This is an old revision of the document!
List of protocols and ports
Поиск:
| Protocol | ID | DPI version | Protocol group | Protocol type | Update | Description |
|---|---|---|---|---|---|---|
| essbase | 1423 | 12.2 | Data bases | Built-in | As needed | Essbase is Oracle’s multidimensional database protocol used in OLAP and business analytics platforms. |
| hybrid | 1424 | 12.2 | Tunneling, secure, ssl, pki | Built-in | As needed | Hybrid is a tunneling protocol used for combining encrypted and non-encrypted traffic flows in edge networks. |
| zion-lm | 1425 | 12.2 | Application servers | Built-in | As needed | Zion-LM is a license manager protocol for simulation or modeling software. |
| sais | 1426 | 12.2 | Mobile protocols | Built-in | As needed | SAIS protocol handles secure access identity sync across authentication providers. |
| mloadd | 1427 | 12.2 | Debugging and measurement | Built-in | As needed | MLoadd protocol measures system load across multi-host deployments for scheduling optimization. |
| informatik-lm | 1428 | 12.2 | Application servers | Built-in | As needed | Informatik-LM is a license management protocol for Informatik document imaging software. |
| nms | 1429 | 12.2 | Application servers | Built-in | As needed | NMS (Network Management System) handles SNMP or custom telemetry collection in secured IT networks. |
| tpdu | 1430 | 12.2 | Application servers | Built-in | As needed | TPDU (Transport Protocol Data Unit) is a legacy OSI protocol supporting secure layered transport services. |
| rgtp | 1431 | 12.2 | Data transfer | Built-in | As needed | RGTP (Routing Ground Terminal Protocol) is used in satellite or military comms for encrypted telemetry. |
| blueberry-lm | 1432 | 12.2 | Application servers | Built-in | As needed | Blueberry-LM is a license manager protocol for Blueberry software tools. |
| mssql | 1433 | 12.2 | Data bases | Built-in | As needed | MSSQL protocol handles encrypted client-server database communication with Microsoft SQL Server. |
| ms-sql-m | 1434 | 12.2 | Data bases | Built-in | As needed | MS-SQL-M is a secure protocol for monitoring and managing Microsoft SQL Server instances. |
| ibm-cics | 1435 | 12.2 | Network services | Built-in | As needed | A protocol for IBM CICS (Customer Information Control System), managing transactions. |
| saism | 1436 | 12.2 | Mobile protocols | Built-in | As needed | SAISM is used for secure system alert and incident synchronization in high-assurance environments. |
| tabula | 1437 | 12.2 | Network services | Built-in | As needed | Tabula protocol used in FPGA or programmable chip configuration and control. |
| eicon-server | 1438 | 12.2 | Application servers | Built-in | As needed | Eicon-Server protocol is used for secure access to WAN and voice gateways in legacy networks. |
| eicon-x25 | 1439 | 12.2 | Voice over IP | Built-in | As needed | A protocol related to the X.25 networking standard, used for packet-switched communications. |
| eicon-slp | 1440 | 12.2 | Mobile protocols | Built-in | As needed | Eicon-SLP enables secure signaling in legacy ISDN and WAN Eicon equipment. |
| cadis-1 | 1441 | 12.2 | Application servers | Built-in | As needed | CADIS-1 is a protocol used for encrypted content exchange in CAD design collaboration tools. |
| cadis-2 | 1442 | 12.2 | Application servers | Built-in | As needed | CADIS-2 complements CADIS-1 with enhanced geometry streaming and session control. |
Описание
Was this information helpful?