Site-to-Site Connectivity

Site-to-site connectivity allows you to connect entire networks together, enabling devices to communicate across locations without installing the NetBird client on every device.

Understanding Remote Access Scenarios

NetBird supports three distinct remote access scenarios. Understanding which one you need is the first step to a successful setup.

VPN-to-Site

A NetBird peer (device running the NetBird client) accesses devices on a remote network that don't have NetBird installed.

Your Laptop ──────► NetBird Tunnel ──────► Routing Peer ──────► Office Printer
  (peer)                                    (peer)              (clientless)

Common use cases:

  • Access your home NAS from anywhere
  • Reach office servers while traveling
  • Connect to IoT devices on a remote network

Implementation: Use Networks (recommended) or Network Routes

Site-to-VPN

A device without NetBird initiates connections to NetBird peers. This is the reverse of VPN-to-Site—the clientless device starts the connection.

Office Server ──────► Routing Peer ──────► NetBird Tunnel ──────► Your Laptop
 (clientless)           (peer)                                      (peer)

Common use cases:

  • Office monitoring systems pushing data to remote analysts
  • On-premise servers initiating backups to cloud peers
  • Legacy systems that must initiate outbound connections

Implementation: Requires Network Routes (Networks does not currently support this)

Site-to-Site

Devices on separate networks communicate with each other, with neither running NetBird directly. Each network has a routing peer that handles traffic.

Home NAS ──► Routing Peer ──► NetBird Tunnel ──► Routing Peer ──► Office Server
(clientless)    (peer)                              (peer)         (clientless)

Common use cases:

  • Connect branch office networks to headquarters
  • Link home networks of family members
  • Bridge on-premise data centers with cloud VPCs

Implementation: Requires Network Routes (Networks does not currently support this)

Exit Nodes

Exit nodes route all internet-bound traffic (0.0.0.0/0) through a designated peer, changing your apparent public IP address. Unlike the scenarios above, exit nodes handle internet egress rather than private network access.

Your Laptop ──────► NetBird Tunnel ──────► Exit Node ──────► Internet
  (peer)                                     (peer)

Common use cases:

  • Access region-restricted content while traveling
  • Route traffic through a trusted network for compliance
  • Mask your location for privacy

Implementation: Requires Network Routes

Which Scenario Do I Need?

I want to...ScenarioFeature to Use
Access home devices from my laptopVPN-to-SiteNetworks or Network Routes
Access office resources while travelingVPN-to-SiteNetworks or Network Routes
Let an office server connect to my laptopSite-to-VPNNetwork Routes only
Connect two home networks togetherSite-to-SiteNetwork Routes only
Link branch officesSite-to-SiteNetwork Routes only
Bridge cloud VPC with on-premise networkSite-to-SiteNetwork Routes only
Route all internet traffic through a specific peerExit NodeNetwork Routes only

How It Works

All scenarios use a routing peer—a device running NetBird that forwards traffic for its local network:

  1. Deploy a routing peer at each site (any device running NetBird with access to the local network)
  2. Configure routing to advertise each site's subnet through NetBird
  3. Set access policies to control which peers can reach which networks
  4. Configure clientless devices to route traffic through the routing peer (for Site-to-VPN and Site-to-Site)

VPN-to-Site Guides (Networks)

Access Home Devices

Access your NAS, home automation, and media servers from anywhere

Remote Worker Access

Enable employees to access office resources while working remotely

Cloud to On-Premise

Connect cloud workloads to on-premise databases and services

Site-to-Site Guides (Network Routes)

Connect Home Networks

Link multiple home networks so devices can communicate across locations

Connect Office Networks

Connect branch offices to headquarters and enable cross-site communication

Connect Cloud Environments

Bridge cloud VPCs across providers or connect cloud to on-premise

Advanced Configuration

Masquerade options, ACL Groups, and troubleshooting

Key Concepts

TermDescription
Routing peerA device running NetBird that forwards traffic for its local network
Clientless deviceA device that doesn't run NetBird (printers, IoT, legacy systems)
MasqueradeNAT that hides source IPs behind the routing peer's IP (simplifies routing configuration on clientless devices)

Networks vs Network Routes

NetBird offers two features for routing traffic to private networks: Networks (newer, simpler) and Network Routes (original, more flexible). Both are fully supported and will continue to be maintained.

Use Networks for VPN-to-Site scenarios where you want a guided setup experience and per-resource access policies.

Use Network Routes when you need Site-to-VPN or Site-to-Site connectivity, or require advanced options like disabling masquerade.

Scenario Support

ScenarioNetworksNetwork Routes
VPN-to-SiteYesYes
Site-to-VPNNoYes
Site-to-SiteNoYes

Detailed Comparison

CapabilityNetworksNetwork Routes
Setup complexitySimpler, guided UIMore manual configuration
Distribution groupsAutomatic (from policy sources)Explicit configuration required
Extra routing peer policyNo (implied by resource policies)Yes (must connect routing peers to distribution groups)
Per-route configurationNo (routing peers serve all resources)Yes (each route needs peer, groups, range)
Edit resources after creationYesNo
Wildcard domainsYesNo
Masquerade controlAlways onConfigurable
Exit node supportNoYes

Future Direction

The goal is to migrate all routing functionality into Networks for a unified experience. Network Routes will not be deprecated without advance notice, and any migration path will be documented. For now, use whichever feature fits your scenario.