База выживания VPN 3X-UI VLESS на 2026 год. Фишки, которые тебя спасут!

База выживания VPN 3X-UI VLESS на 2026 год. Фишки, которые тебя спасут!

Introduction to the 3xi Panel in 2026

Overview of the Video Content

  • The video focuses on the 3xi panel and its functionalities for the year 2026, addressing complexities in protocol operations and transport systems.
  • A recent Telegram post prompted audience engagement regarding interest in a comprehensive video that consolidates information from 2025.

Key Features Discussed

  • The presenter will demonstrate how to implement a cascading method using two servers, explaining its advantages. Different protocols and transports will be explored.
  • Techniques for hiding the panel behind an S-tunnel are introduced, ensuring it remains accessible only within a local network while being invisible online.

Exploring LSer and Port Hopping

Functionality Insights

  • LSer is highlighted as a tool for scanning subnets instead of relying on standard search engines like Google, aiming for faster connections.
  • Port hopping is discussed as a strategy to use port 443 effectively while avoiding detection by appearing similar to other users; traffic can be routed internally to different ports as needed.

Documentation and Resources

Accessing Valuable Information

  • The presenter mentions creating documentation accompanying each video, which includes extensive resources on various protocols, routers, VPN setups, proxies, and DNS configurations totaling over 3.5 GB of data with more than 1,500 pages of instructions.
  • Viewers are encouraged to support the channel financially in exchange for access to this valuable documentation file while noting that all video content will remain free and open-access.

Setting Up VPS Servers

Recommendations for Hosting Services

  • A disclaimer about potential issues with current protocols suggests switching transports if necessary; specific VPS hosting recommendations are provided based on reliability and performance metrics.
  • The presenter emphasizes selecting VPS locations strategically (e.g., Finland or Poland) based on latency tests conducted recently; these countries offer optimal performance according to personal checks made by the presenter.

Conclusion of Setup Process

  • Instructions include choosing payment periods (monthly or yearly) along with promotional codes available through links shared throughout the video description for discounts on services used during setup processes.

Overview of Server Options and Configuration

Choosing the Right Server Plan

  • The discussion begins with a comparison of server plans, highlighting that for up to 10 devices, a promotional plan is usually sufficient. However, for more than 10 devices, a micro plan with dual-core CPU is recommended to avoid performance issues like freezes and lags.

Importance of Backup Solutions

  • The speaker emphasizes the significance of backup options in server plans. The first tier charges for backups (45 rubles per copy), while the second tier offers them for free, which can prevent data loss during server access issues.

Payment and Account Management

  • Users are advised to pay using Russian bank cards to ensure smooth transactions and avoid service interruptions due to missed payments. This method allows users to set up automatic monthly payments.

Setting Up Servers

  • After ordering servers, they will be ready within 5-10 minutes depending on configuration. The initial setup involves configuring panels in Finland and Russia, which will be linked together.

Using Terminal for Configuration

  • To manage servers effectively, the use of terminal software is recommended. It provides an easy interface for setting up port hopping and other configurations necessary for VPN services.

Adding Hosts in Terminal

  • Instructions are provided on how to add hosts in the terminal application by copying IP addresses and using 'root' as the password. Caution is advised against unnecessary installations on critical infrastructure servers.

This structured summary captures key insights from the transcript while providing timestamps for easy reference back to specific parts of the video content.

Connecting to the Server

Initial Connection Steps

  • The process begins with copying and pasting necessary information, leading to a "connect" button appearing for server connection.
  • A reference is made to an instructional guide created over a year ago, which remains relevant for current procedures.

Installation of XY Panel

  • The speaker discusses installing the XY panel with self-signed certificates, emphasizing its purpose for HTTPS traffic encryption without needing a domain.
  • Instructions are provided on using keyboard shortcuts (Ctrl + Shift V/C) for copying and pasting in the terminal during installation.

Customization and Key Generation

  • Users are prompted whether they want to customize their panel; opting out leads to automatic generation of public/private keys stored on the server.
  • Recommendations are made for saving login credentials securely using Notepad+, highlighting personal preferences in tools.

Accessing the Panel

Methods of Access

  • Two methods are outlined for accessing the panel: directly via a link or through command line instructions as described in previous documentation.

Security Considerations

  • The speaker suggests entering commands post-installation to obscure access points from potential snoopers, enhancing security measures.

Local Network Configuration

Testing Local Access

  • Attempts to access the server externally fail due to network restrictions; local network configurations are then discussed.
  • A new port is created named "Finland," specifying both local and remote ports while ensuring proper binding addresses.

Successful Connection Confirmation

  • After configuring local settings, successful access to the panel is confirmed without requiring SSL certificates, marking it as a secure method.

Implementing Security Certificates

Certificate Setup Process

  • The speaker guides users through setting up security certificates within settings, reiterating steps similar to those previously mentioned.

Finalizing Secure Connections

  • Once permissions are granted after certificate installation, HTTPS encryption is established alongside tunnel protection for enhanced security.

Subscription Considerations

Subscription Limitations

  • Discussion around subscription features highlights that they often require a domain; self-signed certificates may lead clients not wanting to connect due to trust issues.

Client Configuration and Server Setup

Client Settings and Subscription Overview

  • Clients like Vita often have an option to ignore the SSL certificate, allowing for smoother connections. Experimentation is encouraged in this context.
  • The process of finding an optimal server within subnets is discussed, emphasizing the importance of creating a new connection after clearing previous settings.

Protocol Selection

  • Recommended protocols include VS, VMS, Tran, and Shadow Socks. The primary goal is to ensure that configurations are distinct from one another.
  • A guide on using a scanner program to identify domains within your subnet is provided, highlighting the need for Python installation.

Scanner Setup Instructions

  • Steps for setting up the Reality Scanner involve downloading Python and placing necessary files in a designated folder structure on your C drive.
  • Instructions for navigating to the scanner directory via PowerShell are given, including how to configure IP addresses and ports.

Scanning Process

  • After executing the scan command in PowerShell, results populate a text file with available domains within proximity in the subnet.
  • Users can select preferred domains (e.g., GitHub), with flexibility in choosing their own domain names as well.

Configuration Testing

  • Important settings such as transport protocol selection (TCP or GRPC) are highlighted; users should be aware of potential issues with TCP connectivity.
  • Emphasis on testing configurations post setup reveals nuances that may affect functionality based on external proxy requirements.

Connecting and Testing Server Configurations

External Proxy Considerations

  • The necessity of specifying an external proxy IP address during configuration is stressed to avoid local host connection issues when scanning QR codes.

Connection Success Indicators

  • Successful connection attempts are demonstrated using various clients capable of handling different transport protocols. Auto-update features enhance user experience during testing.

Performance Observations

  • Despite distance from servers affecting speed tests, satisfactory performance metrics (e.g., 50 Mbps download speeds noted).

Flexibility in Protocol Usage

  • Users are encouraged to experiment with different protocols (UTS, SNI), ensuring unique configurations that stand out from others while maintaining effective connectivity.

Server Configuration Management

Creating Multiple Configurations

  • Guidance on creating multiple client configurations simultaneously aims at streamlining future access without repetitive setups.

How to Manage Server Connections and Settings

Exporting Keys and QR Codes

  • The process begins with exporting keys or QR codes for devices, allowing easy access and management.
  • Users can rename accounts for specific servers, such as a Russian server, enhancing organization.

Server Connection Chain

  • A connection chain is established where the Russian server connects to a Finnish server, facilitating data exchange.
  • Emphasis on avoiding repeated logins by configuring essential settings in advance, except for port forwarding.

Installation Process

  • The installation of necessary panels on the first server is discussed; issues with password entry are addressed.
  • The importance of choosing between TCP or HTTP protocols for connections is highlighted.

Downloading Scripts and Certificates

  • Users are advised to download scripts while managing expectations regarding internet speed.
  • Instructions are provided on how to copy access details without using command lines.

Resetting Passwords and Access Paths

  • Guidance is given on resetting passwords through the XUI command menu, addressing common user challenges.
  • New paths for accessing panels are generated after resetting passwords, ensuring users can regain access easily.

Configuring Local Access

  • Steps to configure local IP addresses (127.0.0.1) for panel management are outlined, emphasizing security measures.
  • Users may lose external access after setting up local configurations but can quickly adjust settings back if needed.

Finalizing Server Setup

  • Instructions include naming new connections and selecting appropriate ports for optimal performance.
  • The video concludes with creating inbound rules while recommending against using port 443 due to potential conflicts.

Methodology for Server Connection

Choosing the Right Protocol

  • The discussion begins with the suggestion to use HTP or JRPC, noting that TCP is generally more suitable for regular clients.
  • A decision is made to replace Google with Yandex in their configuration, indicating a focus on specific regional services.

Establishing Connections

  • The speaker emphasizes the importance of obtaining the correct IP address (15213) and mentions copying it to ensure connectivity.
  • Confirmation of successful connection to a VPS server is noted, highlighting that they are using a Finnish IP address instead of a Moscow one.

Configuration Settings

  • The conversation shifts to configuring X-ray settings, specifically routing and reverse proxy options.
  • Explanation of load balancing methods is provided, including random selection based on ping speed for traffic routing.

Implementing Load Balancing

  • Instructions are given on creating a bound link from JSON data for server connections.
  • The speaker discusses strategies for selecting load balancers and emphasizes the need for an outbound connection setup.

Testing Connectivity

  • After setting up rules in routing configurations, they test connections through different ports and observe changes in ping times.
  • Successful verification shows that despite being connected to a Moscow server, traffic routes through Finland due to proper configuration.

Updating Server Settings

Maintenance Procedures

  • Discussion about updating existing panels and features by accessing frequently asked questions related to X UI updates.
  • Emphasis on backing up configurations before performing updates as a precautionary measure against potential issues.

Addressing Port Issues

  • Challenges with port 443 are acknowledged; alternative ports below 10,000 are suggested as solutions due to operator restrictions.

Enhancing Performance

  • Introduction of BBR (Bottleneck Bandwidth and Round-trip propagation time), which can significantly improve loading speeds when activated on servers.

Firewall Configuration

  • Installation of firewall settings is discussed; checking active ports reveals potential conflicts with port usage.

How to Open Ports and Configure IP Tables

Opening Specific Ports

  • The process begins with opening port 8443 alongside the default port 443, using option three in the configuration.
  • A total of 200 ports (100 for TCP and 100 for UDP) are opened, ensuring that both protocols can communicate effectively.
  • Emphasis is placed on understanding the logic behind port redirection; ports from 3000 to 3100 are redirected to port 800843 based on server configurations.

Configuration and Testing

  • After making changes, it’s crucial to save and reload the configuration to apply new settings effectively.
  • A verification step follows where users check if the applied configurations are functioning as intended.

Troubleshooting Connection Issues

  • Users may encounter connection issues; however, pre-configured settings allow for quick adjustments through device configurations.
  • An example is provided where a user switches from port 443 to an alternative like port 3001, demonstrating flexibility in connection options.

Performance Monitoring

  • Despite potential operator restrictions on certain ports, connections can still be established through alternative ports while maintaining server functionality on port 443.
  • Speed tests indicate that even under suboptimal internet conditions (30–50 Mbps), traffic flows smoothly across different ports.

Additional Resources and Final Thoughts

  • The discussion highlights a useful instruction manual available for further exploration of network configurations beyond basic setups.
  • Viewers are encouraged to engage with additional resources such as Telegram bots for monitoring protocol connections.
Video description

======================= Хостинг #1 https://vk.cc/ct29NQ OFF60 для 60% скидки на первый месяц antenka20 буст скидка на 20% + 3% при оплате за 3 месяца antenka6 буст скидка на 15% + 5% при оплате 6 месяцев ======================= Как получить инструкции: 1 способ: https://boosty.to/anten-ka 2 способ: https://antenka.taplink.ws 3 способ: https://web.tribute.tg/p/cJu 4 способ: если не получается оплатить или не проходит карта, пишите сюда: https://t.me/anten_ka Таймкоды: 00:00 - введение что надо для VLESS в 2026 02:46 - хостинг со скидками 12:35 - установка 3x-ui на VPS в мире 18:31 - прячем панель 3x-ui от интернета через SSH туннель 24:50 - TLS сканнер и подключение 3x-ui vless 32:23 - настройка сервера VPS в Москве и связка каскадного VLESS 37:23 - как восстановить пароли и доступ к 3x-ui 45:41 - 3x-ui связывание серверов outbound и балансировщик 49:15 - как обновить панель 3x-ui 50:19 - port hopping против блокировки 443 порта 51:13 - 3x-ui firewall + BBR 57:41 - пока пока Об инструкции и частые вопросы: https://docs.google.com/document/d/1TKO6cyPLj-Tp3GiSZOqn-mUS2NqWjSGMq9wWEn3Gv1I/edit?tab=t.0 Или для получения ссылок отправь письмо на: 1vpn1@rambler.ru и получишь через 30 секунд ответ