Configure WireGuard On A Synology NAS Running DSM 7











>> YOUR LINK HERE: ___ http://youtube.com/watch?v=uPjAirU4occ

This video covers configuring WireGuard on a Synology NAS Running Virtual DSM 7. • The video topics include: • • What WireGuard is. • • Setting up DDNS and port forwarding to enable access to the WireGuard service running on a Synology NAS. • • Building a SPK (Synology Package) file using Andreas Runfalk's synology-wireguard repository on an Ubuntu 20.04 VM that has Git and Docker installed. • • Install the SPK file, configure and run WireGuard on Virtual DSM 7. • • Setting up a MacOS WireGuard client to access the Synology NAS WireGuard service. • === • SUPPORT THIS CHANNEL • • Synology 2 Bay NAS DS220+ - https://amzn.to/3oYkARI • • Synology 2 Bay NAS DS720+ - https://amzn.to/3sGdjbl • • Synology 4 Bay NAS DS920+ - https://amzn.to/3EpyOBR • === • In the video I mentioned or referenced the following link: • • Synology-wireguard repo on GitHub - https://github.com/runfalk/synology-w... • • README that also includes DSM 7 Information - https://github.com/runfalk/synology-w... • • WireGuard Webpage - https://www.wireguard.com • • Remotely Access Your Synology NAS Running DSM7 With DDNS And Port Forwarding -    • Enable Remote Access To Your Synology...   • • What kind of CPU does my Synology NAS have? - https://kb.synology.com/en-global/DSM... • • Link to the Virtual DSM 7.0 SPK file for download - https://drive.google.com/drive/folder... • • Install DSM 7.0 Release Candidate as a VM on a Synology NAS using Virtual Machine Manager -    • Install DSM 7.0 Release Candidate As ...   • • How to Configure a Secured Connection and Manager your Synology NAS with SSH -    • How To Configure A Secured Connection...   • Timecodes • 0:00 | Introduction • 0:58 | What Is WireGuard? • 1:36 | Setup DDNS And Port Forwarding • 2:50 | Runfalk Synology-WireGuard GitHub Repo Information • 3:26 | Compile Failed On Synology NAS • 3:55 | Compile Successful On Ubuntu 20.04 VM • 4:45 | Steps To Compile SPK File • 6:40 | Virtual DSM 7 Setup Information • 7:44 | Install WireGuard SPK File And Setup WireGuard On Virtual DSM 7 • 10:14 | Setup WireGuard on MacOS • 11:36 | Finalize Setup of WireGuard Server on Virtual DSM 7 • 12:22 | Connect to WireGuard server from MacOS client • 12:53 | Closing • COMMANDS, CONFIGURATIONS AND NOTES • Steps from the video to compile a SPK file for Virtual DSM 7 ran from an Ubuntu 20.04 VM with Git and Docker installed. • $ git clone https://github.com/runfalk/synology-w... • $ cd synology-wireguard • $ git fetch origin pull/71/head:DSM7.0 • $ git checkout DSM7.0 • $ sudo docker build -t synobuild . (there is a space then a period at the end of this command) • $ mkdir artifacts (pre requisite for the next step). • $ docker run --rm --privileged --env PACKAGE_ARCH=kvmx64 --env DSM_VER=7.0 -v $(pwd)/artifacts:/result_spk synobuild • To install and setup WireGuard on Virtual DSM7 I did the following: • • In the Virtual DSM7 GUI go to Package Center and Manually install the SPK. • • Enable SSH and connect to the Virtual DSM7 VM through SSH then run the following commands: • $ sudo /var/packages/WireGuard/scripts/start • $ sudo su – • sudo mkdir /etc/wireguard • cd /etc/wireguard • umask 077; wg genkey | tee privatekey | wg pubkey enter an greater then sign here; see video; angle brackets not allowed in YouTube description publickey • vi wg0.conf (below if the configuration you can copy and paste into the editor) • [Interface] • Address = 10.0.1.1/16 • PrivateKey = (server private key) • ListenPort = 51820 • PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o %i -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE • PostDown = iptables -D FORWARD -i %i -j ACCEPT; iptables -D FORWARD -o -%i -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE • [Peer] • PublicKey = (client public key) • AllowedIPs = 10.0.1.2/32 • cat privatekey (copy the privatekey) • vi wg0.conf (paste the private key in the PrivateKey line) • On MacOS I installed and used the WireGuard app from the App Store and used this link as reference - https://wireguard.how/client/macos/. A sample tunnel configuration is listed below. • [Interface] • PrivateKey = (client private key – this should have been added for you) • Address = 10.0.1.2/32 • [Peer] • PublicKey = (server public key) • USE ONE OF THE AllowedIPs LINES BELOW • Use Your LAN Subnet For Split Tunnel • AllowedIPs = 192.168.81.0/24 • Use The Following For Full Tunnel • AllowedIPs = 0.0.0.0/0 • Endpoint = (hostname or ip address of WireGuard server):(port of WireGuard server) • After the client has been setup enter in the client public key to the configuration on the server through SSH. • $ sudo vi /etc/wireguard/wg0.conf • • Add the client public key into its corresponding PEER section of the server configuration file and save the changes. • $ sudo wg-quick up wg0 (To start the WireGuard service) • $ sudo wg show wg0 (To check how thing are going with WireGuard) • $ sudo wg-autostart enable wg0 (To run the WireGuard service at startup) • #synology #dsm7 #wireguard

#############################









Content Report
Youtor.org / YTube video Downloader © 2025

created by www.youtor.org