Network Routes Use Cases
These guides show how to use Network Routes for Site-to-Site and Site-to-VPN connectivity—scenarios where clientless devices need to communicate across networks.
What Are Site-to-Site and Site-to-VPN?
Network Routes enables two connectivity patterns that go beyond standard VPN-to-Site access:
Site-to-Site connects two networks together, with neither end-device running NetBird. Each network has a routing peer that handles traffic forwarding.
Home NAS ──► Routing Peer ──► NetBird Tunnel ──► Routing Peer ──► Office Server
(no NetBird) (peer) (peer) (no NetBird)
Site-to-VPN allows clientless devices to initiate connections to NetBird peers—the reverse of VPN-to-Site.
Office Server ──────► Routing Peer ──────► NetBird Tunnel ──────► Your Laptop
(no NetBird) (peer) (peer)
For VPN-to-Site (NetBird peers accessing clientless devices), you can use either Networks (recommended for simplicity) or Network Routes.
Understanding Key Concepts
Network Routes provides several features that differentiate it from Networks and enable more advanced scenarios:
Masquerade
Masquerade controls whether the routing peer hides the original source IP address when forwarding traffic:
- Enabled (default) — The routing peer performs NAT, making traffic appear to originate from its own IP. Simpler setup since remote networks don't need return routes.
- Disabled — Original source IPs are preserved, enabling accurate audit trails. Requires manual route configuration on both ends.
Use masquerade when you want simple setup. Disable it when compliance or auditing requires source IP visibility.
Distribution Groups
Distribution Groups determine which peers receive the network route configuration. When you add peers to a distribution group, they automatically get the route—no manual configuration on each client.
For site-to-site scenarios, each site's routing peer should be in the other site's distribution group to receive routes back.
ACL Groups
ACL Groups provide route-level access control. When you assign an ACL Group to a Network Route:
- The route inherits access restrictions from policies targeting that group
- Only peers with policies granting access to the ACL Group can use the route
- Without an ACL Group, routes allow unrestricted access
If an ACL Group is assigned but no policies grant access to it, all routed traffic will be dropped.
High Availability
Deploy multiple routing peers for the same route to provide failover. NetBird clients automatically select the best available peer based on:
- Connection type (direct vs relayed)
- Defined metric priority (lower = higher priority)
- Connection quality
Why Use Network Routes?
Network Routes is required when you need:
- Site-to-Site connectivity — Connect two networks together
- Site-to-VPN connectivity — Clientless devices initiating connections
- Masquerade control — Preserve source IPs for auditing
- ACL Groups — Route-level access control
By Scenario
Site-to-Site: Home Networks
Connect multiple home networks so devices can communicate across locations
Site-to-Site: Office Networks
Connect branch offices to headquarters and enable cross-site communication
Site-to-Site: Cloud Environments
Bridge cloud VPCs across providers or connect cloud to on-premise
By Configuration
Exit Nodes
Route all internet traffic through a specific peer
Access Control
Use ACL Groups to control who can access routed networks
Overlapping Routes
Handle scenarios where multiple routes share the same CIDR
Advanced Configuration
Masquerade options, troubleshooting, and detailed configuration
Configuration Pattern
All Site-to-Site and Site-to-VPN scenarios follow this pattern:
- Deploy routing peers at each site
- Create network routes for each site's subnet
- Create access policies allowing routing peers to communicate
- Configure clientless devices to route traffic through the local routing peer
For step-by-step instructions, choose your scenario above. For technical details and troubleshooting, see Advanced Configuration.
Need Simpler VPN-to-Site Access?
If you only need NetBird peers to access remote resources (not site-to-site or site-to-vpn), the Networks feature offers a simpler setup experience with per-resource access control.

