Being attacked!

Currently reading
Being attacked!

Yep great minds, I've already changed the port the VPN uses :)

Tailscale - hmm I've given it a look-see but I can't see it being much use to me as my main purpose in putting a VPN on the NAS was to access the web portal on the router and it seems you can't use it for that?
Last edited:
The reverse proxy in DSM is for Web services and OpenVPN and L2TP/IPsec are not. So for these it’s port forwarding.
And I just worked out I can use RP to access the routers admin page (as it's a web service) so the VPN can be switched off completely......... I will do a bit more testing first though just in case.
-- post merged: --

So this begs the question which is more secure:

- To access the router web page via VPN and internal IP
- To access the router web page via RP

Surely the VPN is more secure and safer from external access?
Surely the VPN is more secure and safer from external access?
Personally, I would stick with a VPN to access such a "delicate" element. Using any method of VPN (open, ipsec, wireguard etc) would be better than actually putting your router UI on the web via RP. Ofc you can protect that RP host with more rules, but I'm sure you could find other services that would benefit from VPN access than just the router UI.


Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Welcome to! is an unofficial Synology forum for NAS owners and enthusiasts.

Registration is free, easy and fast!

Trending threads