Our great sponsors
-
gluetun
VPN client in a thin Docker container for multiple VPN providers, written in Go, and using OpenVPN or Wireguard, DNS over TLS, with a few proxy servers built-in.
version: '3.7' ########## Secrets ############ ########## Networking ########## ########## This is optional but IMHO makes Firewall Rules more easy networks: web: name: web driver: bridge ipam: config: - subnet: 192.168.91.0/24 services: gluetun: image: qmcgaw/gluetun container_name: gluetun hostname: gluetun ports: - 8888:8888/tcp # HTTP proxy - 8388:8388/tcp # Shadowsocks - 8388:8388/udp # Shadowsocks ###### Transmission Ports - 9091:9091 environment: # See https://github.com/qdm12/gluetun/wiki - PUID=${PUID} #enter here your Docker User id (uid) or later in the .env - PGID=${PGID} #enter here your Docker Group id (gid) or later in the .env - VPNSP=ivpn - VPN_TYPE=openvpn # OpenVPN: #- OPENVPN_USER= #optional #- OPENVPN_PASSWORD= #optional # Timezone for accurate log times - TZ=${TZ} #Enter her your Timezone i.e. Europe/Berlin or later in the .env - VPNSP=custom - OPENVPN_CUSTOM_CONFIG=/gluetun/custom.conf - FIREWALL=on - FIREWALL_OUTBOUND_SUBNETS=192.168.0.0/16 #if you have different subnets - FIREWALL_OUTBOUND_SUBNETS=192.168.11.0/24 #i.e. No Subnets - FIREWALL_VPN_INPUT_PORTS=38080 - OPENVPN_VERBOSITY=6 - HTTPPROXY=on - HTTPPROXY_LOG=on - PROTOCOL=UDP - BLOCK_MALICIOUS=on - BLOCK_SURVEILLANCE=on - BLOCK_ADS=on cap_add: - NET_ADMIN networks: - web volumes: - ${USERDIR}/gluetun:/gluetun - ${USERDIR}/gluetun/vpn-configuration.ovpn:/gluetun/custom.conf restart: always security_opt: - no-new-privileges:true
-
docker-transmission-openvpn
Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
Comparison between Containers like haugenes Transmission over VPN:
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Has anyone gotten this to work with Wireguard, though? I know Gluetun supports it, but in all of my attempts I cannot get it to work with Synology, even using this package that supposedly adds the required backend support for Wireguard.
-
The port forwarding issue I mentioned was solved by using this plugin in deluge: https://github.com/jawilson/deluge-piaportplugin