3X UI is a functional web panel for managing VPN servers that supports multiple protocols such as VMess, VLESS, ShadowSocks, and WireGuard. This tool makes it easy to configure and control VPN connections, manage multiple users, and set traffic, expiration, and IP address limits. With support for automatic SSL certificate management and other features, 3X UI is suitable for both experienced and novice users.
Supported protocols
This is a proprietary protocol for communication within the V2Ray project, specifically designed to bypass network restrictions and ensure privacy. This protocol supports both TCP and UDP traffic, making it versatile. One of VMess’s key features is its use of encryption and obfuscation to conceal data transmitted between the client and server, significantly complicating traffic detection by ISPs.
This is an alternative version of the VMess protocol, created to simplify and enhance efficiency. Unlike VMess, VLESS does not have built-in encryption and authentication, reducing server load and making it more performant. Encryption and obfuscation in VLESS are implemented at a higher level, allowing users more flexibility in configuring their connections. VLESS has gained popularity due to its lightweight nature and ability to handle a large number of simultaneous connections, which is especially important for large deployments and high-traffic networks.
This is a protocol that mimics regular HTTPS connections to disguise the use of a proxy server. Since Trojan uses the standard port 443 and supports TLS, its traffic is nearly indistinguishable from regular web traffic operating over HTTPS. This makes Trojan an excellent choice for bypassing DPI (Deep Packet Inspection) and other network monitoring technologies.
This lightweight, high-performance proxy protocol was originally developed to bypass internet censorship in China. It uses data encryption methods to conceal traffic from ISPs and firewalls. Shadowsocks is popular for its speed, ease of setup, and high degree of privacy. It is supported on most modern devices and operating systems, including Windows, macOS, Linux, iOS, and Android. Due to its efficiency and ease of use, Shadowsocks has become one of the most popular tools for bypassing internet censorship worldwide.
This is a unique protocol in the V2Ray ecosystem that can be described as a “portable tunnel.” Its main function is to redirect all traffic passing through a specified port to a given address and port. This means Dokodemo-door can be used to intercept and redirect any incoming traffic to another server, such as for creating application-based routing or for redirecting traffic through a proxy server. This protocol is particularly useful for creating flexible and complex network traffic schemes.
This is a session-level proxy protocol designed to forward data between a client and server via an intermediary. The SOCKS protocol is used for various types of traffic, including TCP and UDP, making it a versatile tool for internet work. SOCKS can hide IP addresses and allow users to bypass regional restrictions or content filters. Unlike HTTP proxies, which can only work with HTTP and HTTPS traffic, SOCKS proxies can transmit any kind of data, making them ideal for applications requiring more flexibility and privacy.
This is the simplest and most widely used type of proxy server, operating exclusively with HTTP and HTTPS traffic. HTTP proxies can be used for caching data, bypassing content filters, and anonymizing user traffic. When a request is sent through an HTTP proxy, the server can intercept, modify, or redirect it, allowing for resource access control and reduced network load. However, unlike other protocols such as SOCKS or Trojan, HTTP proxies are limited in functionality and less resilient to monitoring.
This is a relatively new VPN protocol that is rapidly gaining popularity due to its speed, simplicity, and security. It was developed with a focus on minimalism and ease of use, making it significantly faster and more performant compared to older VPN protocols like OpenVPN and IPSec. WireGuard uses modern cryptographic algorithms and operates at the kernel level of the operating system, ensuring minimal latency and high throughput. Thanks to its efficiency and ease of setup, WireGuard is becoming the default choice for many VPN services and users who value speed and security.
A server with the following minimum configuration is suitable for installing the panel:
Enter y to confirm that you want to change the panel settings before installation (for added security). Then, you need to specify the username (login) that will be used for authorization.
Similarly, specify the user password, the panel port (we recommend using a non-standard one), and the web path to the panel site (the panel link will look like ip:port/web-path).
If you see a similar message, the installation was successful.
Web panel setup
Go to the link serverip:port/web-path
// In our case, it is 194.87.25.161:3579/mysecret
Log in using the username and password specified earlier. Go to the “Inbounds” page, then use the “Add inbound” button to create a new connection.
In the open window, you can specify any connection name in the “Remark” field. It won’t affect anything, but will be conveniently displayed in the panel.
Below, select the Security type - Reality. Set uTLS - chrome. By default, yahoo.com is used as a domain for hiding (masking), but we recommend specifying other values, such as dl.google.com:443 in the “Dest” field and dl.google.com in the “SNI” field.
Click Get New Cert to automatically generate random keys.
Use the Create button to save and create the connection. After that, you will see the created connection; use the plus button to display additional settings.
Click on the QR code.
In the open window, you can scan the QR code with your phone or click on it from the computer to copy the connection code.
After installing and launching the program, use the “New Profile” button and click “Add From Clipboard” to paste the authorization code from the clipboard. Before that, make sure you copied it by clicking on the QR code.
Then you can press the large button in the center to establish a connection to the proxy server.
The connection is successfully established! You can start using it.
Mobile app
As mentioned earlier, for Android, you can use the Hiddify app. However, it is not available in the App Store. For iPhone, we recommend installing V2Box.
The setup is just as simple. Just go to the Configs section and scan the QR code. The configuration will be added to the app.