Help Center
I cannot connect from China / Vietnam / Iran / Russia etc. What can I do?
If you are unable to connect from a country where there may be a restrictive national firewall we recommend enabling the obfsproxy or V2Ray options from within the IVPN client.
When using OpenVPN we offer two solutions, V2Ray and Obfsproxy. For WireGuard, only V2Ray is currently available.
Both solutions generally work well but you may find one solution is more performant and/or reliable depending on multiple variables relating to your location and the path your traffic takes to the VPN server. We recommend experimenting with both Obfsproxy and V2Ray options.
Graphical Interface for Windows, macOS, and Linux
- Click on the
Settingsgear icon. - Click on the
Connectiontab. - Select the preferred obfuscation option from the
Obfuscationdrop-down list. - Exit
Settingsand connect to the VPN.
Command-Line Interface for Windows, macOS, and Linux
Open a Command Prompt (Windows) or Terminal (macOS and Linux) and type one of the following commands. Feel free to adjust the VPN protocol, obfuscation method and the server location as required:
ivpn connect -obfsproxy obfs4_iat1 -any Sweden
ivpn connect -v2ray quic -p wireguard -fastest
Help is available with more obfsproxy & V2Ray options:
ivpn connect -h
Android
- Go to the app’s
Settings-VPN protocolarea. - Set the VPN protocol to
WireGuard. - In the
Protocol settingssection, select one of theV2Rayoptions. - Exit
Settingsand connect to the VPN.
iOS
- Set the VPN protocol to
WireGuard. - Navigate to
Settings-Advancedarea. - Toggle the
V2Rayoption on and select the preferred protocol. - Exit
Settingsand connect to the VPN.
Inter-Arrival Timing (IAT) Mode
This option is available for OBFS4 proxy and it is the elapsed time after receipt of a packet until the next packet arrives. Three different options are available to determines packet segmentation rules:
- 0 = disabled: packets are segmented by the network, network fingerprints could be detected
- 1 = enabled: packets are segmented by the OBFS4 proxy, maximum payload is 1448 bytes, prevents re-assembly for analysis
- 2 = paranoid: random packet size, prevents re-assembly for analysis, uncommon and may or may not offer benefits
There will likely be a performance decrease for the VPN connection with IAT-modes 1 and 2.
V2Ray options
- VMESS/QUIC: a modern protocol designed to provide robust security and high performance, while reducing latency compared to traditional protocols. It makes your data appear as regular HTTPS traffic
- VMESS/TCP: a traditional, widely-used protocol that guarantees reliable, ordered data delivery. It makes your data appear as regular HTTP traffic.
Will these obfuscation mechanisms stop websites from detecting a VPN connection?
No.
The obfuscation only exists between your device and the VPN server and the mechanism is not designed to bypass VPN blocks on websites, like for video streaming, gambling, or anything with geo-location restrictions. The IP address on the VPN server for outgoing traffic remains the same whether an obfuscation mechanism is active or not.
Related Articles
- Linux - How do I prevent VPN leaks using nftables and OpenVPN?
- What is the IP address of your DNS servers?
- How to resolve error "IVPN.app is damaged and cannot be opened."
- How to Disable Enhanced App Authentication (EAA)
Still have questions?
Get in touch and we'll get back to you in a few hours.
Contact supportInterested in privacy?
Read our latest privacy news and keep up-to-date on IVPN services.
Visit IVPN Blog