Name
|
Description
|
Antivirus
|
Antivirus update
|
Application Service
|
Background service
|
Audio/Video
|
Application/Protocol used to transport audio or video content
|
Authentication
|
Protocol used for authentification purposes
|
Behavioral
|
Protocol classified by non-deterministic criteria based on statistical analysis of packet form and session behavior.
|
Compression
|
Compression layers
|
Database
|
Protocol used for database remote queries
|
Encrypted
|
Encryption protocol
|
ERP
|
Enterprise Ressource Planning application
|
File Server
|
File transfer protocol
|
File Transfer
|
Protocol used for user-to-user file transfers via Instant-Messaging applications.
|
Forum
|
Web forum
|
Game
|
Gaming protocol
|
Instant Messaging
|
Instant messaging application
|
Mail
|
Email exchange protocol
|
Microsoft Office
|
Microsoft office sub-protocol
|
Middleware
|
Platform protocol for remote procedure calls
|
Network Management
|
Protocol used for IT management
|
Network Service
|
Low level network protocol
|
Peer to Peer
|
Peer to peer application
|
Printer
|
Printer commmunication protocol
|
Routing
|
Network routing protocol
|
Security Service
|
Workstation security application
|
Standard
|
Basic layers defined by ENEA
|
Telephony
|
Telephony core network protocol
|
Terminal
|
Remote terminal protocol
|
Thin Client
|
Remote control protocol
|
Tunneling
|
Tunneling protocol
|
Wap
|
Mobile specific transport protocol
|
Web
|
Generic web traffic
|
Webmail
|
Web email application
|