Xray-examples/VLESS-TCP-XTLS-Vision/config_client.json
lk29 cebb145398
add ENGLISH translate (#133)
* add translate ENGLISH version README.md

* Update README.md add link README.ENG.md

* Update config_server.json - translation of comments into english

* Update config_client.json translation of comments into english

* Update config_server.json translation of comments into english

* Update config_client.json, translation of comments into english

* Update config_server.json translation of comments into english
2023-03-11 20:37:52 -05:00

94 lines
2.9 KiB
JSON

{
"log": {
"loglevel": "warning"
},
"routing": {
"domainStrategy": "IPIfNonMatch",
"rules": [
{
"type": "field",
"domain": [
"geosite:cn",
"geosite:private"
],
"outboundTag": "direct"
},
{
"type": "field",
"ip": [
"geoip:cn",
"geoip:private"
],
"outboundTag": "direct"
}
]
},
"inbounds": [
{
"listen": "127.0.0.1", // Fill in 0.0.0.0 to allow connections from LAN
"port": 10808, // local socks listening port
"protocol": "socks",
"settings": {
"udp": true
},
"sniffing": {
"enabled": true,
"destOverride": [
"http",
"tls"
]
}
},
{
"listen": "127.0.0.1", // Fill in "0.0.0.0" to allow connections from LAN
"port": 10809, // Local http listening port
"protocol": "http",
"sniffing": {
"enabled": true,
"destOverride": [
"http",
"tls"
]
}
}
],
"outbounds": [
{
"protocol": "vless",
"settings": {
"vnext": [
{
"address": "", // Address, domain name or IP of the server
"port": 443, // Port, consistent with the server
"users": [
{
"id": "", // User ID, consistent with the server
"encryption": "none",
"flow": "xtls-rprx-vision"
}
]
}
]
},
"streamSettings": {
"network": "tcp",
"security": "tls",
"tlsSettings": {
"serverName": "", // SNI, if "address" is filled with the domain name of the server, it can be left blank. If "address" is filled with the IP of the server, fill in the domain name contained in the certificate of the server here
"allowInsecure": false,
"fingerprint": "chrome" // Used to configure the fingerprint of the specified TLS Client Hello, Xray will simulate the TLS fingerprint through the uTLS library, or generate it randomly
}
},
"tag": "proxy"
},
{
"protocol": "freedom",
"tag": "direct"
},
{
"protocol": "blackhole",
"tag": "block"
}
]
}