protocol for monitoring and managing Microsoft SQL Server instances.
ibm-cics143512.2Network servicesBuilt-inAs neededA protocol for IBM CICS (Customer Information Control System), managing transactions.
saism143612.2Mobile protocolsBuilt-inAs neededSAISM is used for secure system alert and incident synchronization in high-assurance environments.
tabula143712.2Network servicesBuilt-inAs neededTabula protocol used in FPGA or programmable chip configuration and control.
eicon-server143812.2Application serversBuilt-inAs neededEicon-Server protocol is used for secure access to WAN and voice gateways in legacy networks.
eicon-x25143912.2Voice over IPBuilt-inAs neededA protocol related to the X.25 networking standard, used for packet-switched communications.
eicon-slp144012.2Mobile protocolsBuilt-inAs neededEicon-SLP enables secure signaling in legacy ISDN and WAN Eicon equipment.
cadis-1144112.2Application serversBuilt-inAs neededCADIS-1 is a protocol used for encrypted content exchange in CAD design collaboration tools.
cadis-2144212.2Application serversBuilt-inAs neededCADIS-2 complements CADIS-1 with enhanced geometry streaming and session control.

Описание

Was this information helpful?