synology-wireguard
overlayRoot.sh
synology-wireguard | overlayRoot.sh | |
---|---|---|
49 | 2 | |
901 | 26 | |
- | - | |
0.0 | 2.4 | |
about 1 month ago | about 1 month ago | |
Shell | Shell | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
synology-wireguard
-
VPN + Mapped Drive in Windows?
Try here: https://github.com/runfalk/synology-wireguard
- [Synology] Quelqu'un a-t-il réussi à exécuter Wireguard avec une interface utilisateur dans Docker sur sa boîte de synologie?
- DSM 7.2-64551 RC is now available
-
qBittorrent on Windows won't upload when data is coming through Synology via SMB/NFS/CIFS
It seems like your model is based out of the v1000 platform. See if this can help: https://github.com/runfalk/synology-wireguard/issues/61
- Kernel version of DfSM that comes with the latest DiskStation models
-
Using Synology NAS as VPN server to send the traffic to the internet
Anyone knows how to do this. I installed runfalk/synology-wireguard with complied .spk file, I managed setup macOS client and hand shake is successful. I added /etc/sysctl.conf with net.ipv4.ip_forward=1 as stated in this. But no success, the Synology is reachable via wireguard tunnel but not internet,
-
Wireguard
But you could try this, if your NAS is supported: https://github.com/runfalk/synology-wireguard
not native but this has worked well for me for creating a server endpoint
- VPN solution with static ip assigments ?
- Can't get wireguard to start on Synology NAS
overlayRoot.sh
-
The latest DSM update makes btrfs drives unavailable on budget Synology models
- easy to backup, and some protection against sudden disk failure
Here is my solution:
- a Raspberry Pi 400 with keyboard: https://www.raspberrypi.org/products/raspberry-pi-400/
- Two external 2.5´´ HDD drives, 5 TB each, with USB3 interface (I took a Western Digital one and an Intenso one, as it is tradition to use different makes in a RAID, in order to avoid correlated failures)
- One powered USB 3 Hub with sufficient power for all of them. These can be relatively expensive, so leave room for it on your budget, you need it.
- an industrial-grade SD card for the Raspberry's system
- you also might wont some kind of organizer to keep the devices together while providing for good passive cooling, like that: https://www.amazon.com/DecoBros-Cabinet-Basket-Organizer-Sil...
My set-up includes:
- standard Raspbian for the software
- I use the root-fs overlay provided here https://github.com/fitu996/overlayRoot.sh , in order to protect the SD card from constant writing
- /var (and with it the system logs) go to a different partition of the RAID
- RAID is set up with mdadm . There are good instructions on the web.
- I use ext3 or ext4 file systems for data. btrfs is in theory easier to extend but it has much worse robustness characteristics than Ext4, and no well-working filesystem repair tool if metadata gets corrupted. Some people might use ZFS but I think it is overkill and over-complicated for this case, it is not part of the standard kernel, and it might make kernel updates more difficult or impossible.
- also I set up openssh-server, Samba, Linux NFS server, a MoinMoin Wiki, rsync.
- I configured systemd so that Ctrl-Alt-Del on the keyboard will shut down the system, even if it is disconnected.
The overlayfs needs to be activated when everything is finished. It has the effect that changes and logs are stored on the RAID. If you update the system, it needs to be deactivated.
Of course, back-up your SD card.
Also, always back up your data - RAID is never a substitute for backups. What RAID is good for is that it increases availability of your device in case one of your disks fails. But there are many errors which it cannot help against, so you DEFINITIVELY need egular full backups (like you need for any Synology or whatever NAS as well!!).
What are some alternatives?
synology-docker - An Unofficial Script to Update or Restore Docker Engine and Docker Compose on Synology
docker-transmission-openvpn - Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
synology-tailscale - Synology packages for tailscale.com
nordvpn - NordVpn Docker Client
gluetun - VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
docker - Moby Project - a collaborative project for the container ecosystem to assemble container-based systems [Moved to: https://github.com/moby/moby]
homebridge-syno-spk - Homebridge Package for Synology DSM 7.
wirehole - WireHole is a combination of WireGuard, Pi-hole, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities thanks to Pi-hole, and DNS caching, additional privacy options, and upstream providers via Unbound.
pivpn - The Simplest VPN installer, designed for Raspberry Pi
VideoStation-FFMPEG-Patcher - Patcher to enable DTS, EAC3 and TrueHD support to Synology VideoStation (from DSM 6.2 to DSM 7.0 and above ; ffmpeg4, 5, 6 ready)
Synology-NAS-monitoring - influxDB, Grafana, snmp and telegraf
synology-pihole - Install or Update Pi-Hole as Docker Container on a Synology NAS with a Static IP Address