NeuroAgent

VLESS Blocking on MTS: Causes and Solutions

VLESS not working on MTS mobile network but works on Wi-Fi? Learn about VLESS blocking on Russian mobile networks and how to bypass operator restrictions.

Question

Are VLESS connections being blocked between Russian servers? I’ve set up a VPN with a tunnel to a Russian server using pure VLESS. The connection works via Wi-Fi but doesn’t work via mobile data (carrier MTS). Please advise, could this be related to VLESS blocking, or is it a problem with my configuration?

NeuroAgent

Your connection via Wi-Fi works, but doesn’t work via MTS mobile network is most likely due to VLESS blocking at the mobile operator level, rather than your configuration. In 2024-2025, Russian mobile operators are actively blocking VLESS traffic, especially when using mobile networks.

Table of Contents

Why VLESS is blocked on mobile networks

In 2024, Russian authorities significantly strengthened control over VPN services, including VLESS. According to research, Roskomnadzor has learned to block VPN protocols that disguise themselves as regular traffic.

VLESS uses an optimized protocol that masks traffic as HTTPS, but mobile operators, including MTS, have implemented deep packet inspection (DPI) systems capable of identifying and blocking such protocols. This is explained by the fact that:

  • Operators can analyze traffic patterns, even when encrypted
  • VLESS connections have distinctive features in the handshake process
  • Mobile networks have stricter traffic filtering rules compared to home internet

Which operators block VLESS

Based on user reports, it can be concluded that VLESS is blocked by several major Russian operators:

  • MTS: Most actively blocks VLESS, especially in regions
  • MegaFon: Also applies blocking but less aggressively
  • YOTA: MTS subsidiary, shows similar blocking policies

Interestingly, blocking often has a regional character. As users note: “In Novosibirsk, mobile operators MTS, MegaFon, YOTA have cut vless, no websites load, but home MTS works fine” source.

Signs of operator blocking

Based on your description and other cases, characteristic signs of VLESS being blocked specifically by a mobile operator can be identified:

  1. Works via Wi-Fi but not via mobile network - this is a key indicator of operator blocking
  2. Connection timeouts - connection simply doesn’t establish
  3. Complete unavailability - no websites load through VLESS
  4. Selectivity - sometimes one server works, another doesn’t

In your case, since the connection works through Wi-Fi, the problem is definitely not in the basic VLESS configuration, but rather in how MTS handles mobile network traffic.

How to check and solve the problem

Checking for blocking

  1. Check through other networks:

    • Try connecting through another mobile operator’s network
    • Use a SIM card from another operator for testing
  2. Testing with different servers:

    • Try connecting to a server in another country
    • Use servers from different hosting providers

Solutions to bypass blocking

  1. Changing transport protocol:

    bash
    # Example of changing from TCP to XHTTP in configuration
    transport: xhttp
    
  2. Using Reality protocol:
    VLESS with Reality is significantly more resistant to blocking. As experts note: “VLESS with XTLS-Reality is currently the most reliable, and at the same time quite simple to set up” source.

  3. Multi-hop configuration:

    • Creating a chain of multiple VPN servers
    • Each additional hop increases detection complexity
  4. Changing ports:

    • Using non-standard ports (443, 8080, etc.)
    • Port 443 is often disguised as HTTPS traffic

Configuration for MTS

For MTS, the following is particularly recommended:

  • Use port 443 with HTTPS disguise
  • Configure WebSocket or gRPC transport
  • Apply obfs4 or camouflage masking

Alternative protocols and solutions

If VLESS continues to be blocked, consider alternatives:

  1. AmneziaWG:

    • Currently works on many mobile operators
    • More resistant to blocking than VLESS
  2. Shadowsocks:

    • Traditionally more resistant to traffic analysis
    • Requires a separate client
  3. Triple proxy:

    • Combination of multiple protocols
    • For example: Shadowsocks → VLESS → OpenVPN
  4. Router with OpenWRT:

    • Installing HomeProxy + OpenWRT on router
    • Complete bypass of blocking for all devices

Conclusions and recommendations

  1. Your problem is definitely related to MTS blocking, not your VLESS configuration
  2. Try changing the transport protocol to XHTTP or WebSocket
  3. Be sure to configure Reality for VLESS - this will increase the chances of it working
  4. Change the port to 443 with HTTPS disguise
  5. Consider alternative protocols if VLESS doesn’t work

For a temporary solution, you can use a combination of VPNs, but in the long term, it’s worth looking for more stable protocols or commercial VPN services that regularly update methods to bypass blocks.

Sources

  1. 2024: Problems with VLESS VPN access in Russia and how to solve them
  2. Russian authorities have learned to block VPN protocol that disguises itself as regular traffic
  3. Reliable bypass of blocking in 2024: protocols, clients and server configuration
  4. VLESS+Reality and Multi-hop: VPN chain architecture for new generation blocking
  5. Questions about VLESS blocking in Novosibirsk
  6. What to replace VPN with in 2024? Vless | Vmess | Trojan | Shadowsocks