TSF – Giải pháp IT toàn diện cho doanh nghiệp SMB | HCM

P12 - How to Set Up VPN Server on Synology NAS

🚀 NAS – P12 How to Set Up VPN Server on Synology NAS

Secure Remote Access with OpenVPN, L2TP/IPsec & PPTP

Setting up a VPN Server on Synology NAS is one of the most powerful ways to create secure remote access to your internal network.

Instead of relying on third-party VPN providers, you can host your own private VPN directly on your NAS infrastructure.

This guide walks you through installing and configuring Synology VPN Server, covering:

  • PPTP

  • L2TP/IPsec

  • OpenVPN

With proper configuration, you can achieve enterprise-level VPN security at minimal cost.

This deployment is ideal for:

  • 🏠 Home users

  • 🏢 Small & Medium Businesses

  • 🖥️ IT administrators

  • 🔐 Remote secure access environments

By the end of this tutorial, your Synology NAS will function as a stable and secure VPN gateway.


📦 Step 0 – Install VPN Server Package

Before configuration:

1️⃣ Go to Package Center
2️⃣ Search for VPN Server
3️⃣ Click Install

After installation, open VPN Server to begin configuration.


🔹 1. PPTP Configuration

⚠️ Note: PPTP is older and less secure but easy to deploy.


Step 1: NAT Port Configuration

On your router/firewall:

NAT Port 1723


Step 2: Enable PPTP

Open:

VPN Server → PPTP → Enable PPTP VPN Server

Configure basic settings as needed.


Step 3: Add VPN Connection on Windows

On Windows:

  • Add new VPN connection

  • Select PPTP protocol

  • Enter WAN IP

Check WAN IP:

27.64.16.182

Connect and verify.


🔹 2. L2TP/IPsec Configuration (Real NAS Deployment)

More secure and recommended over PPTP.


Step 1: NAT Port Configuration

Forward the following ports:

 
1701 500 4500

Create preshare-key.


Step 2: Enable L2TP/IPsec

Go to:

VPN Server → L2TP/IPsec → Enable

Enter the preshared key created earlier.


Step 3: Add VPN Connection on Windows

  • Add new VPN

  • Select L2TP/IPsec

  • Enter WAN IP

  • Enter preshared key

Connect and verify secure access.


🔹 3. OpenVPN Configuration (Recommended)

OpenVPN provides the best balance between security and flexibility.


Step 1: NAT Port

Forward OpenVPN port (default):

 
1194 (UDP)

Step 2: Configure OpenVPN in VPN Server (Synology)

Go to:

Package Center → VPN Server → OpenVPN


🔐 Authentication

• Authentication: SHA256
👉 Standard, robust, compatible with OpenVPN GUI on Windows

• Client verification: Enable

• Verify TLS auth key: ✅ Enable
👉 Helps prevent scan/bruteforce attacks

📌 No complicated changes needed. Synology’s default OpenVPN configuration is already well optimized.


🔒 Encryption

• Encryption: AES-256-CBC
👉 Most common and fully supported by OpenVPN GUI

📌 If NAS and client are newer, AES-256-GCM is also acceptable.


📦 MTU

• MTU: 1500 (default)
👉 Works well on most Vietnamese networks

If you encounter issues:

  • Connects but cannot access web

  • Slow browsing

→ Reduce MTU to 1450 or 1400


Additional Options

✅ Allow clients to access the server’s LAN (enable if accessing internal network)

❌ Enable compression on the VPN link → DO NOT tick

✅ Dynamic IP address → Should be enabled


Step 3: Create VPN Users

Go to:

Control Panel → Users

Then:

VPN Server → Privilege → Tick OpenVPN

Select which users are allowed VPN access.


Step 4: Download the VPN Configuration File

Inside:

VPN Server → OpenVPN

Click:

👉 Export configuration

This downloads:

 
openvpn.zip

Extract the file. You will see:

 
VPNConfig.ovpn ca.crt README.txt

📌 The file to import is:

 
VPNConfig.ovpn

🔧 Edit Server Address

Open VPNConfig.ovpn with Notepad++.

Find:

 
remote YOUR_SERVER_IP 1194

Change to:

 
remote yourdomain.com 1194

Or replace with your real WAN IP.

Save the file.


Step 5: Download OpenVPN GUI

Download and install:

OpenVPN GUI for Windows


Step 6: Import and Connect

Do the following:

• Install OpenVPN GUI
• Import the .ovpn file
• Right-click OpenVPN icon → Run as Administrator
• Connect

📌 Synology exports a standard OpenVPN file — no heavy modification required.


🔐 Security Best Practices

To harden your VPN deployment:

✔ Disable default admin account
✔ Use strong passwords
✔ Enable 2FA
✔ Use domain + DDNS instead of static IP
✔ Keep DSM updated
✔ Restrict VPN user privileges

A VPN increases accessibility — but security must remain priority.


🎯 Final Thoughts

Deploying a VPN Server on Synology NAS gives you:

  • Secure remote access

  • Encrypted traffic

  • Full control over your infrastructure

  • Reduced reliance on third-party VPN providers

For home labs and SMB environments, OpenVPN is strongly recommended due to its security and flexibility.

With proper configuration, your Synology NAS becomes a powerful private VPN gateway — secure, stable, and cost-effective.

See also related articles

P11 – How to Schedule Auto Power On and Off on Synology NAS

P11 – How to Schedule Auto Power On and Off on Synology NAS 🚀 NAS – P11 Schedule Auto Power On & Off on Synology NAS Step-by-Step DSM Configuration Guide Running your NAS 24/7 is not always necessary. For home users and small businesses, scheduling automatic power on and shutdown...

Read More

P10 – How to Deploy Antivirus on Synology NAS

NAS P10: How to Deploy Antivirus on Synology NAS (Protect Your Data from Malware & Ransomware) 🚀 NAS – P10 Deploy Antivirus on Synology NAS Protect Your Data from Malware & Ransomware Data redundancy (RAID) protects against disk failure — but it does not protect against malware or ransomware. Modern...

Read More

P9 – How to Configure RAID 1 on Synology NAS (2-Disk Mirroring)

P9 – How to Configure RAID 1 on Synology NAS (2-Disk Mirroring Step-by-Step Guide) 🚀 NAS – P9 Configure RAID 1 on Synology NAS 2-Disk Mirroring Step-by-Step Guide Data protection is one of the most critical aspects of any NAS deployment. Whether you’re building a home lab, a backup server,...

Read More