Configuring Exit Nodes for Internet Traffic
Exit nodes route all internet-bound traffic from your devices through a designated routing peer. This guide explains how to configure default routes for internet traffic.
This feature requires NetBird version 0.27.0 or later.
Concepts
Default Routes
A default route (0.0.0.0/0 for IPv4) directs all internet traffic through a designated routing peer.
IPv6 traffic is currently not supported and is blocked to prevent unintentional leakage.
Routing Peer
The routing peer acts as the exit node for internet traffic. It applies masquerading so that traffic appears to originate from the routing peer's public IP address.
Distribution Groups
Peers in the distribution groups send their internet traffic through the routing peer once it connects.
Exit Node Selection and Auto Apply
Administrators configure exit nodes from the dashboard and can enable Auto Apply to have clients automatically use the exit node.
- Auto Apply: When enabled, clients automatically use the exit node. Users can still disable it manually on their device.
- Client override: If a user selects or deselects an exit node on their device, that choice takes precedence over the server configuration.
The client user's explicit selection or deselection always takes precedence on that device.
Auto Apply requires NetBird client version 0.55.0 or later.
Existing Exit Node Routes
Exit node routes created before the Auto Apply feature was introduced are treated as having Auto Apply enabled. This preserves the previous behavior where exit nodes were applied automatically.
Clients running v0.55.0 or later auto-apply these routes unless the user has explicitly selected or deselected an exit node. Administrators can change the Auto Apply setting at any time.
Configuration Steps
1. Open the Peers Tab
Navigate to the NetBird dashboard and select the Peers tab.

2. Select the Routing Peer
Choose the peer that will serve as your exit node.

3. Configure the Exit Node
Click Add Exit Node. In the dialog, assign one or more distribution groups to specify which peers should use this exit node.

To make the exit node available without automatic activation, disable Auto Apply. Users can then enable it manually.

Click Add Exit Node to complete the configuration. Masquerading is enabled by default.
4. Verify the Configuration
Check the peer view to confirm the routing peer is marked as an exit node.

5. Configure DNS
Add a DNS server with the match domain set to ALL. Local DNS servers may not be accessible from the routing peer, and this also prevents DNS-based location leaks.
See Manage DNS in your network for details.
Disabling Default Route Installation
In some scenarios, you may want an exit node to be enabled on a peer without automatically routing all host traffic through the tunnel. For example, when you need custom policy-based routing or want to manage routes externally.
The --disable-default-route CLI flag prevents the default route (0.0.0.0/0) from being installed into the system routing table while preserving the WireGuard AllowedIPs configuration. This means WireGuard will still accept and encrypt traffic for all destinations, but the operating system won't automatically send all traffic into the tunnel unless your own routing rules direct it there.
netbird up --disable-default-route
This flag only affects the system routing table. WireGuard AllowedIPs remain configured as usual, so traffic explicitly routed into the WireGuard interface will still be handled correctly.
High Availability
Exit nodes support high availability configurations. See Creating Highly Available Routes for more information.

