Ivacy VPN offers both OpenVPN and SSTP protocols. OpenVPN, particularly over TCP port 443, is often favored for its ability to bypass restrictive firewalls, as it resembles standard HTTPS traffic. SSTP (Secure Socket Tunneling Protocol) is another robust option that encapsulates VPN traffic within an SSL/TLS channel, also using TCP port 443. While both can use the same port, they are distinct protocols with different strengths. Configuring OpenVPN TCP alongside understanding SSTP allows for flexibility in challenging network environments.
To configure Ivacy VPN using OpenVPN TCP, you'll need the appropriate .ovpn configuration file from Ivacy's website or support channels. These files typically specify the server address, port (443 for TCP), and encryption settings.
Example .ovpn snippet:
client
dev tun
proto tcp
remote {ivacy_server_address} 443
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
auth SHA256
cipher AES-256-CBC
verb 3
Replace {ivacy_server_address} with the actual server address provided by Ivacy. Ensure that your OpenVPN client software (e.g., OpenVPN GUI, Tunnelblick) is correctly installed and configured to use this .ovpn file. You may need to adjust the mssfix parameter if you encounter connection issues due to MTU size. A common value is mssfix 1400.
When using OpenVPN TCP with Ivacy, verify that all traffic is being routed through the VPN tunnel. This can be checked using traceroute or tracert to a public IP address. The initial hops should indicate that traffic is exiting through Ivacy's servers.
DNS leaks are a common concern. To prevent them, explicitly set the DNS servers within the .ovpn file:
dhcp-option DNS 8.8.8.8
dhcp-option DNS 8.8.4.4
Alternatively, configure your system to use Ivacy's DNS servers, if provided. Post-connection scripts can automate this process. Tools like test-ipv6.com can confirm DNS leak protection.
Firewalls can still interfere with OpenVPN TCP connections, even on port 443, through deep packet inspection (DPI). If OpenVPN TCP proves unreliable, consider SSTP as a fallback. SSTP's encapsulation within SSL can sometimes evade DPI more effectively.
To use SSTP, configure the native SSTP client in Windows or use a third-party client on other operating systems. You'll need the Ivacy server address and your Ivacy VPN credentials. SSTP configuration is generally simpler than OpenVPN but might offer less granular control.
OpenVPN TCP can introduce some performance overhead compared to UDP due to TCP-over-TCP issues and increased latency. SSTP also has performance considerations due to the SSL/TLS encryption overhead. Experiment with different Ivacy server locations to find the optimal balance between speed and reliability. Monitor your connection speed and latency using tools like ping and speedtest-cli. If performance is consistently poor, consider switching back to OpenVPN UDP or exploring other VPN protocols.
After establishing an Ivacy VPN connection using OpenVPN TCP or SSTP, verify your IP address using a website like ipinfo.io. It should match the IP address of the Ivacy server. If you experience connectivity issues, check the OpenVPN client logs for errors. Common problems include incorrect credentials, firewall interference, and MTU size mismatches. For SSTP, examine the system event logs for any SSTP-related errors. Ensure that your Ivacy VPN subscription is active and that you are using the correct server address. Contact Ivacy's support if problems persist.