Quantifying the Unexpected Traffic on Major TCP and UDP Ports

Total Page:16

File Type:pdf, Size:1020Kb

Quantifying the Unexpected Traffic on Major TCP and UDP Ports Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports Shane Alcock Jean-Pierre Möller Richard Nelson University of Waikato University of Waikato University of Waikato Hamilton, New Zealand Hamilton, New Zealand Hamilton, New Zealand [email protected] [email protected] [email protected] ABSTRACT (P2P) applications, in particular, have long been us- This study aims to identify and quantify applications ing random port numbers to avoid having their traf- that are making use of port numbers that are typi- fic dropped or rate-limited by network operators [11]. cally associated with other major Internet applications In response, standard operating practice has moved to- (i.e. port 53, 80, 123, 443, 8000 and 8080) to bypass wards a ‘default deny’ approach to firewalling, particu- port-based traffic controls such as firewalls. We use larly within corporate or campus networks, where only lightweight packet inspection to examine each flow ob- traffic on ports associated with essential services is al- served using these ports on our campus network over the lowed to traverse protected segments of the network. course of a week in September 2015 and identify appli- However, this ignores another problem: what if other cations that are producing network traffic that does not applications start using the ports that are typically as- match the expected application for each port. We find sociated with the essential services? Previous research that there are numerous programs that co-opt the port has already identified that not all TCP port 80 traffic is numbers of major Internet applications on our campus, HTTP [5] [8] [10] [15], although in each study the ‘un- many of which are Chinese in origin and are not recog- expected’ traffic on TCP port 80 was not analyzed in nized by existing traffic classification tools. As a result depth or associated with particular applications. Other of our investigation, new rules for identifying over 20 ports used by essential services have been ignored in new applications have been made available to the re- past research, such as TCP port 443 (HTTPS), UDP search community. port 53 (DNS) and the alternative HTTP ports (TCP port 8080 and 8000). As a result, we know that these ports may be sometimes used by other applications but Keywords little about which applications are doing so and the traffic classification; firewalls; application protocols amount of traffic that these applications are ‘sneaking’ past port-based traffic controls. 1. INTRODUCTION In this paper, we investigate and catalogue unex- pected traffic on the set of ports that are most likely to Practical network operations are still heavily depen- be open on many, if not all, firewalls: port 53, 80, 443, dent on port numbers from transport layer headers (i.e. 8000, 8080 and 123. Our aim is to not just demonstrate TCP and UDP) for traffic control purposes [6]; firewall that unexpected traffic exists on these ports (as this has rules being one of the more obvious examples. Port- already been established in previous literature), but to based controls are popular because they are easy, and also investigate further and try to correctly identify the therefore cheap, to implement in hardware and because applications responsible for as much of the unexpected they are simple for operators to comprehend. The prob- traffic as possible. lem with port-based approaches is that port numbers Using a week-long packet capture from our campus cannot reliably identify all applications. Peer-to-peer network and the libprotoident [1] traffic classification library, we have successfully identified many of the ap- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or plications that were using these port numbers and can distributed for profit or commercial advantage and that copies bear this notice therefore bypass a typical firewall configuration unde- and the full citation on the first page. Copyrights for components of this work tected. We also quantify the effect of these applications owned by others than ACM must be honored. Abstracting with credit is per- mitted. To copy otherwise, or republish, to post on servers or to redistribute to in terms of the number of flows and amount of bytes lists, requires prior specific permission and/or a fee. Request permissions from that each application was contributing. Many of the ap- [email protected]. plications that we identified originate from China and, IMC ’16, November 14–16, Santa Monica, CA, USA. as far as we are aware, were not able to be recognized c 2016 ACM. ISBN 978-1-4503-4526-2/16/11. $15.00 by existing open-source traffic classifiers prior to this DOI: http://dx.doi.org/10.1145/2987443.2987447 research being conducted. Rules for 22 new application The analysis presented in this paper was conducted protocols have been added to libprotoident and made using the lpi_protoident tool that is included with freely available through the latest software release. the libprotoident library. This tool prints a single line Because our analysis is from a single campus network of output for each bidirectional flow found in the in- with a high proportion of Chinese and Taiwanese over- put traffic dataset containing the flow 5-tuple, the time seas students (8.4% of students are from China / Tai- that the flow began, the number of bytes sent in each di- wan), we recognize that it would not be appropriate to rection and the application protocol that libprotoident generalize our observations to the Internet as a whole. has assigned to that flow. TCP flows where a com- Rather, we present this study as an single data point plete handshake was not observed are ignored, as we that can be compared against by people with access to cannot be certain that the first payload-bearing pack- datasets from other networks with different demograph- ets for those flows will have been observed. For UDP, ics. To aid in the continuation of study in this area, the we already have to accept that the first payload-bearing new protocol matching rules that we developed have packets may be missing, even if the flow begins and ends been included in the latest libprotoident release and are within the time period covered by our dataset, so all therefore freely available to other researchers. observed flows are reported. Flows are expired after ei- ther a period of inactivity (2 minutes for UDP flows and 2. METHODOLOGY unestablished TCP flows, 2 hours for established TCP flows) or the observation of a connection termination 2.1 Packet Traces signal (e.g. a TCP RST or a FIN in both directions). The traceset used in this analysis consists of seven To prevent scans, backscatter and other unsolicited days and seven hours of packet capture taken in Septem- traffic from affecting our results, we ignored all flows ber 2015 at the University of Waikato, during a teaching where both endpoints did not participate in the flow. semester at the University. During this period, 8.4% of For TCP flows, the handshake must have been com- enrolled students (1,048 out of 12,502 enrolments) were pleted successfully and at least one endpoint must have international students from either China or Taiwan; the sent a packet bearing payload. For UDP flows, only relevance of this statistic will become apparent when we flows where both endpoints had sent a payload-bearing present our results in Section 3. packet have been included in the analysis. The packets were captured using an Endace Probe Our initial attempt at analysis with the most recent that was installed at the edge of the campus network, libprotoident release resulted in a significant quantity outside the campus firewall. In this location, the Probe of unidentified traffic. As a result, much of the research was able to observe all traffic entering and exiting the effort in this study was in developing new libprotoident University. The packets captured by the Probe were for- rules to reduce the amount of unidentified traffic in our warded to an instance of our custom WDCap trace cap- dataset as much as possible. As a result, we have been ture software [17] that was running in a virtual machine able to add rules to libprotoident for 22 new applica- on the probe. WDCap was configured to anonymize the tions, as well as improve the quality of the rules for local IP address (i.e. the University address) using the a further 10 applications that were already supported. standard prefix-preserving CryptoPAn method [9] and Most of the new applications are Chinese in origin and to truncate each packet to contain no more than four include Kankan, Kakao, Weibo, Kugou and Xiami. bytes of post-transport header payload. Both of these Space limitations mean that we are unable to fully modifications were to preserve the privacy of the net- describe the changes to libprotoident here; instead, we 1 work users. The remote IP address was left unmodified have created a companion webpage for interested read- (with permission from the University); this was primar- ers with more detail on the new applications that we ily to aid us in identifying the source of new applications have identified as a result of this work and the rules encountered during our analysis. that we have written to match them. The new and improved protocol rules have also been made available 2.2 Libprotoident publicly in the 2.0.8 release of libprotoident, which is Libprotoident [1] is a software library for lightweight open-sourced under the GPL.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Universal Music Group and Tencent Music Entertainment Group Enter Into Strategic Agreement Significantly Expanding Chinese Music Market
    UNIVERSAL MUSIC GROUP AND TENCENT MUSIC ENTERTAINMENT GROUP ENTER INTO STRATEGIC AGREEMENT SIGNIFICANTLY EXPANDING CHINESE MUSIC MARKET – Provides Vast Multi-Platform Distribution and Marketing Opportunities Across China – Companies to Develop Abbey Road Studios China to Create World-Class Recording Studio and Accelerate Development of Local Talent SHENZHEN and SANTA MONICA, MAY 16, 2017 – Universal Music Group (UMG), the world leader in music-based entertainment, and Tencent Music Entertainment Group (TME), a leading digital music distribution platform in China, today announced the signing of a landmark licensing agreement that will significantly expand the Chinese music market. Under the terms of the multi-year agreement, TME will distribute music from UMG’s roster of record labels and global recording stars on its streaming platforms QQ Music, KuGou and Kuwo. TME will also be UMG’s master distribution and licensing partner to exclusively sub-license UMG’s content to third- party music service providers in China. Both parties will work together to find new ways to develop artists, to innovate business models and to reinforce a robust copyright protection environment. In addition, TME will support UMG artists to promote their music, leveraging Tencent online properties and other media channels. In China, TME is one of the largest music platforms, providing over 17 million songs to 600 million monthly active users. TME is a strong advocate of authorized music and has earned industry recognition for driving growth in the digital music industry, with more than 15 million paying subscribers. UMG represents one of the most comprehensive catalogues of recordings and songs across every music genre.
    [Show full text]
  • Global Music Report 2018 ANNUAL STATE of the INDUSTRY
    Global Music Report 2018 ANNUAL STATE OF THE INDUSTRY Global top 10 recording artists of 2017 Untitled-3 1 3/4/18 3:58 PM GLOBAL MUSIC REPORT 2018: STATE OF THE INDUSTRY Welcome · 3 Welcome As an artist, I am privileged to perform One of the crucial roles for record com- before audiences around the world and panies is to support and invest in artists see first-hand how essential music is for and to help them develop for their greatest people from every walk of life. creative and commercial success, so that But even as music’s essence is endur- their music can be enjoyed by fans around ing, much about music is changing. the world. The IFPI Global Music Report tells the It is therefore essential that all music cre- PLÁCIDO DOMINGO story of recorded music’s ongoing journey. ators are fairly compensated for their work. I CHAIRMAN, IFPI Today, artists are reaching music fans in have met with policymakers in Europe and ways I never could have imagined when I elsewhere to call on them to back legislation began my own career. Music is global and that would support this by addressing the increasingly digital. This transformation value gap, thereby ensuring a fair and bal- has been fundamental and rapid and offers anced digital marketplace for all. great opportunities. We are living in an incredibly exciting But we can never forget that music time for recorded music. We must persevere does not just happen. It requires the hard with our efforts to ensure its journey benefits work, commitment, investment and artist- the music creators and fans of today, and ry of so many people.
    [Show full text]
  • [TME] - Tencent Music Entertainment Group Second Quarter 2019 Financial Results Conference Call Monday, August 12, 2019, 8:00 PM ET
    [TME] - Tencent Music Entertainment Group Second Quarter 2019 Financial Results Conference Call Monday, August 12, 2019, 8:00 PM ET Officers Millicent Tu, VGM, IR Cussion Pang, CEO Tony Yip, CSO Shirley Hu, CFO Analysts John Egbert, Stifel, Nicolaus Alex Yao, JPMorgan Chase Eddie Leung, Bank of America Merrill Lynch Piyush Mubayi, Goldman Sachs Group Thomas Chong, Jefferies Hans Chung, KeyBanc Capital Markets Gary Yu, Morgan Stanley Presentation [Technical Difficulty] Operator: Ladies and gentlemen, good evening and good morning, and thank you for standing by. Welcome to the Tencent Music Entertainment Group's Second Quarter 2019 Earnings Conference Call. At this time, all participants are in listen-only mode. (Operator Instructions). Today you will hear discussions from the management team of Tencent Music Entertainment Group, followed by a question-and-answer session. (Operator Instructions). Please be advised that this conference is being recorded today. If you have any objections, you may disconnect at this time. Now, I will turn the conference over to your speaker host today, Ms. Millicent Tu. Please go ahead. Millicent Tu: Thank you, operator. Hello, everyone, and thank you all for joining us on today's call. Tencent Music Entertainment Group announced its financial results for the second quarter of 2019 today after the market close. An earnings release is now available on our IR website at ir.tencentmusic.com, as well as via newswire services. Today you will hear from Mr. Cussion Pang, our CEO, who will start off the call with an overview of our recent achievements and growth strategy. He will be followed by Mr.
    [Show full text]
  • Cultural Governance in Contemporary China: Popular Culture, Digital Technology, and the State
    ! ! ! ! CULTURAL GOVERNANCE IN CONTEMPORARY CHINA: POPULAR CULTURE, DIGITAL TECHNOLOGY, AND THE STATE BY LUZHOU LI DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Communications and Media in the Graduate College of the University of Illinois at Urbana-Champaign, 2015 Urbana, Illinois Doctoral Committee: Professor Emeritus John Nerone, Chair Assistant Professor Amanda Ciafone Professor Emeritus Dan Schiller Professor Kent Ono, University of Utah ii ABSTRACT This dissertation is a study of the historical formation and transformation of the Chinese online audiovisual industry under forces of strategic political calculations, expanding market relations, and growing social participation, and the cultural ramifications of this process, especially the kind of transformations digital technologies have wrought on the state-TV-station-centered mode of cultural production/distribution and regulatory apparatuses. Through this case, the project aims to theorize the changing mode of cultural governance of post-socialist regimes in the context of digital capitalism. Using mixed methods of documentary research, interviews with industry practitioners, participant observations of trade fairs/festivals, and critical discourse analyses of popular cultural texts, the study finds that the traditional broadcasting and the online video sectors are structured along two different political economic mechanisms. While the former is dominated by domestic capital and heavily regulated by state agencies, the latter is supported by transnational capital and less regulated. Digital technologies coupled with transnational capital thus generate new cultural flows, processes, and practices, which produces a heterogeneous and contested cultural sphere in the digital environment that substantially differs from the one created by traditional television.
    [Show full text]
  • A Method to Detect Malware Based on Behavior Using Formal Concept Analysis
    2016 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 2016) ISBN: 978-1-60595-396-0 A Method to Detect Malware Based on Behavior Using Formal Concept Analysis Shao-ming CHEN*, Yi-yang WANG and Bin LIANG Guangdong branch of National Computer Network Emergency Response Technical Team/Coordination Center of China, No. 4 middle road, Tianhe District, Guangzhou, China *Corresponding author Keywords: Malware detection, App’s behavior, Permissions, FCA. Abstract. Malware threats have recently become a real concern. To solve this problem, we propose a new approach in this paper. The method analyzes the apps’ used history and constructs a Formal Concept Lattice based on the permissions which the app is used. The concepts of Formal concept Lattice are used to be compared with the permissions which a new application required before installed. So we can find an optimal concept and identify malwares and inform users about the risk of apps which are about to be installed. An experiment illustrates that our method can effectively identify malicious apps and to protect the user's information security. Introduction Android is one of the most popular platforms for phones today and majority of these devices are unprotected. It is not surprising that the majority malicious mobile attacks are designed for the Android mobile operating system [1]. Malware is a generic term that refers to any code added, changed, or removed from a software system to intentionally cause harm or subvert the system’s intended function. It compromises a system’s security, damages a system or obtains sensitive information without the user’s permission [2].
    [Show full text]
  • The Changing Face of China's Music Market Musicdish*China, May 2017 China’S Old Music Industry Changing Landscape
    THE CHANGING FACE OF CHINA'S MUSIC MARKET MUSICDISH*CHINA, MAY 2017 CHINA’S OLD MUSIC INDUSTRY CHANGING LANDSCAPE • 2013 estimated value of recorded music industry of US$82.6 million (5.6% increase), 21st largest (IFPI) • 2015 estimated value of recorded music industry of US$169.7 million (63.8% increase), 14th largest (IFPI) • 2016 value of recorded music industry grew 20.3% on 30.6% increase in streaming revenue, 12th largest (IFPI) • Digital music industry compound annual growth rate (2011-15): +28.5% (Nielsen) • Government policy: copyright law and enforcement • Market consolidation & music licensing • Shift to smartphone, lower mobile data cost, increased connectivity 40 Tencent: QQ + Kugou + Kuwo ~ 78% 30 Netease 9% 20 Xiami (Alibaba) 10 4% Other: Baidu, Apple Music,… 9% 0 QQ Kugou Kuwo Netease Xiami Other STEFANIE SUN & APPLE MUSIC • EP “RAINBOW BOT” EXCLUSIVELY ON APPLE MUSIC • EXCLUSIVE 3 MINUTE DOCUMENTARY • RANKED NUMBER 4 FOR “5 CAN’T-MISS APPLE MUSIC EXCLUSIVE ALBUM” STREAMING WARS: TENCENT VS. NETEASE • 10th most valued company, world’s largest video game company by revenue, WeChat has 889M active users • Tencent has 600M active monthly users and over 15M paying music subscribers • QQ Music has 200M active monthly users • Combined with Kuwo and Kugou (CMC acquisition), control 77% of music streaming market • NetEase Music Cloud recently joined ranks of unicorns • Netease has over 300M active monthly users MOBILE MUSIC LANDSCAPE • 2015 mobile music industry US$945 million • Estimated 2016 mobile music industry US$1.4 billion
    [Show full text]
  • FN1206: the Path to Operational Enlightenment
    Use this if there will be two speakers for your session. FN1206: © 2019 SPLUNK INC. The Path to Operational Enlightenment An Introduction to Wire Data Simon O’Brien Vinu Alazath Principal Sales Engineer | Splunk Software Engineer | Splunk © 2019 SPLUNK INC. During the course of this presentation, we may make forward‐looking statements Forward- regarding future events or plans of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us Looking and that actual events or results may differ materially. The forward-looking statements made in the this presentation are being made as of the time and date of its live Statements presentation. If reviewed after its live presentation, it may not contain current or accurate information. We do not assume any obligation to update any forward‐looking statements made herein. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only, and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionalities described or to include any such feature or functionality in a future release. Splunk, Splunk>, Turn Data Into Doing, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners. © 2019 Splunk Inc. All rights reserved. © 2019 SPLUNK INC. Agenda ​Challenges ​Product Overview ​Architecture and Deployment ​Demo ​Stream futures © 2019 SPLUNK INC.
    [Show full text]
  • Global Consumer Survey List of Brands June 2018
    Global Consumer Survey List of Brands June 2018 Brand Global Consumer Indicator Countries 11pingtai Purchase of online video games by brand / China stores (past 12 months) 1688.com Online purchase channels by store brand China (past 12 months) 1Hai Online car rental bookings by provider (past China 12 months) 1qianbao Usage of mobile payment methods by brand China (past 12 months) 1qianbao Usage of online payment methods by brand China (past 12 months) 2Checkout Usage of online payment methods by brand Austria, Canada, Germany, (past 12 months) Switzerland, United Kingdom, USA 7switch Purchase of eBooks by provider (past 12 France months) 99Bill Usage of mobile payment methods by brand China (past 12 months) 99Bill Usage of online payment methods by brand China (past 12 months) A&O Grocery shopping channels by store brand Italy A1 Smart Home Ownership of smart home devices by brand Austria Abanca Primary bank by provider Spain Abarth Primarily used car by brand all countries Ab-in-den-urlaub Online package holiday bookings by provider Austria, Germany, (past 12 months) Switzerland Academic Singles Usage of online dating by provider (past 12 Italy months) AccorHotels Online hotel bookings by provider (past 12 France months) Ace Rent-A-Car Online car rental bookings by provider (past United Kingdom, USA 12 months) Acura Primarily used car by brand all countries ADA Online car rental bookings by provider (past France 12 months) ADEG Grocery shopping channels by store brand Austria adidas Ownership of eHealth trackers / smart watches Germany by brand adidas Purchase of apparel by brand Austria, Canada, China, France, Germany, Italy, Statista Johannes-Brahms-Platz 1 20355 Hamburg Tel.
    [Show full text]
  • Social Media
    中国媒体概览 China Media Overview Social Media © 2016 Beyond Summits 3 Summary: • 90s generation has become the main users of Chinese social media. 90s generation prefer to watch internet videos, while 80s and 70s prefer to shop online and read news respectively. • Chinese netizens open and use 6-10 media APPs on average every day. The most frequently used social media platforms are WeChat, QQ and Weibo. When they use social media platforms, they outweigh ‘media’ nature of the platforms to obtain news and information as well as share their lives instead of being ‘social’. • WeChat users are younger and more frequently browse the platform. The users not only acquire common socialization by WeChat, but obtain information and life convenience as well. • Most of the Weibo users are male whose ages are relatively older than that of WeChat. Geographically, the Weibo users concentrate in such areas as Shanghai, Zhejiang Province, Jiangsu Province and the Zhujiang Delta. © 2016 Beyond Summits 4 Summary: • Currently, various APPs developed by such Internet tycoons as Baidu, Alibaba and Tencent are taking leading positions in China’s mobile Internet market. • Mobile Social Platforms: Tencent’s two APPs outperformed their competitive APPs. • Mobile Entertainment Platforms: The top3 mobile video APPs are Tencent, Youku and IQIYI. And the top3 mobile music APPS are KUGOU music, QQ music and KUWO music. • Mobile News Platforms: The top5 APPs are Tencent, TOUTIAO, 163 news, SOHU news and IFENG news. • Mobile Tourism: In this October, a merger between QUNAR and CTRIP produced the greatest mobile tourism APP in China. • Mobile E-commerce: TAOBAO outperformed other APPs.
    [Show full text]
  • Quick Take Changing Ecom Landscap
    C quick take The Changing face of global e-com: The rise of gloChina balSept.21.2014 September 21, 2014 Quick Take: The Changing Face of Global E-Commerce — The Rise of China "Amazon and eBay are e-commerce companies, and Alibaba is not an e- commerce company. Alibaba helps others to do e-commerce. We do not sell things." Alibaba co-founder – Jack Ma Introduction Starting September 19, Chinese e-commerce giant Alibaba is listed under the symbol BABA on the NYSE. A day before that, Alibaba priced its IPO at $68 a share, the top end of the expected range, raising a record-breaking $21.8 billion. The company closed the first day of trading at $93.89 a share, up 38% from its IPO price. With a market cap of 231 billion (as of the close of September 19), Alibaba overtakes Amazon.com and Facebook and trails only Google, Apple, and Microsoft in size among technology companies listed in the U.S.. Alibaba is now a familiar name to the Americans, and the company will use the IPO proceeds to expand in the U.S., notably with the launch of local e-commerce platform 11 Main. It has also acquired stakes in companies including Uber, Lyft and search engine app Quixey. During the IPO roadshow, Alibaba’s co-founder and Executive Chairman Jack Ma has reiterated the company’s intent to internationalize aggressively after the listing. Investors are no strangers to the best of the Chinese Internet companies, as many of them are listed in the U.S.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for November 28, 2019. None in this release. All Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols and applications supported until ADC Plugin release on October 31, 2019. Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support All Supported Protocols and Applications Protocol / Client Client Version Group Classification Supported from Application Release 120Sports 120Sports 1.6
    [Show full text]