Changing Low-level settings can cause problems with the performance of AdGuard, may break the Internet connection or compromise your security and privacy. You should only open this section if you are sure of what you are doing or our support-team has asked you about it.
To go to Low-level settings, tap the gear icon at the bottom right of the screen to open Settings. Select the General section and then toggle on the Advanced mode switch, after that the Advanced settings section will appear below. Tap Advanced settings to reach the Low-level settings section.
There are two main tunnel modes: Split and Full. Split-Tunnel mode provides compatibility of AdGuard and so-called “Personal VPN” apps. In Full-Tunnel mode no other VPN can work simultaneously with AdGuard.
There is a specific feature of Split-Tunnel mode: if DNS proxy does not perform well, for example, if the response from the AdGuard DNS server was not returned in time, iOS will "amerce" it and reroute traffic through DNS server, specified in iOS settings. No ads are blocked at this time and DNS traffic is not encrypted.
In Full-Tunnel mode only the DNS server specified in AdGuard settings is used. If it does not respond, the Internet will simply not work. Enabled Full-Tunnel mode may cause the incorrect performance of some programs (for instance, Facetime), and lead to problems with app updates.
By default, AdGuard uses Split-Tunnel mode as the most stable option.
There is also an additional mode called Full-Tunnel (without VPN icon). This is exactly the same as Full-Tunnel mode, but it is set up so that the VPN icon is not displayed in the system line.
In this module you can select the way AdGuard will respond to DNS queries that should be blocked:
REFUSED — respond with REFUSED code
NXDOMAIN — respond with NXDOMAIN code
Unspecified IP — respond with zero IP address
Custom IP — respond with a manually set IP address
By moving the toggle to the right, you activate IPv6 query blocking (AAAA requests).
Here you can specify the TTL (time to live) value that will be returned in response to a blocked request.
For DNS-over-HTTPS, DNS-over-TLS, and DNS-over-QUIC a bootstrap server is required for getting the IP address of the main DNS server. If not specified, the DNS server from iOS settings is used as the bootstrap server.
Here you can specify an alternate server to which a request will be rerouted if the main server fails to respond. If not specified, the system DNS server will be used as the fallback. It is also possible to specify
none, in this case, there will be no fallback server set and only the main DNS server will be used.
Here you can select the frequency at which the application will check for filter updates while in the background. Note that update checks will not be performed more often than the specified period, but the exact intervals may not be respected.