Disguise Mozilla VPN as DNS traffic

이 문서는 더이상 관리되지 않아 오래된 내용이 있을 수 있습니다.

Internet operators sometimes try to spy on your online activity and may block your browsing traffic if they detect that you are using a VPN to encrypt your data. You can configure Mozilla VPN to operate using port 53 so that the data passing through the VPN tunnel appears as DNS traffic, which is less likely to be blocked by Internet providers.

Enabling this port could also help you bypass firewalls or captive portals that show you marketing ads in exchange for internet access.

To configure Mozilla VPN to use port 53, follow these steps:

  1. Open the Mozilla VPN.
  2. Click (or tap) the settings vpn settings icon icon.
  3. Click (or tap) Network settings.
  4. Check the Tunnel VPN through port 53/DNS option.
  5. Turn the VPN on.
    Port53VPN
Warning:
  • Since DNS is not a secure protocol, some Internet service providers may attempt to manipulate traffic that appears to be DNS. As a consequence, masking the VPN traffic as DNS data may prevent the VPN from connecting at all.
  • Port 53 and Multi-Hop cannot be used at the same time on mobile devices. If you enable both, only Multi-Hop will work.
  • If you use port 53 while connected to a hotspot, Mozilla VPN may fail to connect.

Related articles

Learn more:

문서 작성 및 변경에 도움 주신 분들

Illustration of hands

도움 주기

전문 지식을 성장시키고 다른 사람들과 공유세요. 질문에 답하고 지식 기반을 개선할 수 있습니다.

자세히 살펴보기