Skip to content

AdGuard Home in Container Manager on a Synology NAS

Important or Recent Updates
Historic UpdatesDate
Updated guide for Container Manager and using MacVLAN13/05/2023
Added a new section to ensure DSM continues having network access.02/06/2023
Guide updated so you can choose between Macvlan or Bridge mode12/08/2023
Added additional security option to the compose to restrict the container from gaining new privileges25/10/2023
Removed the requirement for the synobridge as this container can just use its own bridge, and added the Host network mode, so all three are a choice.21/01/2024
Historic Updates


What is AdGuard Home?

AdGuard Home is network-wide software for blocking ads and tracking. After you set it up, it’ll cover all your home devices it even includes a parental control solution, just like a PiHole it acts as your home network DNS server and will block advertising on any site you visit.

This guide will get you set up with AdGuard and cover some basic initial settings, I recommend checking out the documentation for all the various features available.

Host vs Macvlan vs Bridge Network Modes

Host:

Host mode uses your NAS underlying network to run the containers network services, so it will be reliant on the NAS not using any of the required ports for the container. However, this makes it easy to set up, but you need to make sure no other service is using the required ports. All your clients will appear correctly as independent devices and stats.

Macvlan:

This gives you the benefit of AdGuard having its own IP address on your network, all clients appear with their real IP addresses allowing you to assign specific rules and give you some nicer stats just like Host mode. However, one downside is that your NAS will not be able to use AdGuard for DNS, due to the additional security features of Macvlan and its communication with its host. This is generally not an issue unless you wanted to use you AD blocking with Tailscale.

Bridge Mode:

The main benefit of Bridge Mode will be the ease of setup however you will find that all clients on your network will appear under the same IP as the Bridge 172.20.0.1. This won’t impact ad blocking, but it will mean you can’t apply device specific device rules etc.

Let’s Begin

In order for you to successfully use this guide you will need to check that your Router allows you to change your network DNS servers, this is usually found in the DHCP settings.

Please follow the initial guide below to get a restricted Docker user in place and then come back here

Folder Setup

Let’s start by getting some folders set up for the container to use. Open up File Station create the following.

Folders
/docker/projects/adguard-compose
/docker/adguard
/docker/adguard/work
/docker/adguard/conf

Container Manager

Next we are going to set up a ‘Project’ in Container Manager. Open up Container Manager and click on Project then on the right-hand side click ‘Create’.

In the next screen we will set up our General Settings, enter the following:

SectionSetting
Project Name:adguard
Path:/docker/projects/adguard-compose
Source:Create docker-compose.yml

Next we are going to drop in our docker compose configuration, copy all the code in from the appropriate version of the container you want to run below and paste it into line ‘1’ just like the screenshot.

What on earth is a Docker Compose?
Docker Compose allows us to define how Docker should set up one or more containers within a single configuration file. This file is yaml formatted and Container Manager uses the Projects feature to manage them.

Please note you will not be able to use Macvlan with a Bonded network connection e.g. ‘Bond0’. You will need to remove the bond in order to use this method.

Host Mode

YAML
services:    
  adguardhome:
    image: adguard/adguardhome
    container_name: adguardhome
    volumes:
      - /volume1/docker/adguard/conf:/opt/adguardhome/conf
      - /volume1/docker/adguard/work:/opt/adguardhome/work
    network_mode: host
    security_opt:
      - no-new-privileges:true
    restart: always

Macvlan

YAML
services:    
  adguardhome:
    image: adguard/adguardhome
    container_name: adguardhome
    volumes:
      - /volume1/docker/adguard/conf:/opt/adguardhome/conf
      - /volume1/docker/adguard/work:/opt/adguardhome/work
    networks:
      macvlan:
        ipv4_address: 192.168.0.129
    security_opt:
      - no-new-privileges:true
    restart: always

networks:
  macvlan:
    name: macvlan
    driver: macvlan
    driver_opts:
      parent: eth0
    ipam:
      config:
        - subnet: "192.168.0.0/24"
          ip_range: "192.168.0.254/24"
          gateway: "192.168.0.1"

Bridge Mode

YAML
services:    
  adguardhome:
    image: adguard/adguardhome
    container_name: adguardhome
    volumes:
      - /volume1/docker/adguard/conf:/opt/adguardhome/conf
      - /volume1/docker/adguard/work:/opt/adguardhome/work
    ports:
      - 53:53/udp
      - 3000:3000/tcp
    security_opt:
      - no-new-privileges:true
    restart: always

If you are setting up the Bridge or Host Mode versions you can now press next and jump ahead in the guide to Web portal settings for Macvlan continue on below.

Settings Amendments for the MacVLAN

OK we now need to make some edits to the compose in order for it to work on your Network.

I have broken down the edits needed in this table it includes the line numbers and an explanation of what to edit.

SectionExplanation
Line 10
ipv4_address: 192.168.0.122
Change to the IP address you want to use for the container. Make sure this is available and not in use by another device on your network.
Line 20
parent: eth0
This defines the network interface the container should use, I have used eth0 which will be the first Ethernet port on your NAS. If you want to use a different port change it accordingly.

Note! If you have Virtual Machine Manager installed change this to ovs_eth0
Line 23
subnet: “192.168.0.0/24”
We need to change this in line with your networks’ subnet – in the example I have used 192.168.0.0/24. The super quick way to work out what to use is just take the IP of your NAS and change the final digit before the /24 to 0
Line 24
ip_range: “192.168.0.254/24”
This has to be changed to the highest available IP address within the range of your subnet. Again if your network is in the 192 range the final number used from the subnet above can be changed to 254 and added to this section.
Line 25
gateway: “192.168.0.1”
This will be the IP address of your Router/Gateway/DHCP Server

Once you have made the edits you can click ‘Next’

Web portal settings

You do not need to enable anything on the ‘Web portal settings’ screen click ‘Next’ again.

On the final screen click ‘Done’ which will begin the download of the container images and once downloaded they will be launched!

The image will now be downloaded and extracted. You should see ‘Code 0’ when it has finished.

You will now see your AdGuard running and should have a green status on the left-hand side.

You should now be able to access the web interface via

Macvlan = the IP you specified in the compose followed by the port 3000
OR
Bridge or Host = Your NAS IP followed by the port 3000

Initial Setup

You will now do some initial setup steps

Step 1 – click ‘Get Started’

Step 2 – You will be asked to choose the network interfaces AdGuard will listen to for DNS requests and the Web Interface. Leave these set to ‘All Interfaces’ but change the Port for the Web Interface from 80 to 3000.

You will notice the IPs highlighted in Red in the screenshot will be either 127.0.0.1 or 172.20.0.1 do not use these as suggested by the UI as they will not work.

Click ‘Next’

Step 3 – You will be required to set up a Username and Password to access the Web UI. Fill these in (You could follow the Vaultwarden guide to get a password manager setup if you don’t have one already)

Step 4 – Configure your devices

The DNS address to use on your device or router/dhcp server will be

Bridge Mode or Host Mode = IP address of your NAS
MACVLAN Mode = IP address you assigned in the compose file

The addresses shown on the final screen in Red may show different IPs use the one I suggest above.

Click on Open Dashboard and you will be taken to the login screen.

Now log in to your account.

Once your devices start to update with the new DNS server IP you will begin seeing traffic in your Dashboard. (This can take up to 24 hours)

From here you can set up some initial settings such as additional ‘Filters’ (blocklists) or define additional upstream DNS providers who handle the requests that make it past the filters in Settings > DNS Settings.

More settings can be found here

You are ready to roll 🙂

FAQ:

What ports does AdGuard use?
The ports below are used by AdGuard, if you use Bridge Mode above and want to use any of the additional services you will need to add them.

PortProtocolUsed For
53TCP/UDPDNS
853TCPDNS over TLS
443TCPHTTPS/DNS over HTTPS
784UDPDNS over QUIC
8853UDPDNS over QUIC
67IPv4 UDPDHCP – Only used when the ipv4 DHCP server is enabled.
68TCPDHCP – Only used when the ipv4 DHCP server is enabled.
68UDPDHCP – Only used when the ipv4 DHCP server is enabled.
547IPv6 UDPDHCP – Only used when the ipv6 DHCP server is enabled.
3000TCPFor the WebUI

Looking for some help, join our Discord community

If you are struggling with any steps in the guides or looking to branch out into other containers join our Discord community!

Buy me a beverage!

If you have found my site useful please consider pinging me a tip as it helps cover the cost of running things or just lets me stay hydrated. Plus 10% goes to the devs of the apps I do guides for every year.

Published inAd-Blocking / DNS 7.2DockerSynology

65 Comments

  1. Matthew Matthew

    I’m getting this when trying to set up:

    validating ports: listen tcp 0.0.0.0:53: listen: address already in use

    • Dr_Frankenstein Dr_Frankenstein

      Do you already have something like Pi-hole in place that is using port 53?

  2. Takoyaki Takoyaki

    Hey Dr Frankenstein thank you for these guides. I had a kind of stupid question on VPN. I’ve follwed your incredibly helpful guides to setup Tailscale with an Exit Node on my NAS. I’ve also setup Adguardhome and have figured out how to add that successfully into Tailscale also. I’ve also setup cloudflare tunnels separately for access to overseerr.

    So now to my question – do I need a VPN like NOrdvpn or wireguard or similar to complement this setup? I noticed it in the guide you have for Gluetun VPN./ qbittorrent. I don’t use torrents at the moment BUT I do have SANZBD and IPTV though….

    I’d like to ensure I’m completely covered but embarassed to say it’s not abundantly clear if Tailscale and Adguardhome DNS is enough.

    • Dr_Frankenstein Dr_Frankenstein

      Hey, it really depends on whether you need to hide your Usenet or IPTV usage. Generally if your Usenet provider already knows who you are then the VPN is not providing any further protection on that front. The IPTV is inbound only traffic so unless there is some grey legality around that the addition of a VPN won’t really be warranted.

  3. Rex Rex

    Hi, thank you in advance. But I deployed the service according to the yml file in macvlan mode you provided, but it can’t be used. By the way, my environment has enabled VMM, so the physical network card is ovs_eth0, and the container cannot be accessed through the specified container IP. Have you ever encountered this?

  4. ramon ramon

    for ppl who want to have DoH with adguardhome on dsm 7.x
    copy the content of the following script https://gist.github.com/ramonskie/e91c2ebbde2903839566a38b25d3e18d
    to a location on your nas and create a task pointing to this script.

    edit the HOSTNAME variable to the domain you created with your jellyfin setup and set COPY_DEST_CERT_DIR to the right location

    add the following to your adguard docker-compose file
    “`
    volumes:
    – /volume3/docker/adguard/certs:/opt/adguardhome/certs
    “`

    now go the `adguard home` webpage
    settings>encryption-settings
    – select enable encryption
    – set certificate file path to `/opt/adguardhome/certs/fullchain.pem`
    – set a private key file to `/opt/adguardhome/certs/privkey.pem`

    the script wil now check if the certificate is newer than the certificate copied to `/volumes1/docker/adguard/certs`
    if its newer it will copies the new certificates and restarts the adguard container

    • euinor euinor

      Does this mean the script needs to be run every x period (90 days?) to handle the certificate renewal.

      Can we not just mount the Synology certs folder to the docker to provide access to adguard…

  5. Marco Gonzalez Marco Gonzalez

    you should probably remove network_mode: synobridge from line 8 in your Macvlan yaml as this causes an error when building.

    • Dr_Frankenstein Dr_Frankenstein

      Hey yeah in hindsight It’s probably not really needed for this container, I will drop it completely including the prerequisite to create it at the start of the guide.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

drfrankenstein.co.uk – writing Synology Docker Guides since 2016 – Join My Discord!