Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.

License

NotificationsYou must be signed in to change notification settings

netbirdio/netbird

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 




Start using NetBird atnetbird.io
SeeDocumentation
Join ourSlack channel or ourCommunity forum

New: NetBird terraform provider


NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single platform, making it easy to create secure private networks for your organization or home.

Connect. NetBird creates a WireGuard-based overlay network that automatically connects your machines over an encrypted tunnel, leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Secure. NetBird enables secure remote access by applying granular access policies while allowing you to manage them intuitively from a single place. Works universally on any infrastructure.

Open Source Network Security in a Single Platform

Screen.Recording.2025-09-18.at.16.13.38.mov

NetBird on Lawrence Systems (Video)

Watch the video

Key features

ConnectivityManagementSecurityAutomationPlatforms
  • Kernel WireGuard
  • Linux
  • Peer-to-peer connections
  • Auto peer discovery and configuration
  • Mac
  • Connection relay fallback
  • Windows
  • IdP groups sync with JWT
  • Android
  • NAT traversal with BPF
  • Peer-to-peer encryption
  • iOS
  • OpenWRT
  • Docker

Quickstart with NetBird Cloud

Quickstart with self-hosted NetBird

This is the quickest way to try self-hosted NetBird. It should take around 5 minutes to get started if you already have a public domain and a VM.Follow theAdvanced guide with a custom identity provider for installations with different IDPs.

Infrastructure requirements:

  • A Linux VM with at least1CPU and2GB of memory.
  • The VM should be publicly accessible on TCP ports80 and443 and UDP ports:3478,49152-65535.
  • Public domain name pointing to the VM.

Software requirements:

  • Docker installed on the VM with the docker-compose plugin (Docker installation guide) or docker with docker-compose in version 2 or higher.
  • jq installed. In most distributionsUsually available in the official repositories and can be installed withsudo apt install jq orsudo yum install jq
  • curl installed.Usually available in the official repositories and can be installed withsudo apt install curl orsudo yum install curl

Steps

  • Download and run the installation script:
export NETBIRD_DOMAIN=netbird.example.com; curl -fsSL https://github.com/netbirdio/netbird/releases/latest/download/getting-started-with-zitadel.sh| bash
  • Once finished, you can manage the resources viadocker-compose

A bit on NetBird internals

  • Every machine in the network runsNetBird Agent (or Client) that manages WireGuard.
  • Every agent connects toManagement Service that holds network state, manages peer IPs, and distributes network updates to agents (peers).
  • NetBird agent uses WebRTC ICE implemented inpion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
  • Connection candidates are discovered with the help ofSTUN servers.
  • Agents negotiate a connection throughSignal Service passing p2p encrypted messages with candidates.
  • Sometimes the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT) and a p2p connection isn't possible. When this occurs the system falls back to a relay server calledTURN, and a secure WireGuard tunnel is established via the TURN server.

Coturn is the one that has been successfully used for STUN and TURN in NetBird setups.

See a completearchitecture overview for details.

Community projects

Note: Themain branch may be in anunstable or even broken state during development.For stable versions, seereleases.

Support acknowledgement

In November 2022, NetBird joined theStartUpSecure program sponsored by The Federal Ministry of Education and Research of The Federal Republic of Germany. Together withCISPA Helmholtz Center for Information Security NetBird brings the security best practices and simplicity to private networking.

CISPA_Logo_BLACK_EN_RZ_RGB (1)

Testimonials

We use open-source technologies likeWireGuard®,Pion ICE (WebRTC),Coturn, andRosenpass. We very much appreciate the work these guys are doing and we'd greatly appreciate if you could support them in any way (e.g., by giving a star or a contribution).

Legal

This repository is licensed under BSD-3-Clause license that applies to all parts of the repository except for the directories management/, signal/ and relay/.Those directories are licensed under the GNU Affero General Public License version 3.0 (AGPLv3). See the respective LICENSE files inside each directory.

WireGuard and theWireGuard logo areregistered trademarks of Jason A. Donenfeld.

About

Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Sponsor this project

 

Packages

 
 
 

Languages


[8]ページ先頭

©2009-2025 Movatter.jp