Internal DNS Servers
When your network has on-premise DNS infrastructure — Active Directory, BIND, Unbound, or other internal DNS servers — you may need to configure NetBird to use them. This page covers when a nameserver configuration is needed and when it isn't.
When You Don't Need a Nameserver
If you just need access to a few internal resources by domain name, you don't need to configure a nameserver. Create a Network resource with the internal domain name (e.g., fileserver.corp.local) and an access control policy allowing your peers to reach it. The routing peer will resolve the DNS and route traffic to that resource. This works as long as the routing peer itself can resolve the domain.
You can also use wildcard domains as resources (e.g., *.corp.local), but this will route all traffic to those domains through the routing peer. For more granular access to resources, we recommend using single domain names.
Domain Resources and Routing Peer DNS
When you define a Network resource using a domain name (e.g., crm.corp.local), the routing peer resolves that domain using its own local DNS configuration. The client sends DNS queries to the routing peer, which looks up the domain and returns the result.
This means the routing peer must be able to resolve the domain. If it can't — for example, a Linux routing peer that isn't configured to use your Active Directory DNS — domain resource lookups will fail.
To fix this, add the routing peer's group as a distribution group on the internal Nameserver:
- Go to DNS → Nameservers
- Edit your internal DNS nameserver (or create one if it doesn't exist)
- Add the routing peer's group to the Distribution Groups
- Under Domains, ensure your internal domains are listed (e.g.,
corp.local) - Save
This ensures the routing peer receives the nameserver configuration and can resolve internal domains on behalf of clients.
This applies to all domain-based resources, not just Active Directory domains. Any routing peer that needs to resolve internal domain names must have the corresponding nameserver distributed to its group.
Configuring Nameservers for Internal Domains
To resolve internal domains through NetBird, create a match domain Nameserver pointing to your internal DNS server:
- Go to DNS → Nameservers → Add Nameserver
- Choose Custom DNS
- Add the IP addresses of your internal DNS servers (e.g.,
192.168.0.32) - Select the Distribution Groups — the peer groups that should use this nameserver
- Under Domains, add a Match Domain and enter your internal domains (e.g.,
corp.local,company.internal)
- Save the nameserver
Peers in the distribution groups will use your internal DNS server for the specified domains, while all other domains continue to resolve normally.
Configure 2-3 nameserver IPs for redundancy. If the first fails, peers automatically try the next one.
Private DNS Behind Routing Peers
If your internal DNS server is on a private network (not directly reachable by peers), you need to set up routing in addition to the nameserver configuration above. This is common when your DNS server is on an office LAN or cloud VPC that only the routing peer can access.
Create a Network Resource so peers can reach the DNS server through the routing peer:
- Go to Networks → Add Network
- Add a resource with the DNS server's IP (e.g.,
192.168.0.32/32) - Assign the resource to a group (e.g., "Internal DNS")
- Add the routing peer that can access the private network
For details, see Networks.
Create an Access Control Policy allowing DNS traffic from your peers to the DNS server:
- Source: Your user groups (e.g., "Remote Developers")
- Destination: The DNS resource group (e.g., "Internal DNS")
- Protocol: UDP, Port: 53
For details, see Manage Network Access.
Primary vs Match Domain Nameservers
- Match domain: Handles queries for specific domains (e.g.,
corp.local). Adding a domain automatically matches all its subdomains. - Primary: Handles all queries not matched by other nameservers. To create a primary nameserver, leave the Match Domains section empty.
Each peer should have exactly one primary nameserver. If you don't configure a primary, peers use their original DNS settings for non-matched queries.
Search Domains
Toggle Mark match domains as search domains to enable domain suffix searching. When enabled, typing server expands to server.company.internal. Only applies to match domain nameservers.
Example: Split-Horizon DNS
A common setup with two nameservers:
Primary (internet): Select a predefined provider like Cloudflare (1.1.1.1, 1.0.0.1). Assign to "All Peers". Leave match domains empty.
Match domain (internal): Choose Custom DNS with your internal DNS server IPs (e.g., 10.0.0.1, 10.0.0.2). Assign to "All Peers". Add match domain company.internal. Enable search domains.
Result:
google.com→ Cloudflareapp.company.internal→ Internal DNS (10.0.0.1)server→ Expanded toserver.company.internal→ Internal DNS
DNS Failover and Overlapping Domains
Configure multiple nameserver IPs within a single nameserver entry for automatic failover. The client tries servers in order.
If multiple nameservers match a query, the most specific match wins:
Query: app.us-east.company.internal
Nameservers:
1. company.internal → DNS1
2. us-east.company.internal → DNS2
Result: Uses DNS2 (more specific)
Managing Nameservers
Editing
- Navigate to DNS → Nameservers
- Click the nameserver to edit
- Modify settings and click Save
Changes propagate to peers within 10-30 seconds. No peer restart required.
Temporarily Disabling
Edit the nameserver and toggle Enable Nameserver to OFF. Peers stop using it but the configuration is preserved.
Deleting
Before deleting a primary nameserver, create a new primary first, or peers will revert to their original DNS settings.
- Click the nameserver
- Click Delete and confirm
Active Directory & Domain Controllers
Active Directory (AD) environments have specific DNS requirements because Domain Controllers (DCs) run their own DNS services and rely on DNS for core AD functionality like domain joins, authentication, and service discovery.
Domain Controllers as Routing Peers
We do not recommend using Domain Controllers as routing peers. If you must, you need to disable DNS management for the DC's group. If NetBird manages DNS on a Domain Controller, it can interfere with the AD DNS services that the DC depends on.
To configure this:
- Create a dedicated group for your Domain Controllers (e.g., "Domain Controllers")
- Go to DNS → DNS Settings
- Add the Domain Controller group to Disable DNS management for these groups
- Save Changes
This prevents NetBird from modifying the DC's DNS configuration while still allowing the DC to act as a routing peer. The DC continues using its own DNS for Active Directory services.
For more details on DNS management modes, see DNS Settings.

