About VPN
A Virtual Private Network (VPN) is used to create a secure connection between two machines. Traffic over the network is encrypted to prevent intermediate parties from reading messages passed back and forth. Other schemes are also applied to prevent modification of messages, or injection of new messages in the stream. The VPN only protects information between your computer and the VPN server, communications between the VPN server and the traffic's destination will not be affected.
The VPN server will allow you to remain connected for twelve hours, at which point your connection will be closed. Feel free to re-connect immediately.
Getting Set Up
To get started, ensure you have:
- Added your desired servers to your WonderProxy account
- Located your WonderProxy username.
- Generated a WonderProxy proxy token or a passphrase (see the table below for details). You'll enter these credentials whenever the VPN configuration asks for a password.
-
Determined the hostname of the server you wish to connect to
(e.g.
newyork.wonderproxy.com
).
VPN types
The following table lists all the offered VPN types and the authentication mechanisms they use. Choose one that best suites your situation.
Supported devices | Credentials & security | |
---|---|---|
IKEv2 MSCHAPv2 (recommended) | Windows, Android, Mac, iOS, select Asus routers |
Generate up to 3 dedicated passphrases per account. Each has unlimited lifetime, and can be revoked at will. |
IKEv1 L2TP | Older devices |
Preferred: Use either a generated passphrase or a proxy token. You can only have a limited number of passphrases, and they don’t expire. On the other hand, you can have an unlimited number of proxy tokens, each having a lifetime of 365 days and needs to be replaced after that time. Passphrases are shorter, so you might want to use them when your device imposes strict password length limits. Less secure: You account password can be also used |
Unencrypted L2TP | Select TP-Link routers |
These connections are not encrypted at the VPN level. Preferred: Use either a generated passphrase or a proxy token. You can only have a limited number of passphrases, and they don’t expire. On the other hand, you can have an unlimited number of proxy tokens, each having a lifetime of 365 days and needs to be replaced after that time. Passphrases are shorter, so you might want to use them when your device imposes strict password length limits. Less secure: You account password can be also used |