Predefined Applications and Supported L7 Signatures

The protocol of network traffic is identified based on a combination of deep packet inspection (DPI) and behavioral analysis, regardless of whether they are plain text, or use advanced encryption and obfuscation techniques. The following list includes all supported protocols and applications (in bold), sub-protocols (in italic) and clients (in standard characters).