Skip to content

Step 4: Access Policies

NetBird operates on a zero-trust model: no peer can communicate with another peer unless an explicit policy allows it. This step creates the groups and policies that define who can access what.

Access control policies overview

NetBird ships with a “Default” policy that allows all peers to communicate with all other peers on all protocols. This completely undermines zero-trust and must be removed once your replacement policies are in place.

Navigate to the Peers or Groups page and create these groups. Some already exist from setup key auto-assignment (Step 3).

These were auto-created by setup keys in Step 3:

GroupMembersPurpose
HNL-Routing-Peersgsi-nb-hnl-01, gsi-nb-hnl-02 (HA)Honolulu routing peers
BLD-Routing-Peersgsi-nb-bld-01, gsi-nb-bld-02 (HA)Boulder routing peers
GroupTypeMembersPurpose
Routing-PeersPeer groupAll routing peer machines (add HNL + BLD peers)Umbrella group for all routing infrastructure; disable login expiration
Company-LaptopsUser groupAll user endpoints (auto-assigned via TRMM setup key)All company-managed Windows laptops
IT-AdminsUser groupIT staff user accountsFull access to all networks and management
Hawaii-EngineersUser groupHonolulu-based staffAccess to Honolulu LAN resources
Boulder-EngineersUser groupBoulder-based staffAccess to Boulder LAN resources

To create a group:

  1. Go to Peers or navigate to any policy/route creation form
  2. Type the new group name in a group input field
  3. NetBird will offer to create the group

Assign users to groups:

  1. Go to Team > Users
  2. Select a user
  3. Add them to the appropriate groups

Navigate to Access Control > Policies > Add Policy.

Create access control rule dialog

Policy 1: All Staff — Domain Controller Access

Section titled “Policy 1: All Staff — Domain Controller Access”

All company laptops need access to domain controllers at both sites for authentication, DNS, Group Policy, file shares, and time sync.

FieldValue
NameAll Staff - DC Access
DescriptionAllow all company laptops to reach domain controllers for AD authentication and services
SourceCompany-Laptops
DestinationHNL-Routing-Peers, BLD-Routing-Peers
ProtocolTCP
Ports53, 88, 123, 135, 389, 445, 464, 636, 3268, 3269
DirectionSource to Destination

Some AD services require UDP as well.

FieldValue
NameAll Staff - DC Access (UDP)
DescriptionUDP ports for DNS, Kerberos, NTP
SourceCompany-Laptops
DestinationHNL-Routing-Peers, BLD-Routing-Peers
ProtocolUDP
Ports53, 88, 123, 389, 464
DirectionSource to Destination

Policy 3: Hawaii Engineers — Honolulu Full Access

Section titled “Policy 3: Hawaii Engineers — Honolulu Full Access”
FieldValue
NameHawaii Engineers - Honolulu LAN
DescriptionFull access to all Honolulu LAN resources
SourceHawaii-Engineers
DestinationHNL-Routing-Peers
ProtocolALL
DirectionSource to Destination

Policy 4: Boulder Engineers — Boulder Full Access

Section titled “Policy 4: Boulder Engineers — Boulder Full Access”
FieldValue
NameBoulder Engineers - Boulder LAN
DescriptionFull access to all Boulder LAN resources
SourceBoulder-Engineers
DestinationBLD-Routing-Peers
ProtocolALL
DirectionSource to Destination

Policy 5: IT Admins — All Networks Full Access

Section titled “Policy 5: IT Admins — All Networks Full Access”
FieldValue
NameIT Admins - Full Access
DescriptionIT Admins can reach all office networks on all protocols
SourceIT-Admins
DestinationHNL-Routing-Peers, BLD-Routing-Peers
ProtocolALL
DirectionSource to Destination

Required for the bidirectional site-to-site routes created in Step 3.6. Without this policy, the routing peers cannot exchange traffic between sites.

FieldValue
NameSite-to-Site - Routing Peers
DescriptionAllow Honolulu and Boulder routing peers to communicate for site-to-site routing
SourceHNL-Routing-Peers
DestinationBLD-Routing-Peers
ProtocolALL
DirectionBidirectional
Example access control policy

Now that all required policies are in place:

  1. Go to Access Control > Policies
  2. Find the Default policy (Source: All, Destination: All, Protocol: All)
  3. Click the three-dot menu > Delete
  4. Confirm deletion
PolicySourceDestinationProtocolPorts
All Staff - DC AccessCompany-LaptopsHNL-Routing-Peers, BLD-Routing-PeersTCP53, 88, 123, 135, 389, 445, 464, 636, 3268, 3269
All Staff - DC Access (UDP)Company-LaptopsHNL-Routing-Peers, BLD-Routing-PeersUDP53, 88, 123, 389, 464
Hawaii Engineers - Honolulu LANHawaii-EngineersHNL-Routing-PeersALL
Boulder Engineers - Boulder LANBoulder-EngineersBLD-Routing-PeersALL
IT Admins - Full AccessIT-AdminsHNL-Routing-Peers, BLD-Routing-PeersALL
Site-to-Site - Routing PeersHNL-Routing-PeersBLD-Routing-PeersALLBidirectional

At this point you should have:

  • Six access control policies created
  • Groups created: Routing-Peers, Company-Laptops, IT-Admins, Hawaii-Engineers, Boulder-Engineers
  • Default ALL-to-ALL policy deleted (after testing)
  • At least one IT admin user assigned to the IT-Admins group
  • Site-to-site bidirectional policy in place

Proceed to Step 5: Client Deployment to create the setup key for endpoints and deploy the NetBird client via TacticalRMM.