What is a VPN service?
A VPN service like AzireVPN offers secure encrypted virtual tunnels between a device and a VPN server located in a data center from different locations. The VPN server will acts as an intermediary between you and the Internet, allowing your Internet traffic to travel to its intended destination from the VPN server.
Your device will therefore be assigned a new IP address from our service and new DNS resolvers allowing you to hide your real IP address and location, and browse the Internet with more privacy, but essentially as you did before using your naked line.
All the data sent and received is encrypted using the best ciphers suites available and is authenticated both by your client and our servers which means that the data integrity is verified after the transport in the tunnel, preventing snooping, alteration or injection by outside parties, including your ISP.
How is a VPN service useful?
You can use a VPN to:
- Hide your real IP address using a new one from our VPN service, browse the Internet with more privacy, and protect you from network attacks.
- By-pass restrictions, censorship, throttling or traffic prioritization, especially from strict Internet controlling countries.
- Access geo-restricted content, even when traveling or living abroad.
- Connect from hostile networks or public Wi-Fi, preventing snooping and stealing of personal information.
- Download or upload anonymously, without limit.
- Enjoy a better connectivity with the Internet, which can improve latency in certain cases.
- Help protect your identity as a researcher, journalist, whistle blower or any kind of sensitive position.
Which tunnels are supported and which one should I use?
We support both WireGuard and OpenVPN. WireGuard is a new promising tunnel and we recommend our users to use it, as it is more robust, faster and less bloated than OpenVPN. WireGuard is currently available on Windows, Linux, some routers using OpenWrt, Android, iOS and macOS.
Tunnels are for users who are seeking maximum privacy and security and want to encrypt all their traffic, from all applications.
You can find more information on the Tunnels page.
Which proxies are supported?
We support SOCKS5. Note that our SOCKS5 proxy is not encrypted and only works when connected to one of our tunnels beforehand. No authentication is needed when using it, the username and password fields can stay blank.
The proxies are for users who want to appear in another country on the fly, in a specific application, for example to by-pass geo-restrictions while staying connected on the same tunnel server in another location. Some applications like browsers, BitTorrent clients or instant messengers can be configured to use a proxy.
You can find more information on the Tunnels page.
What operating systems and routers are currently supported?
We are currently supporting all major operating systems and devices such as Windows, Linux, macOS, Android, iOS and some routers. We propose a variety of solutions for all these operating systems and devices, from different tunnels to different clients, covering all the needs of our users.
Our custom OpenVPN client, azclient, can be used to facilitate the installation and use of our service. We also provide a configuration generator for the users who may prefer to use the original OpenVPN client or for mobile devices and routers. We also provide a configuration generator for WireGuard and an easy to use bash script for automatically generating the configuration files on Linux.
How do I get started using your service?
It is easy to get started using our service, only a few steps are required to get going in no time. Note that you can try our service for free during 24 hours after creating your account.
- Create your account on the manager
- Try our service for free during 24 hours, choosing the tunnel your want to use. We recommand WireGuard on Windows, Linux and routers supporting OpenWRT, and OpenVPN on anything else
- Download and install a client for your tunnel, device and operating system. We recommand the use of azclient
- Connect to our service using the client of your choice
- Verify your connection to our service on the Check page
Are there any logs or is the traffic monitored?
No, we have a strong non-logging policy. We do not record or store any logs whatsoever. No traffic, user activity, timestamps, IP addresses, number of active and total sessions, DNS requests, or any other kind of logs are stored. System logs are disabled. Anonymity of our users is very important to us as described in our Terms of Service.
Moreover, our servers are running using Blind Operator mode which means we took extra security steps to ensure that we cannot monitor any traffic at all.
Finally, another important point is that we operate under Swedish jurisdiction where there are no data retention laws that apply to VPN providers. We publish a transparency report every month, available on our blog, and a Warrant Canary.
Is there any bandwidth or traffic limit?
No, we do not throttle or limit the bandwidth and do not apply any traffic limit. You can download and upload as much data as you want, on every location. We are using dedicated network links and carefully chosen providers for maximum network quality and throughput, to satisfy all of our users needs.
How long can I stay connected to your service?
You can stay permanently connected to our service. We do not impose any restriction or timeout if you do not use the connection. We encourage our users to use our service whenever they are connected in order to maximize their online privacy, including on their mobile devices.
How many devices can I connect simultaneously?
A total of five devices can be connected simultaneously, regardless of the device, operating system or tunnel. They can be connected to the same location using the same tunnel, port and protocol if wished.
It is also possible to configure our service on a router, allowing any number of devices to use the same tunnel.
If you need more than five devices connected simultaneously, please contact us to request a custom offer.
How many times can I switch locations?
You can switch locations as often as you wish, and enjoying the exact same benefits on each one of them.
Is peer‑to‑peer (P2P) and the BitTorrent protocol allowed on your servers?
Yes, BitTorrent, peer‑to‑peer and file‑sharing traffic are allowed and treated equally to any other traffic on all of our servers in all of our locations.
What locations are your servers located in?
We operate 34 VPN servers spread across 10 locations in 9 countries including: Canada, Denmark, Netherlands, Norway, Spain, Sweden, Thailand, United Kingdom and United States.
You are free to connect to any of these locations and to switch between them as many times as you want.
Each one of our server is handled under the jurisdiction of their location.
More information can be found on our roadmap about future locations, and on our status page for a complete list of the locations, their usage and availability.
Do you own the servers and how are they installed and secured?
We physically own all of our hardware, in all of our locations, including bare metal dedicated servers and switches, bringing it and installed on our own, co-located in closed racks on different data centers around the world meeting our strict security criteria, using dedicated network links and carefully chosen providers for maximum network quality and throughput. We also make sure to select locations with protective or non‑invasive laws to ensure the privacy of our customers.
They are equipped with a quad-core Intel Xeon CPU featuring special cryptographic optimizations AES-NI and 12GB of RAM for no‑compromise performance and are running in RAM without any physical hard drive disk which protect our users in case of seizure. Their software setup and installation is identical in each location, only using open-source software.
Servers are monitored 24/7 for their uptime, general usage and latencies. Users connect on them using a multiple IP addresses domain name resolution, allowing the spread of the connections on locations.
More information about our hardware infrastructure or the servers connectivity can be found in the documentation.
Do I need any special software in order to use the service?
Yes, depending of the tunnel or proxy you wish to use. Our tunnels need in the majority of cases the installation of an extra software, depending of the operating system and device used. Our custom OpenVPN client, azclient, can be used to facilitate the installation and use of our service.
Our proxies need a prior connection to one of our tunnel beforehand. Proxies are usually set up directly into the settings of software and do not need the use of special software, but may require the installation of an extension in browsers.
We propose step by step guides to help you installing OpenVPN or WireGuard on every major operating system and some routers.
Is AzireVPN working on mobile devices?
Yes, we support all major mobile operating systems and devices such as Android and iOS. WireGuard is available on Android but note that the application is still experimental and should not be used as a replacement of OpenVPN yet.
We highly recommend our users to use NAT (shared IP address) configuration files on mobile devices, both available using TCP or UDP. Usually mobile devices do not embed a firewall by default, therefore they are left open to incoming connections. Using a shared IP address protect you from incoming connections as our servers cannot know to who redirecting incoming connections as more than one person is using the same exit IP address at a time.
We provide an easy to use configuration generator for you to generate your configuration file for your mobile devices.
Do you offer dedicated IP addresses?
We do not provide dedicated IP addresses. However, we provide public IP addresses in each location. These IP addresses are assigned from a pool to only one user at the same time and have all their ports opened. The assigned IP address does not change until any disconnection from the service.
Can I send emails using the SMTP protocol on port 25?
Yes, but unencrypted outgoing port 25 TCP, usually used by the SMTP protocol, is blocked to prevent abuse by spammers. Note that the port 25 UDP is free to use.
If you need to send emails using that port, please use an encrypted mail server using TLS. The server should therefore have a domain name and a certificate generated for it. If you are not sure about the configuration of your provider, please consult their documentation or ask the administrator of the service.