TL;DR — Quick Summary

Deploy NetBird as a self-hosted WireGuard mesh VPN. Connect devices across networks with zero-config peer discovery, SSO authentication, access control lists, and a management dashboard.

Why NetBird?

Traditional VPNs route everything through one server. NetBird creates a peer-to-peer mesh using WireGuard:

  • Peer-to-peer — Direct device-to-device tunnels, no central bottleneck.
  • Zero config — No port forwarding, no static IPs, no manual key exchange.
  • SSO login — OIDC authentication (Google, Azure AD, Okta, Keycloak).
  • Access control — ACLs by device, user, or group.
  • NAT traversal — Works behind any firewall.
  • Fully self-hosted — Management, signal, and TURN servers.
  • Multi-platform — Linux, macOS, Windows, iOS, Android.

Prerequisites

  • Docker with docker-compose for self-hosting the management server.
  • OIDC provider (Keycloak, Google, Azure AD) for authentication.

Architecture

ComponentPurposeSelf-Hosted?
Management serverWeb UI, ACLs, peer registryYes
Signal serverPeer discovery and negotiationYes
STUN/TURN serverNAT traversal and relayYes (coturn)
NetBird agentWireGuard tunnel on each deviceClient install

NetBird vs VPN Alternatives

FeatureNetBirdTailscaleWireGuard (raw)OpenVPN
TopologyMesh P2PMesh P2PPoint-to-pointHub-and-spoke
Self-hosted controlFullyHeadscale onlyManualYes
NAT traversalBuilt-inBuilt-inManualNeeds port forward
SSO/OIDCBuilt-inBuilt-inNoPlugin
ACLsBuilt-inBuilt-iniptablesServer config
Management UIWeb dashboardWeb dashboardCLI onlyCLI / web
Open sourceFullyClient onlyFullyFully
CostFree (self-hosted)Free / $6/userFreeFree

Access Control Examples

RuleEffect
Developers → StagingDevs can reach staging servers
Developers ⊘ Production-DBDevs cannot reach production databases
All → DNS ServerEveryone can reach internal DNS
Mobile → Office-PrintersMobile devices can print on office network

Troubleshooting

ProblemSolution
Peer not connectingCheck agent is running and authenticated; verify STUN/TURN server reachable
High latencyConnection may be relayed via TURN; check NAT type (symmetric NAT is hardest)
SSO login failsVerify OIDC config in management server; check redirect URIs
Device not showing in dashboardRe-authenticate agent: netbird down && netbird up

Summary

  • WireGuard mesh VPN — peer-to-peer tunnels, no central bottleneck.
  • Fully self-hosted — management, signal, and TURN servers.
  • SSO + ACLs — enterprise-grade access control.
  • Zero-config — no port forwarding or manual key exchange.