Skip to content
DocumentationSetup

VPN

Configure your system to use WonderProxy's VPN

About VPN

A Virtual Private Network (VPN) is used to create a secure connection between two machines. Traffic over the network is encrypted to prevent intermediate parties from reading messages passed back and forth. Other schemes are also applied to prevent modification of messages, or injection of new messages in the stream. The VPN only protects information between your computer and the VPN server, communications between the VPN server and the traffic's destination will not be affected.

The VPN server will allow you to remain connected for twelve hours, at which point your connection will be closed. Feel free to re-connect immediately.

Getting Set Up

To get started, ensure you have:

  1. Added your desired servers to your WonderProxy account
  2. Located your WonderProxy username.
  3. Generated a WonderProxy proxy token or a passphrase (see the table below for details). You'll enter these credentials whenever the VPN configuration asks for a password.
  4. Determined the hostname of the server you wish to connect to (e.g. newyork.wonderproxy.com).

A username and a password/passphrase/token is required to log into the VPN servers. Users cannot use Single Sign-On for VPN server authentication.

VPN types

The following table lists all the offered VPN types and the authentication mechanisms they use. Choose one that best suites your situation.

Supported devices Credentials & security
IKEv2 MSCHAPv2 (recommended) Windows, Android, Mac, iOS, select Asus routers

Generate up to 3 dedicated passphrases per account. Each has unlimited lifetime, and can be revoked at will.

IKEv1 L2TP Older devices

Preferred: Use either a generated passphrase or a proxy token. You can only have a limited number of passphrases, and they don’t expire. On the other hand, you can have an unlimited number of proxy tokens, each having a lifetime of 365 days and needs to be replaced after that time. Passphrases are shorter, so you might want to use them when your device imposes strict password length limits.

Less secure: You account password can be also used

Unencrypted L2TP Select TP-Link routers

These connections are not encrypted at the VPN level.

Preferred: Use either a generated passphrase or a proxy token. You can only have a limited number of passphrases, and they don’t expire. On the other hand, you can have an unlimited number of proxy tokens, each having a lifetime of 365 days and needs to be replaced after that time. Passphrases are shorter, so you might want to use them when your device imposes strict password length limits.

Less secure: You account password can be also used