VPN data transfer. VPN connection: what is it and what is a VPN channel for? VPN: term and principle of operation

The concept of private virtual networks, abbreviated as VPN (from English appeared in computer technologies recently. The creation of this type of connection made it possible to combine computer terminals and mobile devices into virtual networks without the usual wires, regardless of the location of a particular terminal. Now we’ll look at how a VPN connection works, and at the same time we’ll give some recommendations for setting up such networks and accompanying client programs.

What is a VPN?

As is already clear, a VPN is a virtual private network with several devices connected to it. You shouldn’t delude yourself - connecting two or three dozen simultaneously working computer terminals (as can be done in a local area) usually doesn’t work. This has its limitations in the network setup or even simply in the bandwidth of the router responsible for assigning IP addresses and

However, the idea initially inherent in the connection technology is not new. They tried to substantiate it for a long time. And many modern users computer networks They don’t even imagine that they have known about this all their lives, but simply did not try to delve into the essence of the issue.

How a VPN connection works: basic principles and technologies

For a better understanding, let's give the simplest example that anyone knows to modern man. Take the radio, for example. After all, in essence, it is a transmitting device (translator), an intermediary unit (repeater) responsible for the transmission and distribution of the signal, and a receiving device (receiver).

Another thing is that the signal is broadcast to absolutely all consumers, and the virtual network works selectively, combining only certain devices. Please note that in neither the first nor the second case, wires are required to connect transmitting and receiving devices that exchange data with each other.

But there are some subtleties here too. The fact is that initially the radio signal was unprotected, that is, it can be received by any radio amateur with a working device at the appropriate frequency. How does a VPN work? Yes, exactly the same. Only in in this case the role of a repeater is played by a router (router or ADSL modem), and the role of a receiver is played by a stationary computer terminal, laptop or mobile device, equipped with a special module wireless connection(Wi-Fi).

With all this, data coming from the source is initially encrypted, and only then, using a special decoder, is reproduced on specific device. This principle of communication via VPN is called tunneling. And this principle is most consistent with mobile connection, when redirection occurs to a specific subscriber.

Local virtual network tunneling

Let's understand how VPN works in tunneling mode. At its core, it involves creating a certain straight line, say, from point “A” to point “B”, when, when transferring data from a central source (router with a server connection), determining all network devices is carried out automatically according to a predetermined configuration.

In other words, a tunnel is created with encoding when sending data and decoding when receiving. It turns out that no other user who tries to intercept this type of data during transmission will be able to decrypt it.

Means of implementation

One of the most powerful tools Cisco systems provide such connections and at the same time ensure security. True, some inexperienced administrators have a question about why VPN-Cisco equipment does not work.

This is primarily due to incorrect setting and installed drivers for routers such as D-Link or ZyXEL, which require fine tuning only because they are equipped with built-in firewalls.

In addition, you should pay attention to the connection diagrams. There can be two of them: route-to-route or remote access. In the first case we're talking about on the integration of several distribution devices, and in the second, on managing the connection or data transfer using remote access.

Access protocols

In terms of protocols, configuration tools are primarily used today at the PCP/IP level, although the internal protocols for VPNs may vary.

VPN stopped working? Should look at some hidden options. For example, TCP technology-based additional PPP protocols and PPTP still belong to the TCP/IP protocol stacks, but to connect, say, in the case of using PPTP, you need to use two IP addresses instead of the required one. However, in any case, tunneling involves the transmission of data enclosed in internal protocols type IPX or NetBEUI, and all of them are equipped with special PPP-based headers to seamlessly transfer data to the corresponding network driver.

Hardware devices

Now let's look at a situation where the question arises as to why the VPN isn't working. That the problem may be related to incorrect settings equipment, of course. But another situation may also arise.

It is worth paying attention to the routers themselves, which monitor the connection. As mentioned above, you should only use devices that meet the connection parameters.

For example, routers like the DI-808HV or DI-804HV are capable of connecting up to forty devices simultaneously. As for ZyXEL equipment, in many cases it can even run through the built-in ZyNOS network operating system, but only using command line mode via the Telnet protocol. This approach allows you to configure any devices with data transmission to three networks in general environment Ethernet with IP traffic transmission, and also use unique technology Any-IP, designed to enable standard table routers with forwarded traffic as a gateway for systems that were originally configured to operate on other subnets.

What to do if VPN does not work (Windows 10 and below)?

The very first and most important condition is the correspondence of the output and input keys (Pre-shared Keys). They must be the same at both ends of the tunnel. It’s also worth paying attention to algorithms. cryptographic encryption(IKE or Manual) with or without authentication function.

For example, the same AH protocol (in English - Authentication Header) can provide only authorization without the possibility of using encryption.

VPN clients and their configuration

As for VPN clients, not everything is simple here either. Most programs based on such technologies use standard methods settings. However, there are pitfalls here.

The problem is that no matter how you install the client, if the service is turned off in the operating system itself, nothing good will come of it. That is why you first need to enable these settings in Windows, then enable them on the router (router), and only then start setting up the client itself.

You will have to create a new connection in the system itself, rather than use an existing one. We won’t dwell on this, since the procedure is standard, but on the router itself you will have to go to additional settings (most often they are located in the WLAN Connection Type menu) and activate everything related to the VPN server.

It is also worth noting the fact that it will have to be installed into the system as a companion program. But then it can be used even without manual configuration, simply by selecting the nearest location.

One of the most popular and easiest to use is VPN client-server called SecurityKISS. The program is installed, but then you don’t even need to go into the settings to ensure normal communication for all devices connected to the distributor.

It happens that the fairly well-known and popular Kerio package VPN Client does not work. Here you will have to pay attention not only to the operating system itself, but also to the parameters of the client program. As a rule, entering the correct parameters allows you to get rid of the problem. As a last resort, you will have to check the settings of the main connection and the TCP/IP protocols used (v4/v6).

What's the result?

We looked at how a VPN works. In principle, there is nothing complicated about connecting or creating networks of this type. The main difficulties lie in setting up specific equipment and setting its parameters, which, unfortunately, many users overlook, relying on the fact that the whole process will be reduced to automation.

On the other hand, we were now more concerned with issues related to the operating technology of the virtual VPN networks, so you will have to configure the equipment, install device drivers, etc. using separate instructions and recommendations.

VPN ( Virtual Private Network) or translated into Russian virtual private network is a technology that allows you to combine computer devices into secure networks to provide their users with an encrypted channel and anonymous access to resources on the Internet.

In companies, VPN is used mainly to unite several branches located in different cities or even parts of the world into one local network. Employees of such companies, using a VPN, can use all the resources that are located in each branch as if they were their own local resources, located nearby. For example, print a document on a printer located in another branch in just one click.

For ordinary users Internet VPN useful when:

  • the site has been blocked by the provider, but you need to log in;
  • you often need to use online banking and payment systems and want to protect your data from possible theft;
  • the service only works for Europe, but you are in Russia and don’t mind listening to music on LastFm;
  • you want the sites you visit not to track your data;
  • There is no router, but it is possible to connect two computers to a local network to provide both with access to the Internet.

How VPN works

Virtual private networks work through a tunnel they establish between your computer and remote server. All data transmitted through this tunnel is encrypted.

It can be imagined as an ordinary tunnel, which is found on highways, only laid through the Internet between two points - a computer and a server. Through this tunnel, data, like cars, rushes between points at the highest possible speed. At the input (on the user’s computer), this data is encrypted and goes in this form to the recipient (to the server), at this point it is decrypted and interpreted: a file is downloaded, a request is sent to the site, etc. After which the received data is encrypted again server and are sent through the tunnel back to the user’s computer.

For anonymous access To access sites and services, a network consisting of a computer (tablet, smartphone) and a server is sufficient.

IN general view data exchange via VPN looks like this:

  1. A tunnel is created between the user’s computer and the server with installed software for VPN creation. For example OpenVPN.
  2. In these programs, a key (password) is generated on the server and computer to encrypt/decrypt data.
  3. A request is created on the computer and encrypted using the previously created key.
  4. Encrypted data is transmitted through the tunnel to the server.
  5. The data coming from the tunnel to the server is decrypted and the request is executed - sending a file, logging into the site, starting the service.
  6. The server prepares the response, encrypts it before sending it, and sends it back to the user.
  7. The user's computer receives the data and decrypts it with the key that was generated earlier.

Devices included in a virtual private network are not geographically tied and can be located at any distance from each other.

For the average user of virtual private network services, it is enough to understand that logging onto the Internet through a VPN is complete anonymity and unlimited access to any resources, including those that are blocked by your provider or are not available in your country.

Who needs a VPN and why?

Experts recommend using a VPN to transfer any data that should not end up in the hands of third parties - logins, passwords, private and work correspondence, work with Internet banking. This is especially true when using open points access -- WiFi at airports, cafes, parks, etc.

The technology will also be useful for those who want to freely access any sites and services, including those blocked by the provider or open only to a certain circle of people. For example, Last.fm is available for free only to residents of the USA, England and a number of others European countries. Use music service from Russia will allow connection via VPN.

Differences between VPN and TOR, proxy and anonymizers

VPN works globally on the computer and redirects everything through the tunnel. software installed on the computer. Any request - via chat, browser, client cloud storage(dropbox), etc., before reaching the recipient, it goes through a tunnel and is encrypted. Intermediate devices “mix the tracks” through encrypting requests and decrypt it only before sending it to the final destination. The final recipient of the request, for example, a website, records not the user’s data - geographic location, etc., but the VPN server data. That is, it is theoretically impossible to track which sites the user visited and what requests he transmitted over a secure connection.

To some extent, anonymizers, proxies and TOR can be considered analogues of VPNs, but they all lose in some way to virtual private networks.

What is the difference between a VPN and TOR?

Like VPN, TOR technology involves encrypting requests and transmitting them from the user to the server and vice versa. Only TOR does not create permanent tunnels; the paths for receiving/transmitting data change with each access, which reduces the chances of intercepting data packets, but not in the best possible way affects the speed. TOR is free technology and supported by enthusiasts, so expect stable operation no need to. Simply put, you will be able to access a site blocked by your provider, but it will take several hours or even days for HD video to load from it.

What is the difference between a VPN and a proxy?

Proxy, similar to VPN, redirects the request to the site, passing it through intermediary servers. It’s not difficult to intercept such requests, because the exchange of information occurs without any encryption.

What is the difference between a VPN and an anonymizer?

Anonymizer is a stripped-down version of proxy, capable of working only within open tab browser. You can use it to access the page, but you won’t be able to use most of the features, and no encryption is provided.

In terms of speed, proxy will win among the methods of indirect data exchange, since it does not provide for encryption of the communication channel. In second place is VPN, which provides not only anonymity, but also protection. Third place goes to the anonymizer, limited to working in open window browser. TOR is suitable when you don’t have the time or ability to connect to a VPN, but you shouldn’t count on high-speed processing of large requests. This gradation is valid for the case when non-grid servers are used, located at the same distance from the one being tested.

How to connect to the Internet via VPN

In RuNet, VPN access services are offered by dozens of services. Well, there are probably hundreds all over the world. Basically all services are paid. The cost ranges from a few dollars to several tens of dollars per month. Specialists who have a good understanding of IT create a VPN server for themselves, using servers provided by various hosting providers for these purposes. The cost of such a server is usually about $5 per month.

Prefer paid or free solution depends on requirements and expectations. Both options will work - hide the location, replace the IP, encrypt data during transmission, etc. - but problems with speed and access in paid services occur much less frequently and are resolved much faster.

Tweet

Plus

Please enable JavaScript to view the

In this article we will answer the most FAQ what is a VPN server, we will tell you whether a VPN can increase your security, whether you need to use Double VPN and how to check whether the VPN service keeps logs, as well as what modern technologies exist to protect personal information.

VPN is a virtual private network that provides encryption between the client and the VPN server.


The main purpose of a VPN is to encrypt traffic and change the IP address.

Let's figure out why and when this is needed.

Why do you need a VPN?

All Internet providers log the activities of their clients on the Internet. That is, the Internet provider knows which sites you visited. This is necessary in order to provide all information about the violator in case of requests from the police, and also to relieve oneself of all legal responsibility for the user’s actions.

There are many situations when a user needs to protect his personal data on the Internet and gain freedom of communication.

Example 1. There is a business and it is necessary to transmit confidential data over the Internet so that no one can intercept it. Most companies use VPN technology to transfer information between company branches.

Example 2. Many services on the Internet operate on a geo-referenced basis and prohibit access to users from other countries.

For example, the Yandex Music service only works for IP addresses from Russia and other countries former CIS. Accordingly, the entire Russian-speaking population living in other countries does not have access to this service.

Example 3. Blocking certain sites in the office and in the country. Offices often block access to social networks so that employees do not spend work time for communication.

For example, in China many are blocked Google services. If a Chinese resident works with a company from Europe, then there is a need to use services such as Google Disk.

Example 4: Hide visited sites from your ISP. There are times when you need to hide the list of visited sites from your Internet provider. All traffic will be encrypted.


By encrypting your traffic, your ISP won't know what sites you've visited on the Internet. In this case, your IP address on the Internet will belong to VPN country server.

When you connect to a VPN, a secure channel is created between your computer and the VPN server. All data in this channel is encrypted.


With a VPN, you will have freedom of communication and protect your personal data.

In the logs of the Internet provider there will be a set different characters. The picture below shows an analysis of the data obtained by a special program.

The HTTP header immediately shows which site you are connecting to. This data is recorded by Internet service providers.


The following picture shows the HTTP header when using a VPN. The data is encrypted and it is impossible to find out which sites you visited.

How to connect to a VPN

There are several ways to connect to a VPN network.

  • PPTP is an obsolete protocol. Most modern operating systems have excluded it from the list of supported ones. Disadvantages of PPTP - low connection stability. The connection may fail and unprotected data may leak onto the Internet.
  • L2TP (IPSec) connection is more reliable. Also built into most operating systems(Windows, Mac OS, Linux, iOS, Android, Windows Phone and others). Is different better reliability unlike PPTP connections.
  • SSTP connection was developed relatively recently. It is only supported on Windows, so it is not widely used.
  • IKEv2 is a modern protocol based on IPSec. This protocol has replaced the PPTP protocol and is supported by all popular operating systems.
  • OpenVPN connection is considered the most reliable. This technology can be flexibly adjusted even in case of a fall. OpenVPN connections blocks sending unprotected data to the Internet.

There are 2 data transfer protocols for OpenVPN technology:

  • UDP protocol – is fast (recommended for use) VoiP telephony, Skype, online games)
  • TCP protocol – characterized by the reliability of transmitted data (requires confirmation of receipt of the packet). Slightly slower than UDP.

How to set up a VPN

Setting up a VPN connection takes a few minutes and varies VPN way connections.

On our service we use PPTP and OpenVPN connections.

Security of working with a VPN program

We will always talk about integrated approach to safety. User security consists of more than just the VPN connection itself. It is important what program you use to connect to the VPN server.

Currently, services offer convenient VPN clients - these are programs that make it easier to set up a VPN connection. We ourselves offer convenient VPN client. Thanks to such programs, setting up a VPN connection takes no more than 1 minute.


When we first started providing VPN services in 2006, all of our users set up the official OpenVPN application. It has an open source. Of course, setting up the official OpenVPN client takes longer. But let's figure out what is better to use in terms of anonymity.

VPN client anonymity

We see the danger in using such programs. The thing is that the source code of such programs is the property of the company and in order to preserve the uniqueness of its program, no one publishes it.

Users cannot find out what data the program collects about you in the absence of open source code.

VPN programs and can identify you as a specific user even when the logs on the server are turned off.

Any program can have the functionality to record the sites you have visited and your real IP address. And since you enter your login into the program yourself, it is impossible to talk about any anonymity in using the program at all.

If your activity needs high level anonymity, we recommend that you abandon such VPN programs and use the official open source OpenVPN release.

At first you will find this inconvenient. But over time, you will get used to it if the factor of security and anonymity comes first for you.

We guarantee that Secure Kit does not store any data about you. But we must warn you that similar programs may be spying on you.

Another idea on how to increase your security came from the point of view of the geographical location of servers. On the Internet it is called an offshore VPN.

What is an offshore VPN

Different countries have different levels legislation. There are strong states with strong laws. And there are small countries whose level of development does not allow information security data in your country.

Initially, the concept of offshore was used to designate a country in which tax policy was relaxed. Such countries have very low business taxes. Global companies have become interested in legal tax avoidance in their country, and offshore bank accounts in the Cayman Islands have become very popular.

Currently, many countries around the world already have bans on the use of bank accounts in offshore countries.

Most offshore countries are small states located in remote corners of the planet. Servers in such countries are more difficult to find and are more expensive due to the lack of developed Internet infrastructure. VPN servers in such countries began to be called offshore.

It turns out that the word offshore VPN does not mean anonymous VPN, but only speaks of territorial affiliation with an offshore state.

Should you use an offshore VPN?

Offshore VPN presents additional benefits from an anonymity point of view.

Do you think it’s much easier to write an official request:

  • to a police department in Germany
  • or the Islands Police Department in Antigua Barbuda

Offshore VPN is an additional layer of protection. An offshore server is good to use as part of a Double VPN chain.

There is no need to use only 1 offshore VPN server and think that this complete security. You need to approach your security and anonymity on the Internet from different angles.

Use an offshore VPN as a link to your anonymity.

And it's time to answer the most frequently asked question. Can an anonymous VPN service keep logs? And how to determine whether the service keeps logs?

Anonymous VPN service and logs. What should I do?

An anonymous VPN service should not keep logs. Otherwise, it can no longer be called anonymous.

We have compiled a list of questions, thanks to which you can accurately determine whether the service keeps logs.

Now you have full information about VPN connections. This knowledge is enough to make yourself anonymous on the Internet and make safe transfer personal data.

New VPN technologies

Are there any new trends in the VPN space?

We have already talked about the pros and cons of sequential cascading VPN servers(Double, Triple, Quad VPN).

To avoid the disadvantages of Double VPN technology, you can make a parallel cascade of chains. We called it Parallel VPN.

What is Parallel VPN

The essence of Parallel VPN is to direct traffic to a parallel data channel.

The disadvantage of sequential cascading technology (Double, Triple, Quad VPN) is that on each server the channel is decrypted and encrypted into the next channel. Data is consistently encrypted.

There is no such problem with Parallel VPN technology, since all data undergoes double parallel encryption. That is, imagine an onion that has several peels. In the same way, data passes through a channel that is double encrypted.

VPN (Virtual Private Network) is a virtual private network.

In common parlance, a VPN is a completely secure channel that connects your Internet-enabled device to any other device on the world wide web. To put it even simpler, we can imagine it more figuratively: without connecting to a VPN service, your computer (laptop, phone, TV or any other device) when accessing the network is like a private house not fenced. At any moment, anyone can intentionally or accidentally break trees or trample the beds in your garden. WITH using a VPN your home turns into an impregnable fortress, the defense of which will simply be impossible to break.

How it works?

Principle of operation VPN simple and “transparent” to the end user. The moment you go online, a virtual “tunnel” is created between your device and the rest of the Internet, blocking any attempts from the outside to penetrate inside. For you, the work of the VPN remains absolutely “transparent” and invisible. Your personal business correspondence, Skype or telephone conversations will in no way be intercepted or eavesdropped. All your data is encrypted using a special encryption algorithm, which is almost impossible to crack.

In addition to protection from external intrusion, VPN provides the opportunity to virtually visit any country in the world for a while and use network resources these countries, view TV channels, which were previously unavailable. VPN will replace your IP address with any other one. To do this, you will just need to select a country from the proposed list, for example the Netherlands, and all sites and services that you visit will automatically “think” that you are in this particular country.

Why not an anonymizer or proxy?

The question arises: why not just use some kind of anonymizer or proxy server on the network, because they also replace the IP address? Yes, everything is very simple - none of the above-mentioned services provide protection, you still remain “visible” to attackers, and therefore all the data that you exchange on the Internet. And, in addition, working with proxy servers requires you to have a certain ability to set precise settings. VPN works according to to the following principle: “Plug and play”, none additional settings he doesn't demand. The entire connection process takes a couple of minutes and is very simple.

About free VPNs

When choosing, you should remember that free VPNs almost always have restrictions on the amount of traffic and data transfer speed. This means that a situation may arise when you simply cannot continue to use the free VPN. Don't forget that free VPNs They are not always stable and are often overloaded. Even if your limit has not been exceeded, data transfer may take a long period of time due to the high load on the VPN server. Paid services VPN is great throughput, no restrictions on both traffic and speed, and the level of security is higher than that of free ones.

Where to begin?

Most VPN services provide the opportunity to test quality for free for a short period. The testing period can be from several hours to several days. During testing, you usually get full access to all functionality VPN service. Our service makes it possible to find such VPN services link:

Today, Internet users increasingly use the term VPN. Some recommend using it more often, while others recommend avoiding it. Let's take a closer look at what is hidden behind this term.

VPN connection, what is it?

VPN(Virtual Private Network) is technology, which provides closed from external access contact if available high speed connections. This connection is carried out according to the principle “ dot - dot" In science, this connection method is called tunnel. You can join the tunnel at PC with any OS, wherein VPN client installed. This program "forwards" virtual port using TCP/IP to another network.

To implement such a connection, you need a platform that quickly scales and ensures data integrity and confidentiality.

In order for the PC to IP address 192.168.1.1-100 connected through the gateway to external network, you need to set connection rules on the router. When a VPN connection is made, the message header contains the address of the remote PC. The message is encrypted by the sender and decrypted by the recipient using a shared key. After this, a secure connection is established between the two networks.

How to connect a VPN

A brief diagram of the protocol's operation was previously described. Now we’ll find out how to connect a client on a specific device.

On a computer and laptop

Before you set up VPN connection to Windows 7 PC, should specify IP address or server name. To do this in " Network Sharing Center" on " Control panels" need to " Create a new connection».

Select item "" - " (VPN)».

At the next stage you should specify Name And server address.

You need to wait for the connection to complete.

Let's check the VPN connection. To do this in " Control Panel" In chapter " Network connections » call context menu, double click by label.

On the " Details" need to check IPv4 address. It must be within the IP range specified in the VPN settings.

On your phone, iPhone or tablet

Now let's look at how to create a VPN connection and configure it on gadgets running Android OS.

For this you need:

    smartphone, tablet; login, network password; server address.

To set up a VPN connection, you need to select “” in your phone settings and create a new one.

An icon with a new connection will appear on the screen.

The system requires a login and password. You need to enter the parameters and select the "" option. Then at the next session you will not have to confirm these data again.

Once the VPN connection is activated, a characteristic icon will appear on the toolbar.

If you click on the icon, the connection details will appear.

How to set up a VPN to work correctly

Let's take a closer look at how to automatically configure VPN on computers with Windows 10 OS.

Go to PC settings.

In chapter " Options"go to the subsection "".

... and add a new VPN connection.

On next page you should specify the VPN connection parameters:

    Service provider - Windows;Connection name;Server address;VPN type;Username and password.

Once the connection is established, you need to connect to it.

How to create a VPN server

All providers record the activities of their clients. If you receive a request from law enforcement they will provide complete information about which sites the offender visited. Thus, the provider relieves itself of all legal liability. But sometimes situations arise in which the user needs to protect his data:

    Companies transmit their data via the Internet via an encrypted channel. Many services on the Internet operate based on geographic location. For example, the Yandex.Music service operates only on IP from the Russian Federation and CIS countries. A Russian living in Europe will not be able to listen to his favorite music. In offices, access to social networks is often blocked.
You can, of course, clear your browser history every time you visit a site. But it’s easier to create and configure a VPN server. To do this, you should call command line (Win+R), and then enter your query ncpa.cpl and press Enter. In a new window click Alt and select "".

Next you need to create a user and give him limited rights only to VPN. You will also have to come up with a new long password. Select a user from the list. At the next stage you need to select the connection option " Through the Internet" Next you need to specify the connection parameters. If you don’t need access to files and folders when working with a VPN, you can uncheck all the boxes and click on the “” button.

How to use a VPN

After a new connection has been created, all you need to do is open the browser and load any page. Beginners can skip creating the connection and immediately download the VPN client from the Internet or install a special extension in the browser. After downloading the program, you need to launch it and click the “ Connect" The client will join another network and the user will be able to view sites prohibited in his region. Disadvantage this method is that the IP is issued automatically. The user cannot select a country. But the connection is set up very quickly, by pressing just one button. The option of adding an extension also has disadvantages. Firstly, the user must be registered on the official website of the program, and secondly, the extension often crashes. But the user can choose the country through which the connection to the external network will be made. The connection process itself also does not raise any questions. Just press the button " Start" and the browser will reboot to new network. Let's look at how to install the extension using an example ZenMate VPN.Download the program from the official website. After installation, the following icon will appear in the browser:

Click on the icon. The extension window will appear:

If you move the mouse cursor to icon with the Russian flag, then the screen will display current IP. If you move the cursor over the icon with the Romanian flag, the IP of the selected server will appear. If desired, you can change the connection country. To do this, click on the globe and select one of the automatic addresses.

Disadvantage free version programs are a small number available servers and solicitation of advertising.

The most common mistakes

Various antivirus programs, and firewalls may block the connection. In this case, an error code is displayed on the screen. Let's look at the most popular problems and ways to solve them.
Error Cause Solution
678 Encryption is not allowed in the OS You need to open the command line and check the “ProhibitIpSec” parameter in the registry “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters”. It should be equal to 0. If the provider itself uses an encryption channel to provide services, then changing this setting will affect Internet access.
691 Incorrect login/password entered You need to log in to the network again
692 Firewall Error Disable your firewall
720/738 User is already connected Error 720 occurs only on Windows 7. All other operating systems display code 738. If you have to work from different PCs through one client, then you need to create several user names.
734 Automatic VPN You need to change the connection type from “Automatic” to “L2TP IPSec VPN” in the connection properties. If the error does not disappear, you need to re-create the connection.
766/781 Key not saved/not entered Open the VPN properties, on the “Security” tab, select “ Extra options"and in the new window enter the key
768/789 (Windows 7, Vista, XP) IPSec doesn't work RMB on the shortcut “My Computer” - “Management”. In the “Services” section, select “IPSec”. Set the connection type to Auto.