Are VLESS connections being blocked between Russian servers? I’ve set up a VPN with a tunnel to a Russian server using pure VLESS. The connection works via Wi-Fi but doesn’t work via mobile data (carrier MTS). Please advise, could this be related to VLESS blocking, or is it a problem with my configuration?
Your connection via Wi-Fi works, but doesn’t work via MTS mobile network is most likely due to VLESS blocking at the mobile operator level, rather than your configuration. In 2024-2025, Russian mobile operators are actively blocking VLESS traffic, especially when using mobile networks.
Table of Contents
- Why VLESS is blocked on mobile networks
- Which operators block VLESS
- Signs of operator blocking
- How to check and solve the problem
- Alternative protocols and solutions
- Conclusions and recommendations
Why VLESS is blocked on mobile networks
In 2024, Russian authorities significantly strengthened control over VPN services, including VLESS. According to research, Roskomnadzor has learned to block VPN protocols that disguise themselves as regular traffic.
VLESS uses an optimized protocol that masks traffic as HTTPS, but mobile operators, including MTS, have implemented deep packet inspection (DPI) systems capable of identifying and blocking such protocols. This is explained by the fact that:
- Operators can analyze traffic patterns, even when encrypted
- VLESS connections have distinctive features in the handshake process
- Mobile networks have stricter traffic filtering rules compared to home internet
Which operators block VLESS
Based on user reports, it can be concluded that VLESS is blocked by several major Russian operators:
- MTS: Most actively blocks VLESS, especially in regions
- MegaFon: Also applies blocking but less aggressively
- YOTA: MTS subsidiary, shows similar blocking policies
Interestingly, blocking often has a regional character. As users note: “In Novosibirsk, mobile operators MTS, MegaFon, YOTA have cut vless, no websites load, but home MTS works fine” source.
Signs of operator blocking
Based on your description and other cases, characteristic signs of VLESS being blocked specifically by a mobile operator can be identified:
- Works via Wi-Fi but not via mobile network - this is a key indicator of operator blocking
- Connection timeouts - connection simply doesn’t establish
- Complete unavailability - no websites load through VLESS
- Selectivity - sometimes one server works, another doesn’t
In your case, since the connection works through Wi-Fi, the problem is definitely not in the basic VLESS configuration, but rather in how MTS handles mobile network traffic.
How to check and solve the problem
Checking for blocking
-
Check through other networks:
- Try connecting through another mobile operator’s network
- Use a SIM card from another operator for testing
-
Testing with different servers:
- Try connecting to a server in another country
- Use servers from different hosting providers
Solutions to bypass blocking
-
Changing transport protocol:
bash# Example of changing from TCP to XHTTP in configuration transport: xhttp -
Using Reality protocol:
VLESS with Reality is significantly more resistant to blocking. As experts note: “VLESS with XTLS-Reality is currently the most reliable, and at the same time quite simple to set up” source. -
Multi-hop configuration:
- Creating a chain of multiple VPN servers
- Each additional hop increases detection complexity
-
Changing ports:
- Using non-standard ports (443, 8080, etc.)
- Port 443 is often disguised as HTTPS traffic
Configuration for MTS
For MTS, the following is particularly recommended:
- Use port 443 with HTTPS disguise
- Configure WebSocket or gRPC transport
- Apply obfs4 or camouflage masking
Alternative protocols and solutions
If VLESS continues to be blocked, consider alternatives:
-
AmneziaWG:
- Currently works on many mobile operators
- More resistant to blocking than VLESS
-
Shadowsocks:
- Traditionally more resistant to traffic analysis
- Requires a separate client
-
Triple proxy:
- Combination of multiple protocols
- For example: Shadowsocks → VLESS → OpenVPN
-
Router with OpenWRT:
- Installing HomeProxy + OpenWRT on router
- Complete bypass of blocking for all devices
Conclusions and recommendations
- Your problem is definitely related to MTS blocking, not your VLESS configuration
- Try changing the transport protocol to XHTTP or WebSocket
- Be sure to configure Reality for VLESS - this will increase the chances of it working
- Change the port to 443 with HTTPS disguise
- Consider alternative protocols if VLESS doesn’t work
For a temporary solution, you can use a combination of VPNs, but in the long term, it’s worth looking for more stable protocols or commercial VPN services that regularly update methods to bypass blocks.
Sources
- 2024: Problems with VLESS VPN access in Russia and how to solve them
- Russian authorities have learned to block VPN protocol that disguises itself as regular traffic
- Reliable bypass of blocking in 2024: protocols, clients and server configuration
- VLESS+Reality and Multi-hop: VPN chain architecture for new generation blocking
- Questions about VLESS blocking in Novosibirsk
- What to replace VPN with in 2024? Vless | Vmess | Trojan | Shadowsocks