Clash 提供从协议支持到智能分流的完整能力栈,覆盖不同技术层级用户的需求。
原生兼容 Shadowsocks、VMess、Trojan、Snell、SOCKS5、HTTP(S)、WireGuard 等主流代理协议,灵活适应不同网络环境与节点部署方案。
支持基于域名、IP 段、进程名等多维度的精细化路由规则。国内网站直连访问,国外流量自动走代理,无需手动切换。
Windows、macOS、Linux、Android、iOS 全平台支持,配置可跨设备同步导出。
TUN/TProxy 模式实现系统级透明代理,无需逐应用单独配置,全局覆盖。
完善的 API 接口,支持远程配置更新、节点切换与自动化运维管理。
Fake-IP DNS 模式加速域名解析;策略组支持 fallback / load-balance / url-test 多种负载均衡模式;远程 Providers 实现规则集与节点列表的动态加载更新,无需重启客户端即可生效。
以下为各平台经过社区验证的推荐客户端。点击标签切换平台查看详情。
无需深厚技术背景,跟随以下步骤即可完成配置并启用代理。
在上方下载区选择对应系统版本下载并安装。优先使用可信来源(GitHub 官方仓库),避免安全风险与捆绑软件。
通过订阅链接或本地 YAML 文件导入配置,按需启用规则集与策略组。订阅链接通常由节点服务商提供,支持自动更新。
开启系统代理或服务模式,检查分流是否生效。根据网络环境灵活切换直连、规则或全局模式,访问国内网站自动直连。
我们深知用户对代理工具的隐私关切,Clash 从设计之初就将安全与透明作为核心原则。
基于 GPL-3.0 开源许可证发布,全部代码公开托管于 GitHub,任何人可审计审查,无隐藏后门。
配置与日志文件仅保存在您的本地设备上,Clash 不会将任何使用数据上传至远程服务器。
优先使用 TLS 加密传输,定期更新客户端与规则集,关注官方安全公告,使用经过验证的客户端版本。
以下涵盖产品对比、配置获取、平台选择、故障排除、iOS 兼容及安全隐私六大类别的问题解答,每个回答均以分步形式呈现。
类别:产品对比——以下是六个关键维度的分步对比:
类别:配置获取——以下是获取并导入订阅链接的六个步骤:
类别:平台选择——以下是按操作系统逐一推荐的六个步骤:
类别:故障排除——以下是系统排查问题的六个步骤:
类别:平台兼容——以下是 iOS 用户使用 Clash 生态的六个步骤指引:
类别:安全隐私——以下是 Clash 保障隐私安全的六个核心要点:
Supporting Shadowsocks, VMess, Trojan, WireGuard, and multiple protocols. Intelligent traffic routing with automatic split — domestic direct connection, international proxied. Available on Windows, macOS, Linux, Android, and iOS for fast, secure network access.
Latest Stable: v2024.12 | Licensed under GPL-3.0
Clash delivers a complete capability stack from protocol support to intelligent traffic splitting, serving users across all technical levels.
Native compatibility with Shadowsocks, VMess, Trojan, Snell, SOCKS5, HTTP(S), WireGuard, and more — adapt to diverse network environments and deployment scenarios.
Fine-grained routing by domain, IP range, and process name. Domestic sites connect directly; international traffic is automatically proxied — no manual switching needed.
Windows, macOS, Linux, Android, iOS — all supported. Configurations can be synced and exported across devices.
System-level transparent proxy via TUN/TProxy mode — no per-app configuration required, global coverage out of the box.
Comprehensive API endpoints for remote config updates, node switching, and automated operations management.
Fake-IP DNS mode accelerates domain resolution. Proxy groups support fallback, load-balance, and url-test modes. Remote providers enable dynamic rule-set and node-list loading — no restart required.
Community-verified recommended clients for each platform. Click tabs to switch and view details.
No deep technical background required — follow the steps below to configure and enable the proxy.
Select your OS version from the download section above. Prioritize trusted sources (official GitHub repositories) to avoid security risks and bundled software.
Import config via subscription link or local YAML file. Enable rule sets and proxy groups as needed. Subscription links are typically provided by node service providers with auto-update support.
Turn on system proxy or service mode and verify traffic split is working. Switch between direct, rule-based, or global mode depending on your network environment.
We understand privacy concerns around proxy tools. Clash was designed with security and transparency as core principles from day one.
Released under GPL-3.0 license. All source code is publicly available on GitHub — anyone can audit, no hidden backdoors.
Configurations and logs are stored locally on your device only. Clash does not upload any usage data to remote servers.
Use TLS encryption, update clients and rule sets regularly, follow official security advisories, and stick to verified client versions.
Covering product comparison, config acquisition, platform selection, troubleshooting, iOS compatibility, and security — each answer presented in step-by-step format.
Category: Product Comparison — A six-step breakdown:
Category: Configuration Acquisition — Six steps to obtain and import:
Category: Platform Selection — Six platform-specific recommendations:
Category: Troubleshooting — A systematic six-step diagnostic approach:
Category: Platform Compatibility — Six steps for iOS users:
Category: Security & Privacy — Six core privacy protection pillars: