Block Inbound Connections

The Block Inbound Connections setting prevents all inbound connections to the local machine and any networks it routes. When enabled, the NetBird client will drop all incoming peer traffic — including peer-to-peer connections, routed network traffic, and SSH — regardless of access control policies configured in the management service.

This is a client-side override that takes precedence over any policies received from the management service.

When to use it

  • Outbound-only peers: A machine that only needs to access remote resources but should never be reachable by other peers.
  • Temporary lockdown: Quickly block all inbound access to a machine without modifying server-side policies.
  • Defense-in-depth: Add a client-side layer of protection alongside your access control policies.

What it blocks

When Block Inbound Connections is enabled, the client will not add any inbound firewall rules. This means:

  • Peer connections: Other peers cannot initiate connections to this machine.
  • Routed network traffic: If this peer acts as a routing peer, inbound traffic to its routed networks is also blocked.
  • SSH access: NetBird SSH connections to this peer are blocked.

Enabling via the system tray

  1. Click the NetBird icon in the system tray.
  2. Go to Settings.
  3. Click Block Inbound Connections to toggle the setting.

When enabled, a checkmark will appear next to the menu item.

Enabling via the CLI

You can enable Block Inbound Connections when starting the NetBird client:

netbird up --block-inbound

To disable it, run:

netbird up --block-inbound=false