Gardez le pare-feu sur la destination et les Synology source activés, mais n'ouvrez aucun ports Installez Tailscale via le centre de packages DSM sur la destination et la source. Suivez Documents Tailscale sur la façon d'activer les connexions sortantes Configurer la tâche de sauvegarde dans Hyper Backup sur la source Pour l'adresse IP du Synology de destination, utilisez l'adresse IP de cette machine qui est affichée dans la console Tailscale (n'utilisez pas l'adresse IP affichée dans DSM). Si vous parvenez à cliquer sur « Connexion » et à vous connecter avec succès à la machine de destination, vous devriez pouvoir lancer la sauvegarde. Assurez-vous que Hyper Backup Vault est en cours d'exécution sur la destination. Dans Hyper Backup sur la source, assurez-vous que la destination (alias "Cible") est en ligne et si c'est le cas, choisissez Sauvegarder maintenant pour lancer la sauvegarde. Enable outbound connections Synology DSM7 introduced tighter restrictions on what packages are allowed to do. If you're running DSM6, Tailscale runs as root with full permissions and these steps are not required. By default, Tailscale on Synology with DSM7 only allows inbound connections to your Synology device but outbound Tailscale access from other apps running on your Synology is not enabled. The reason for this is that the Tailscale package does not have permission to create a TUN device. To enable TUN, to permit outbound connections from other things running on your Synology device: Make sure you're running Tailscale v1.22.2 or later In Synology, go to Control Panel > Task Scheduler, click Create, and select Triggered Task. Select User-defined script. When the Create task window appears, click General. In General Settings, enter a task name, select root as the user that the task will run for, and select Boot-up as the event that triggers the task. Ensure the task is enabled. Click Task Settings and enter the following for User-defined script. /var/packages/Tailscale/target/bin/tailscale configure-host; synosystemctl restart pkgctl-Tailscale.service If you're curious what it does, you can read the configure-host code. Click OK to save the settings. Reboot your Synology device. Alternatively, to avoid a reboot, run the above user-defined script as root on the device to restart the Tailscale package. Your TUN settings should now be persisted across reboots of your device. Adjust Synology firewall settings By enabling TUN, Tailscale traffic will be subject to Synology's built-in firewall. The firewall is disabled by default. However, if you have it enabled, add an exception for the Tailscale subnet, 100.64.0.0/10. In Main menu > Control Panel > Security > Firewall, add a firewall rule in the default profile that allows traffic from the source IP subnet 100.64.0.0 with subnet mask 255.192.0.0.