Synology NAS Pi-hole Setup Instructions! Two Methods!

Today we are going to look at how to setup Pi-hole on a Synology NAS.

We will be looking at two different methods that both use Docker to install Pi-hole on a Synology NAS. The first method we are going to look at is “easier” and should be used if you don’t want to SSH into your NAS. This method utilizes the host network interface. The second method requires you to SSH into your Synology NAS to create a macvlan network interface for Docker. To answer the question you’re thinking, they both end up with the same functionality, but the first option will use your NAS’s IP address (and a different web port) while the second option (with the macvlan network interface) will have its own IP address.

Before we get started, it is incredibly important to note that having redundant DNS servers is very important. I highly suggest that you purchase a cheap Raspberry Pi Zero and configure Pi-hole on it so that you have two Pi-hole DNS servers. This will ensure that when your NAS is rebooted, your clients do not lose DNS resolution services.

1. Initial Steps

These steps need to be performed for either install, so we will get these steps out of the way first.

1. Install Docker from Synology’s Package Center.

2. We need to create two folders that we will map our Docker image to. By default, Docker will create a folder named docker after it’s finished installing. Inside of this folder, we are going to create a folder named pihole. Inside of that folder, we are going to create two subfolders. Create one folder named pihole and another folder named dnsmasq.d.

2. Host Network Interface (Option 1) - Synology NAS Pi-hole Setup

As stated above, this option will use the host network interface. For this reason, you will need to access Pi-hole using your Synology NAS’s IP address and a defined port.

3. Open Docker, navigate to the Registry, and search for Pi-hole. Double click Pi-hole/Pi-hole (official Pi-hole docker image) to download it.

Synology NAS Pi-hole Setup

4. Select Latest. The image will now download.

5. Double click the Pi-hole image to launch the Docker configuration.

Synology NAS Pi-hole Setup

6. Give your container a name, and then select Advanced Settings. NOTE: If you intend on using Pi-hole for DHCP, you need to check Execute container using high privilege.

Synology NAS Pi-hole Setup

7. We now need to configure the Advanced Settings.

  • Check off Enable auto-restart.

  • In the Volume section, we need to map the folders we created to the internal Docker Pi-hole locations. Select Add Folder and add the dnsmasq.d folder and type the mount path as /etc/dnsmasq.d. Do the same for the pihole folder with the mount path as /etc/pihole.

  • Under Network, select Use the same network as Docker Host.

  • Navigate to the Environment section. We will need to add a few variables.
  • Click the + sign and add these variables:
    • WEBPASSWORD: password that you’d like to access the admin portal with.
    • WEB_PORT: The port you’d like to access the admin portal with. This needs to be something that’s not used. Generally, something in the 8000’s should be fine.
    • DNSMASQ_LISTENING: local
    • ServerIP: This already exists. Change this to the IP address of your NAS.

synology nas pi-hole setup

8. Click Apply to create the Pi-hole docker container.

9. Since you are using your host network interface, you will have to open port 53 and the “WEB_PORT” you selected above (8888 is what I used) on your Synology firewall. This is the default DNS port and the port for the Pi-hole web portal. If you want to know how to configure the firewall, I created a tutorial here.

10. Open the Control Panel and navigate to Firewall. Select Edit Rules.

11. Create a rule with the custom port that you defined above. The protocol can be left as TCP.

synology nas pi-hole setup

12. Create a rule with the DNS port which is 53. Under protocol, select All.

13. Ensure the rules are above your Deny All rule.

14. You should now be able to access Pi-hole using this web address: http://[NAS IP_ADDRESS]:[WEB_PORT]/admin

Synology NAS Pi-hole Setup

15. The installation process is now complete. Navigate to the DNS Configuration section to complete the configuration process.

3. Macvlan Network Interface (Option 2) - Synology NAS Pi-hole Setup

As of the writing of this post, I cannot get v5.1.1 (latest version) to work with this method. I have tested various times and can confirm that v5.0 and v5.1 are working properly.

v5.1.2 appears to have resolved the issue that v5.1.1 caused!

As stated above, the benefits of completing the set up this way are that we can give our Pi-hole its own IP address. This requires that we SSH into our Synology NAS.

1. Ensure you can SSH into your Synology NAS. Open Control Panel, select Terminal & SNMP, and Enable SSH service. If you are using Synology’s Firewall, ensure that you allow port 22 traffic. I created a video on how to SSH into your Synology NAS if you have any problems.

2. SSH into your Synology NAS using your favorite SSH tool. The first thing that we need to do is create a resolv.conf file to allow Docker to get the correct DNS server addresses. This step might not be mandatory for you but I had major problems configuring Pi-hole without this. Run these commands:

cd /[VOLUME_#]/docker/pihole
sudo vi resolv.conf

synology nas pi-hole setup

3. In the file that is created, enter the two lines below and save the file. If you aren’t sure how to use the vi editor, you can learn how to use it here. NOTE: If you have trouble with this, just create a local file named resolv.conf with the two lines below and upload it to your pihole folder in DSM.

nameserver 127.0.0.1
nameserver 8.8.8.8

synology nas pi-hole setup

4. Now that the file is created, we need to create a docker macvlan network interface. First, we need to determine what network interfaces currently exist (on your Synology NAS) and note down the adapter name. To do this, run the command below and note down the network interface name that has your Synology NAS’s IP address (in this example, mine is eth0).

ifconfig

synology nas pi-hole setup

5. Next, you need to run the command below while substituting the correct subnet (most are 192.168.1.0/24 by default). You also need to pick an IP address that you’d like to use that’s not currently in use. I will be using 192.168.1.198. NOTE: ph_network will be the name of the network (you can substitute this as you’d like).

sudo docker network create -d macvlan -o parent=eth0 --subnet=192.168.1.0/24 --gateway=192.168.1.1 --ip-range=192.168.1.198/32 ph_network

Our network is now created. We can then exit our SSH session and disable it in DSM (if you won’t be using it). If you are disabling it and created a firewall rule for it, you should inactivate the firewall rule as well.

6. Next, we need to create a bridge network. This is what will allow our host (NAS) to communicate with our Pi-hole container. Open Docker and navigate to the Network section. Select Add and enter a subnet that’s not currently in use. The IP address of the bridge I am creating will be 192.168.10.2.

7. Our new networks are now created. Next, we need to create our Pi-hole container.

8. Open Docker, navigate to the Registry, and search for Pi-hole. Double click Pi-hole/Pi-hole (official Pi-hole docker image) to download it.

pi-hole synology nas

9. Select v5.1. The image will now download.

10. Give your container a name, and then select Advanced Settings. NOTE: If you intend on using Pi-hole for DHCP, you need to check Execute container using high privilege.

11. We now need to configure the Advanced Settings.

  • Check off Enable auto-restart.
  • In the Volume section, we need to map the folders we created to the internal Docker Pi-hole locations. Select Add Folder and add the dnsmasq.d folder and type the mount path as /etc/dnsmasq.d. Do the same for the Pi-hole folder with the mount path as /etc/pihole.
  • Unlike the first option, we have to map our resolv.conf file as well. Select File and navigate to the resolv.conf file that we created. Enter the mount path as /etc/resolv.conf.

  • Under the network section, add the two networks we created (ph_network, ph_bridge) and remove the bridge network.

  • Click the + sign and add these variables:
    • WEBPASSWORD: the password that you’d like to access the admin portal with.
    • DNSMASQ_LISTENING: local
    • VIRTUAL_HOST: pihole
    • ServerIP: This already exists. Change this to the IP address of the ph_network we created above (192.168.1.198).

12. Click Apply to create the Pi-hole docker container.

13. You should now be able to access Pi-hole using this web address: http://[IP_ADDRESS]/admin

4. DNS Configuration - Synology NAS Pi-hole Setup

Now that the setup of Pi-hole is complete, we need to determine a way to point our clients to our DNS server. There are two main ways to do this:

  • Point your router’s DNS server to your Pi-hole server IP address. This will ensure that any device connected will use Pi-hole as its DNS server.
  • Point each client to your DNS server. This is beneficial if you only want certain clients to use Pi-hole as a DNS server.

I point my routers DNS servers to my Pi-hole server as I want to ensure every device connects to it.

5. Conclusion

This tutorial explained the Synology NAS Pi-hole Setup procedure. The process isn’t too bad and Pi-hole is awesome! I’ve been using it for a while and while I run into the occasional issue where it blocks something I need, finding it and whitelisting it is a fairly easy process.

Once again, I will point out the importance of redundant Pi-hole servers. There are so many benefits to having a second DNS server, and with Raspberry Pi Zero kits being as cheap as $25, it’s worth it.

Thanks for reading the tutorial. If you have any questions, please leave them in the comments!

This Post Has 46 Comments

  1. Thank you very much for these easy, concise instructions! After trying to figure this out on several other sites and blogs, your tutorial helped me get it up and running in 15 minutes!!!

    1. I’m glad that it helped. Thanks so much for the kind words!

  2. When I click on Docker > Launch, to configure pihole, it says that proceeding will give pihole root access privileges in DSM. How do I avoid giving it root access?

    1. Uncheck “Execute container using high privilege” and you should be good!

      Let me know if you need anything else!

  3. Hi there, this is a great guide on getting the nas setup. When i setup my first syno nas with pihole, it works great. the router and PC work fine when connecting to this ip address. I tried the same steps on a secondary syno nas. The steps worked and I was able to launch the web page no problem. The issue I am having is, when i setup the computer or router to this secondary nas IP, it does not pull up any results. The DNS does not resolve and there is no connections detected to the second syno nas IP. So I am not sure what extra step i need. I tried different ports and same issue. Any tips on making my backup syno nas work? Help!!!

    1. Thanks for reading! When you say that it doesn’t resolve anything, do you mean that the DNS server isn’t being used? Certain devices only use the secondary DNS server if the primary is unavailable so that could be it. Would you be able to remove the primary DNS server (for testing) to see if the secondary works?

      If I’m misunderstanding the problem, please let me know and we can continue troubleshooting!

  4. When trying to create the network I’m getting the following error: “Error response from daemon: failed to allocate gateway (192.168.1.1): Address already in use”

    Indeed, my gateway is at this address. But shouldn’t this be normal?

    Also, my Synology NAS Ethernet adapter name is ovs_eth3. There is also an eth3, but the IP of my NAS is at the former.

    1. Did you use the ovs_eth3 adapter in the macvlan creation command? You are correct that that’s the one you should use. Also, what NAS model do you have?

      Let me know and we can continue troubleshooting!

  5. I appriciate the instructions, easy to follow. When I do this though I get to the Pihole login page and it tells me the password is incorrect. (Several attempts of deleting the docker and reinstalling give the same results.)

    TIA

    Bill

    1. Thanks for checking out the tutorial! Are you using the same value that you’re adding to the WEBPASSWORD environment variable? Whatever you put as the value for “WEBPASSWORD” is the password that you should be using. Do you receive any errors when you try and login?

      Let me know and we can continue troubleshooting!

  6. Just checking in, I see a version 5.1.2 just wondering if the new version has addressed the problems you were having with 5.1.1.

    Would like to update to most current version if it does not have issues.

    1. The issue that caused 5.1.1 to break appears to be fixed in 5.1.2. I haven’t really had much time to fully test it (literally just installed it to check for you), so if you’d like to create a new container but keep your old container stopped in case you run into any issues, it’s probably a good idea.

      However, I can now update the page to reflect that 5.1.2 appears to have fixed the issue.

      Let me know if you need anything else!

  7. Okay, I will give it a try.

    Thank you for the quick response!

  8. So, I have setup the new version of pi-hole on my synology (5.1.2) with the macvlan, but the docker container would not start up right and would shutdown after about 1-3 min. It did not work during that time and was only using about 3-5 Mb ram. Turned off the Syno firewall and it started right up. Went back and added allowance for port 53 to firewall and it is still running right now. Is that normal? I thought with the macvlan it would not be effected by the firewall on the synology. Also had to setup on the pi-hole to point to my router in settings since unlike you I am not running my dhcp on the pi-hole docker install but on my edgerouter 4.

    1. Port 53 should only need to be opened if you’re NOT using the macvlan network interface. Can you check the logs on the Docker container to see if there were any specific errors? I wouldn’t expect a firewall rule to shutdown the container, so I’m hoping there’s something in the log.

      Let me know if I can help at all!

      1. Not, sure what the issue is. But I looked over the logs and I get to “Starting pihole-FTL (no-daemon) as root”, several times with no further logs, and no error messages, but I was getting a notification that the container stopped unexpectedly after a couple mins. Then I would stop the container in Docker and try again. Also after starting but before the notification I could not access pihole web page and I could not access the internet (could see other IP’s on the local network) docker showed no CPU usage and 3-5MB of RAM, now with it running it is using 0.03-0.5% CPU and 44-45MB ram used).

        Once I turned off the fire wall and started the container it worked fine. So I shut down the container again and then turned on the firewall, then the container again would not start correctly. Next I turned on the syno firewall again and let port 53 through, this time when starting the container it worked again. So I left it like that and after seeing your email and looking at the logs just now I took out the rule allowing port 53, without stopping the pihole container. After a min or so I could not resolve web pages with my browser, on my PC again. So I turned port 53 back on and web browsing works again on my PC. I have set my PC’s DNS only to the Macvlan IP address I set (192.168.1.210) so I would know for sure if it stopped working. Not sure what I setup wrong, but sure seems odd.

        The Macvlan and the bridge look correct. I am seeing all my different devices IP addresses in the pihole website. The 192.168.1.210 shows as a client in my unifi network, but not of course in my edgerouter HDCP or static lists as it was not set there. There is a question, should I set the fake Mac that the macvlan created when it setup in my Static IP list with the address it is using and is that likely to change anything?

      2. One more thing that I am noticing is that in Pi-hole settings in the system tab my pi-hole Ethernet interface is eth0, I entered Bond0 for my network interface name when I setup my macvlan. Which is what I found using ifconfig. Is that normal? I am using a nas with 4 1gig ports bonded into a 4gig port on my managed switch.

        1. You’re definitely running into some strange issues and my only guess would be that it’s related to the Bond0 network interface you used. With that said, it’s purely a guess because the macvlan network interface should have it’s own port configuration, but I’m assuming the bond network could be causing some issues in regards to the firewall.

          My only true advice would be to keep port 53 open on your NAS since you know what it is. If this was an external service, you’d have a lot more to worry about, but since it’s only being used for DNS purposes, I wouldn’t worry too much. If you want, you can limit traffic on that port to your local subnet only.

          I know that’s not the best answer, but you did everything right, so it has to be related to that bond network since that’s the only difference between your setup and mine.

          If I can help in any other way, please let me know!

  9. Thank you, that is pretty much the conclusion I have come to. I did go through yesterday and redo the whole pi-hole setup, making sure I had bon0 in the macvlan setup (took me a min or two to figure out how to get rid of the original network, rm not delete or remove just docker network rm ph_network…). Deleted the container, the pihole bridge and all first (I did backup the pihole data first, have not put that back in yet). Reinstalled everything from scratch, and the same thing. I am tempted to see what happens if I pick one of the bonded Ethernet connections except if that connection should go down I would lose access to the pihole dns. Thinking about a new project for this with a raspberry pi…

    Setting up a real home network (not just a wireless router from Bestbuy) and a NAS has been my most recent pandemic project, and has been pretty fun. Now to remember to take the usb backup drive off my NAS to the office the next time I go in and lock it in my desk.

    I will set the firewall to only allow the macvlan network and see how that goes. Thank you for your replies and your cool videos and tutorials!

  10. Hi Frank, would you consider making a tutorial on how to setup two pi-holes to run simultaneously on two distinct Synology servers?..and how to sync settings between them so they act as mirrors of each other…

    thanks for sharing your knowledge!

    Martin

    1. Hi Martin,

      Absolutely! I will try and test this out when I get some time and see if I can come up with something!

      Thanks,
      Frank

        1. This looks awesome! I will keep this in mind for future tutorials as it’s something that even I could use!

  11. Hello,
    I am running into a problem when forwarding my router to the Pi-Hole. When I forward the primary DNS of the router to the ip address (macvlan) I run into an error “dns resolution is currently unavailable” when I try to update gravity, or if I need to restart the pi-hole it gets stuck in a loop with the same error on the log. If I turn off dns forwarding on the router to the pi-hole, it works. Any clue?

    1. That’s strange. If you point an individual client to it (rather than your router), does DNS resolution work?

      Also, did you create the resolv.conf file and add the correct DNS servers there? That is generally the containers DNS server.

      Let me know and we can continue troubleshooting!

  12. Is anyone else having trouble using macvlan over bond0?

  13. I’m having trouble resolving DNS queries intended for the synology active directory. i have successfully installed pihole using macvlan method (because i needed different ip for pihole as 2 DNS servers (active directory and pihole) cannot reside on same IP) On pihole v5.1.2 conditional forwarding is configured as follows:

    local network in CIDR notation: 10.1.1.0/16
    ip address of DHCP: 10.1.1.20
    local domain name: domain.local

    For some strange reason, clients are unable to contact the active directory hosted on the NAS itself at 10.1.1.20

    Someone on reddit suggested creating 01-custom.conf file inside /etc/dnsmasq.d/ to create a conditional forwarding as follows, which still didn’t work:
    server=/domain.local/10.1.1.20
    server=/1.1.10.in-addr.arpa/10.1.1.20

    Any help will be highly appreciable!

    1. Your issue might be that your container won’t be able to communicate with the host (NAS) by its IP address if you’re using a macvlan network interface. By default, the container will ONLY be able to communicate with the host using the bridge network (192.168.10.2 in this tutorial). The same is true for the Synology NAS – it will only be able to communicate with the container using the bridge network.

      Let me know if that works, and if it doesn’t, we can continue troubleshooting!

  14. Thank you for the detailed instructions! I am new to this level of networking. I do have a quick question. When I am creating the macvlan, do I use my gateway IP addess or the one you provided?

    1. The issue that I am running into is that i cannot access the webportal after completing the macvlan setup.

      1. Does the macvlan network interface create successfully?

    2. You will use your gateway IP address. Everything should match your local subnet, so if you’re using 192.168.2.X, use 192.168.2 everywhere that I have 192.168.1.

      Let me know if you have any other questions!

  15. thank you for this tutorial. New to docker on synology, how to we go about updating pihole?

    1. WunderTech
      2 months ago
      Generally, the easiest way that I find to do it is to download the latest Pi-Hole image, stop the Pi-Hole container and then right-click it and duplicate settings. It will then create a new container with the same settings (and new image) where you can start it up and test to make sure everything is still working as expected. If it is, feel free to delete the old container.

      People have suggested that you can do it by “clearing” the existing container, but that does NOT work for me. I lose all my settings that way.
      Found it in your comments on the YouTube Video https://www.youtube.com/watch?v=4Z9Mtpc7Tak&t=1s

      1. Yes! Those will work as well, the tutorial I just linked to is a little more detailed.

  16. I can’t figure out what’s wrong with my setup. I tried option 1, and the container booted fine, but I was unable to reach the admin page in my browser. So then I tried option 2, and when I try to boot the container I get a “Docker API has failed” error.

    1. For option one, do you have Synology’s firewall enabled? If you do, did you create an “allow” rule for it?

  17. So I created the bridge, and set IP of PiHole to 192.168.1.250, however I’m unable to connect to the pihole admin page. I’ve turned the firewall on/off and restarted PiHole in between with no difference. The pihole is running currently and no errors are shown in the log files. Here’s my setup:

    IFCONFIG Shows:
    docker0 Link encap:Ethernet HWaddr 02:42:50:4F:21:40
    inet addr:172.17.0.1 Bcast:172.17.255.255 Mask:255.255.0.0
    UP BROADCAST MULTICAST MTU:1500 Metric:1
    RX packets:0 errors:0 dropped:0 overruns:0 frame:0
    TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:0
    RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)

    eth0 Link encap:Ethernet HWaddr 00:11:32:DE:06:B9
    UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
    RX packets:1071939 errors:0 dropped:0 overruns:0 frame:0
    TX packets:385611 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:1000
    RX bytes:244545447 (233.2 MiB) TX bytes:687479782 (655.6 MiB)
    Interrupt:93 base 0xe000

    eth1 Link encap:Ethernet HWaddr 00:11:32:DE:06:BA
    UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
    RX packets:1731146 errors:0 dropped:0 overruns:0 frame:0
    TX packets:1987058 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:1000
    RX bytes:260351233 (248.2 MiB) TX bytes:6816001538 (6.3 GiB)
    Interrupt:92 base 0xa000

    lo Link encap:Local Loopback
    inet addr:127.0.0.1 Mask:255.0.0.0
    inet6 addr: ::1/128 Scope:Host
    UP LOOPBACK RUNNING MTU:65536 Metric:1
    RX packets:7401217 errors:0 dropped:0 overruns:0 frame:0
    TX packets:7401217 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:1
    RX bytes:1024702701 (977.2 MiB) TX bytes:1024702701 (977.2 MiB)

    ovs_eth0 Link encap:Ethernet HWaddr 00:11:32:DE:06:B9
    inet addr:192.168.1.140 Bcast:192.168.1.255 Mask:255.255.255.0
    inet6 addr: fe80::211:32ff:fede:6b9/64 Scope:Link
    UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
    RX packets:1067396 errors:0 dropped:0 overruns:0 frame:0
    TX packets:271009 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:1
    RX bytes:229338647 (218.7 MiB) TX bytes:687480398 (655.6 MiB)

    ovs_eth1 Link encap:Ethernet HWaddr 00:11:32:DE:06:BA
    inet addr:192.168.1.141 Bcast:192.168.1.255 Mask:255.255.255.0
    inet6 addr: fe80::211:32ff:fede:6ba/64 Scope:Link
    UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
    RX packets:1730965 errors:0 dropped:0 overruns:0 frame:0
    TX packets:907134 errors:0 dropped:0 overruns:0 carrier:0
    collisions:0 txqueuelen:1
    RX bytes:236106863 (225.1 MiB) TX bytes:6816002154 (6.3 GiB)

    SSH command I ran:
    sudo docker network create -d macvlan -o parent=ovs_eth0 –subnet=192.168.1.0/24 –gateway=192.168.1.1 –ip-range=192.168.1.250/27 PiHole_Network

    PiHole_Bridge
    Driver: bridge
    Subnet 192.168.10.0/24
    IP Range: 192.168.10.2/32
    Gateway: 192.168.10.1
    IPv6: Disabled
    Container: PiHole-Vlan

    PiHole_Network
    Driver: macvlan
    Subnet 192.168.10.0/24
    IP Range: 192.168.1.250/27
    Gateway: 192.168.1.1
    IPv6: Disabled
    Container: PiHole-Vlan

    192.168.1.250/admin shows, the site can’t be reached, took too long to respond

    1. Any reason why you used /27 in the macvlan creation command? That could be it, since /32 is what will give you that individual IP. Can you run an IP scan on your local network to see if it was assigned a different IP?

  18. Hey! Thanks for the tutorial.

    I just wanted to suggest maybe recommending nano instead of vi to edit these config files. If nano is installed on these NAS, it’s a whole lot easier to handle than vi(m). Sure a vim expert can be much faster with it, but for many people here they will only take a long time to get this one edit done and likely not touch vi again any time soon.

    Regards, Sam

    1. Thanks for the feedback! I completely agree that nano is significantly easier to work with than vi, but I don’t think nano comes installed on a Synology NAS, so it requires a few additional install steps. I could certainly be wrong though, so I will try and point out that there are other text editors that can be used in future videos!

  19. Awesome write up and very clear instructions! Thank you for taking the time to walk us through. I was using the basic setup prior with DCHP running though pihole to see all clients since my night hawk router gateway was the only client showing. I was hoping the macvlan would solve that issue so I could revert back to my router handing out IPs, but still only seeing only 192.168.1.1 for all requests. Do you have any advice, or would you just trust pihole for DHCP? I also loved your video on setting up a backup pi in the event the synology were to go down. This inspired me to grab a zero and get it going. Again, awesome stuff and great work! Thank you

    1. Thanks so much! You are on the right track that using Pi-hole as DHCP or manually connecting each client to it is the best way to get it to show each IP address. Both options are solutions, but it depends how you’d like to handle it. If you want all devices to run through Pi-hole automatically, either leaving it as-is or letting Pi-hole handle DHCP would be your best option. If you only have a few devices and don’t mind setting their DNS servers manually, that will also solve the problem.

      Let me know if I can help in any other way!

  20. Thank you for this really good guideline to enabling the Pi-Hole setup on a synology with the macvlan interface.
    I was wondering why I still got so much ads and figured out that this was due to IPv6 within my network.

    Maybe you want to give a hint about that and even better show how to configure it appropriate for the macvlan interface as well.
    Within my AVM Fitz!Box I have now configured DHCP DNS hosts for lookup and currently happy with it.

    Again, thanks a lot and best regards

    1. Thanks so much! I will keep this in mind for a future tutorial!!

Leave a Reply

Close Menu