Clash Verge Node Configuration Guide
Node Configuration Guide #
Understanding Nodes #
Nodes are proxy servers that route your internet traffic through different locations. Clash Verge supports various types of nodes:
Node Types #
- Shadowsocks (SS): Encrypted proxy protocol
- ShadowsocksR (SSR): Enhanced version of SS with additional features
- V2Ray: Advanced proxy protocol with multiple transport methods
- Trojan: Protocol designed to bypass deep packet inspection
- HTTPS: Standard HTTPS proxy
Adding Nodes #
Method 1: Subscription URL (Recommended) #
- Get your subscription URL from your proxy provider
- Open Clash Verge
- Go to Profiles tab
- Click New Profile → URL
- Paste your subscription URL
- Click Download
Method 2: Manual Configuration #
- Go to Profiles tab
- Click New Profile → File
- Create a YAML configuration file
- Add your node configurations
Example Configuration #
proxies:
- name: "US Server"
type: ss
server: us.example.com
port: 8388
cipher: aes-256-gcm
password: your_password
- name: "UK Server"
type: trojan
server: uk.example.com
port: 443
password: your_password
sni: uk.example.com
proxy-groups:
- name: "Proxy"
type: select
proxies:
- "US Server"
- "UK Server"
- "DIRECT"
- name: "Auto"
type: url-test
proxies:
- "US Server"
- "UK Server"
url: http://www.gstatic.com/generate_204
interval: 300
Testing Nodes #
- Latency Test: Click the Test Latency button to check server response times
- Connectivity Test: Use the built-in test URLs to verify connectivity
- Real-world Testing: Visit websites to confirm the proxy is working
Managing Nodes #
- Enable/Disable: Toggle individual nodes on/off
- Reorder: Drag and drop to change node priority
- Delete: Remove unused nodes
- Backup: Export your configuration for backup
Best Practices #
- Multiple Providers: Use nodes from different providers for redundancy
- Geographic Diversity: Choose nodes from various countries/regions
- Regular Updates: Keep your subscription updated
- Performance Monitoring: Regularly test node performance
- Security: Use strong passwords and secure protocols