Networks

NetBird provides a fast and secure peer-to-peer mesh network with end-to-end encryption, enabling devices and machines running the NetBird agent to connect directly. This setup allows for precise network segmentation, isolation of individual machines, and secure remote access without the need to open ports or expose resources to the internet. However, there are situations where installing the agent on every machine is not feasible or hasn't been completed, requiring access to entire LANs, office networks, or cloud VPCs instead.

Starting from version 0.35.0, NetBird introduces Networks, a new concept that allows you to map your internal networks such as LANs, VPCs, or office networks, and manage access to internal resources without installing NetBird agent.

high-level-dia

Concepts

Networks

Networks are configuration containers that map your on-premise or cloud networks in a logical set of configurations, making it easier to visualise and manage access to your internal resources. You can create multiple networks to represent your different environments, such as office networks, cloud VPCs, or on-premise LANs.

high-level-dia

Routing peers

To access your internal resources, you need to route traffic from your NetBird peers to your internal networks. Routing peers are Linux machines that connect your NetBird peers and your internal networks. You can add as many routing peers as you need using single peers or groups to ensure high availability and load balancing. You can define masquerading and priority for each routing peer.

high-level-dia

Resources

Resources are individual machines, services, or subnets within your internal network. You can define resources as single IP addresses, IP ranges, domain names, or wildcard domains (e.g., *.company.internal) when enabling DNS wildcard routing.

resources

Manage access to resources

To manage access to resources, you can assign them to groups and create access control policies to define which peers can access them. See the image below with an example resource CRM:

resource-group

Access control policies are rules that define which peers can access the resources in your network. You can create policies based on the source and destination groups, and the type of traffic allowed (e.g., TCP, UDP, ICMP). The groups assigned to resources should always be placed in the destination input field of the policy. The peers belonging to the source groups will receive the resources linked to the policy and the firewall rules will be applied according to what is defined. See the example below with a policy that allows the group Berlin Office to access the internal CRM system:

resource-acl

Enable DNS wildcard routing

When you configure wildcard domains as resources, you need to enable DNS wildcard routing. Which has an additional effect in comparison to the previous DNS routes behavior from Network routes; it switches the DNS resolution to the routing peer instead of the local client system. This is also useful for regular DNS routes when you want to resolve the domain names using the routing peer's IP infrastructure, which will allow for more restricted access control rules in newer versions of the clients (1) and for the traffic to go to a near routing peer service.

You can enable DNS resolution on the routing peer by accessing your account Settings > Networks > Enable DNS wildcard routing. See example below:

settings-acl

Differences between Networks and Network Routes

NetworksNetwork routes
Requires extra policy connecting routing peers to distribution peers?No, the connection is implied when a policy is added to control access to resourcesYes, the routing peers need to have a policy that connects them to peers in the distribution groups
Needs distribution groups?No, the source groups in the policies define the distribution groupsYes, they need to be explicitly defined per network route configured
Requires adding full sets of configurations per routed resource?No, the routing peers in a Network are used to route all resources in that networkYes, every network route needs to have a routing peer, distribution group, access control group, and the network range or DNS route
Allows edit routed resources?Yes, you can edit ranges or domainsNo, you can't edit IP ranges or DNS routes once created
Allows edit names?Yes, names are editableNo, names are defined once while creating the route
Support to wildcard domains?Yes, wildcard domains are supportedNo, network routes are limited to individual domains
Support for exit-nodes?No, even though that exit-nodes can be linked to on-premises or cloud networks, they invalidate other resourcesYes, but the same note is valid when using an exit-node to route other traffic to the same resources
Support for site-2-site IP ranges routing?No, but support is plannedYes, when you create a network route without access control groups

Get started