Skip to content

Installation Guide

This guide walks through every step required to deploy a self-hosted NetBird instance for GSISG, connect both office networks, integrate with Microsoft Entra ID, and roll out the client to approximately 200 Windows machines via TacticalRMM.

NetBird high-level architecture showing management server, routing peers, and client endpoints

What we are building:

ComponentLocationPurpose
Management ServerAzure B2s VM, West US 3Runs all NetBird server services (Management, Signal, Relay, STUN) behind Traefik with auto-TLS
Honolulu Routing Peergsi-nb-hnl-01 (10.100.7.50) on DATA003 or DATA004 Hyper-VRoutes remote users into the 10.100.7.0/24 LAN
Boulder Routing Peergsi-nb-bld-01 (10.15.0.50) on DATA001 or DATA007 Hyper-VRoutes remote users into the 10.15.0.0/24 LAN
Windows Clients~200 laptopsNetBird agent deployed silently via TacticalRMM

Identity: Microsoft Entra ID (Azure AD) added as an external IdP alongside NetBird’s built-in local authentication. Users sign in with their existing corporate credentials.

Complete these before starting Step 1.

  • Azure subscription with permission to create VMs, NSGs, and public IPs
  • Ability to create DNS A record for netbird.gsisg.com
  • Access to the GSISG Entra ID tenant (App Registration permissions)
  • Hyper-V capacity on DATA003 or DATA004 (Honolulu) for a small Ubuntu 24.04 VM
  • Hyper-V capacity on DATA001 or DATA007 (Boulder) for a small Ubuntu 24.04 VM
  • Reserved IPs: 10.100.7.50 (Honolulu), 10.15.0.50 (Boulder)
  • TacticalRMM admin access for script deployment
  • Outbound internet access on TCP 443 from all client machines (for management, signal, and relay)
  • Outbound UDP 3478 from all client machines (for STUN/NAT traversal)
  • No inbound ports required on office firewalls
  • Docker with docker-compose plugin, jq, curl (installed in Step 1)
  • NetBird MSI installer URL: https://github.com/netbirdio/netbird/releases/latest/download/netbird_installer_windows_amd64.msi

Follow these steps in order. Each step builds on the previous one.

StepTitleTime Estimate
Step 1Management Server30-45 min
Step 2Entra ID Integration20-30 min
Step 3Routing Peers45-60 min
Step 4Access Policies20-30 min
Step 5Client Deployment30-45 min (pilot), days (full rollout)
Step 6Verification and Monitoring30-45 min

Total estimated time (excluding full rollout): 3-4 hours for a single administrator.

These decisions are baked into the steps that follow:

  1. Quickstart deployment method — uses the combined netbird-server container (Management + Signal + Relay + STUN in one image) with built-in Traefik for auto-TLS. This is the recommended approach for new deployments.

  2. Management Setup (Recommended) for Entra ID — adds Entra ID as an external identity provider alongside NetBird’s embedded IdP. Local admin accounts remain as a break-glass fallback.

  3. Network Routes (not Networks) for site-to-site routing — the newer “Networks” feature does not yet support bidirectional site-to-site routing between offices, so Network Routes are required.

  4. Masquerade ON for all routes — simplifies configuration by eliminating the need for return routes on office network equipment.

  5. SQLite database — sufficient for ~200 peers. Can be migrated to PostgreSQL later if needed.

  6. --network-monitor=false on Windows clients — required during the GlobalProtect coexistence period to prevent interface conflicts.