Introducing PureSquare – for security beyond VPNs

Visit our website

Don’t worry about forgetting your passwords ever again with the all-new password manager. Try PureKeep

How to setup PureVPN on Synology NAS

Apr 13, 2020
Dec 02, 2022
0 Comments
Download PDF

Set up and connect PureVPN on Synology NAS using this simple guide. Unleash the ultimate home-based cloud experience which is fast, secure, and reliable with PureVPN

Things to Consider:

  1. You have a working internet connection.
  2. Synology NAS Supported Device.
  3. A Premium PureVPN account (If you haven’t bought yet click here to buy)
Find your VPN credentials for manual configuration.

To find your VPN credentials log into the PureVPN member area. Click 👉 here to visit member area.

  • Login to the Member area using your PureVPN registered email address and password.
  • On subscriptions tab scroll down to be able to view your VPN credentials.
  • You will be able to see and copy your VPN credentials.
  • Note down your PureVPN username and click on Eye icon to make your password visible and use it in the manual configuration.
How to setup PPTP on Synology
  • To begin, please enter the Control Panel on your Synology and choose Network in the left sidebar:
  • Choose Network Interface in the top menu bar to create your VPN profile.
  • Select PPTP as your VPN connection method and select Next.
  • To create a VPN profile, you need to specify the general settings as explained below.
  • Profile name: You can name your profile anything you like – e.g. PureVPN US.
  • Insert the desired server: Please refer to the server address shared below.
    1. Germany: de1.pointtoserver.com
    2. Netherlands: nl1.pointtoserver.com
    3. United Kingdom: ukl1.pointtoserver.com
    4. United States: usil1.pointtoserver.com
    5. United States: ustx1.pointtoserver.com
    6. United States: usca1.pointtoserver.com
    7. United States: usfl1.pointtoserver.com
    8. United States: usny1.pointtoserver.com
    9. United States: uswdc1.pointtoserver.com
    10. Australia: au-sd1.pointtoserver.com
  • Enter your PureVPN credentials. Here is how you can find your VPN credentials.
  • When you’re done, click Next
  • You will now be redirected to Advanced settings where you will fill them out as follows.
  • Authentication: Choose MS CHAP v2 from the drop-down menu.
  • Encryption: Choose Maximum MPPE (128 bit) from the drop-down menu.
  • Make sure you tick the following options only:
  • Use default gateway on remote network.
  • Reconnect when the VPN connection is lost.
  • When you’re done, click Apply.
  • Now you’ll see that your VPN profile has been created – to establish a VPN connection, click Connect.
  •  The status of your profile will now change from Disconnected to Connecting.
  •  Once you have established a connection, the status of your VPN profile will change to Connected and you will be able to see the duration of your connection, your new IP address as well as bytes sent and received.
  • To disconnect, just click Disconnect 🙂
How to setup L2TP/ IPSec on Synology
  • In your Synology’s Control Panel, click Network and then the Network Interface tab. Below, click Create > Create VPN profile.
  • In the new window, select L2TP/ IPSec.
  •  Now fill in the general settings of your VPN profile as follows:
  • Profile name: You can name this anything you like, e.g. the country/name of the server you’re connecting to.
  • Insert the desired server: Please refer to the server address shared below.
    1. Germany: de1.pointtoserver.com
    2. Netherlands: nl1.pointtoserver.com
    3. United Kingdom: ukl1.pointtoserver.com
    4. United States: usil1.pointtoserver.com
    5. United States: ustx1.pointtoserver.com
    6. United States: usca1.pointtoserver.com
    7. United States: usfl1.pointtoserver.com
    8. United States: usny1.pointtoserver.com
    9. United States: uswdc1.pointtoserver.com
    10. Australia: au-sd1.pointtoserver.com
  • User name: Here you should enter your PureVPN username
  • Password: Your PureVPN password
  • Pre-shared key: Here, please type 12345678
  • The advanced settings of your VPN profile should be set as follows.
  • Authentication: Choose MS CHAP v2 from the drop-down menu.
  • Please check (tick) the Use default gateway on remote network and Reconnect when the VPN connection is lost options.
  • Now that you’ve created your VPN profile, you can click Connect whenever you wish.
  • The status of your profile will now change to Connecting. Please note that this usually takes under a minute, but might take just a bit longer…
  •  After waiting for your connection status to change to Connected, you can refresh your page if you wish.
How to setup OpenVPN on Synology
  • Log into your administration console usually Open Control Panel.
  • Click the Network Interface tab
  • Click Create > Create VPN profile
  • Select OpenVPN (via importing a .ovpn file) and click Next.
  •  You can find the list of all available locations here for OpenVPN.
  •  Click Linux link, download and extract the zip file.
  • Enter the Profile name (a name which you’ll see in the Network Interfaces list), your PureVPN Credentials. Click the Browse button next to Import .ovpn file: and find the file we got from the previous step. Add the ca.crt file in CA Certificate provided with the ovpn file. Press Next.
  • Enable Use default gateway on remote network ***
    If you want, enable Reconnect when the VPN connection is lost
    Press Apply.
  • On the Network Interfaces menu, right-click your freshly made VPN connection and press Connect, or press Connect button.
  • If the connection was successful, status below the name of connection will say Connected.

*** Connecting to your Synology from the Outside (WAN)
In case you check the Use default gateway on remote network you might have problems connecting to your NAS over the Internet.
If you want security, you need to have this checked.
If you want to access your NAS over the internet, you have to leave this unchecked, but the connection may fail.

The reason for it is that the default gateway redirects all requests that are not within the private network over the VPN connection. You would need to connect to the VPN gateway’s (external) IP, but since it is a shared IP address among everyone connected to it, it just drops the incoming connection, as the server doesn’t know to whom to relay the package

Was this article helpful? Rate and share your comments below. Your input matters to us and everyone else in the Cyber Security Community.

How helpful did you find this answer?

Comments (0 )