unfortunately, all tunnel (IPIP, EoIP, GRE, WireGuard, and etc) and all vpn protocols (pptp, l2tp, sstp, open-vpn and etc) dropped and blocked in iran.about this topic : viewtopic.php?t=189729
all port sniffed, analyzed and captured by iran regime.
for example :
you can visit website and transfer data on port 443 and it work well, but if you run SSTP or Open-VPN or Socks5 and etc on 443 port it dosnt work !!! but when you running port scan by wireshark, you will see port 433 is open ! but you cant run tunnel on this port !!! becuse port check by dpi
iran regime run this method by DPI filternig and there is one of the most powerfull DPI device that bought from chiness and russia and runed in IRAN.
now in iran v2ray protocol work well.
dear mikrotik please help us by adding v2ray protocol on next ros version or please write an article to help install and configuration v2ray on mikrotik container to bypass filtering device.
by the way do you have creative idea to bypass DPI ? can you deploy and run obfuscation traffic on MikroTik?
I can provid one mikrotik in IRAN to check and analyze.
please help iranian
#opIran
#to_help_iran