Skip to content

Enterprise vs Community Edition

NetBird self-hosted community edition is free with no per-user or per-peer licensing. Multi-site routing with HA failover between routing peers is a core feature available in all editions including the free community tier. Management Server HA (multiple management instances) requires an enterprise commercial license, but a cold standby strategy using SQLite backup/restore with DNS failover is viable for the community edition. Existing WireGuard tunnels survive management server outages; only new peer registration and configuration changes are affected. TacticalRMM can fully manage the NetBird lifecycle via PowerShell scripts.


AspectFree (Cloud)Team (Cloud)Business (Cloud)Enterprise (Cloud)Self-Hosted Community
Price$0/user/mo$5/user/mo$10/user/moCustomFree
Users5UnlimitedUnlimitedUnlimitedUnlimited
Machines100100 + 10/user100 + 10/userUnlimitedUnlimited
BillingN/AUsage-basedUsage-basedInvoiceInfrastructure only

Enterprise self-hosted pricing is Custom / Contact Sales. No public per-user or per-peer rate exists.


FeatureCommunity (Self-Hosted)Enterprise Required?
Multi-site routingFREE — core feature in all editionsNo
HA routing peer failoverFREE — automatic, built-inNo
Network routes + ACLsFREENo
SSO with Entra ID (OIDC)FREENo
DNS managementFREENo
API accessFREENo
Setup key peers (never expire)FREE — exempt from login expirationNo
Unlimited users / peersFREE (self-hosted)No
SCIM provisioningRequires Commercial LicenseYes
Management Server HA (multi-instance)Requires Commercial LicenseYes
Audit/traffic event loggingCloud-only featureN/A for self-hosted
Device posture checksCloud-only featureN/A for self-hosted
MDM & EDR integrationCloud-only featureN/A for self-hosted

Key finding: Multi-site routing with HA failover between routing peers is explicitly documented as available “in all plans, including the free tier.” Having routing peers at BOTH sites simultaneously with automatic failover is a standard community feature at zero cost.


Evidence that multi-site routing does NOT require enterprise licensing:

  1. Official docs: “You can add unlimited routing peers to a highly available route.”
  2. WZ-IT comparison: “High-Availability Routes and Exit Nodes are available in all plans, including the free tier.”
  3. NetBird knowledge hub: “Highly available routes and exit nodes are available in all plans.”
  4. GitHub: Users running self-hosted with HA routing peers in production.

For GSISG, this means:

  • Create a route for Honolulu LAN (10.100.7.0/24) with routing peers at Honolulu
  • Create a route for Boulder LAN (10.15.0.0/24) with routing peers at Boulder
  • Add HA routing peers at each site for redundancy
  • All free

Running multiple management server instances behind a load balancer for zero-downtime failover. Requires PostgreSQL (not SQLite) and a Commercial License.

What Happens When the Single Management Server Goes Down

Section titled “What Happens When the Single Management Server Goes Down”
TimeframeImpact
0-30 minutesLOW — existing tunnels continue, data plane is independent
30 min - 4 hoursMODERATE — no new peers, no dashboard, no API
4-24 hoursSIGNIFICANT — SSO peers begin expiring (24-hour default)
24+ hoursHIGH — only setup-key peers remain connected

Cold Standby Strategy (Without Enterprise License)

Section titled “Cold Standby Strategy (Without Enterprise License)”
Primary Server (active) Standby Server (dormant)
+---------------------------+ +---------------------------+
| Docker Compose: | | Docker Compose: |
| - Management | | - Management (stopped) |
| - Signal | | - Signal (stopped) |
| - Relay/STUN | | - Relay/STUN (stopped) |
| - Dashboard | | - Dashboard (stopped) |
| SQLite DB: store.db | | SQLite DB: (from backup) |
+---------------------------+ +---------------------------+
| |
DNS A record: netbird.company.com ----> Primary IP
(failover: change to Standby IP)

What to back up and sync:

  1. Database: /var/lib/netbird/ (store.db)
  2. Config files: docker-compose.yml, config.yaml, dashboard.env
  3. TLS certificates (Let’s Encrypt)
  4. IdP configuration (OIDC settings, client secrets)

Backup procedure: Daily cron job that briefly stops management, copies the database, rsyncs to standby, and restarts. Downtime: seconds.

Failover procedure (~10-15 minutes):

  1. Copy latest backup into place on standby
  2. Start Docker Compose services
  3. Update DNS A record (pre-configure low TTL: 60-300 seconds)
  4. Clients reconnect automatically after DNS propagates

Estimated Recovery Time:

  • Best case (pre-staged standby, low TTL): 5-10 minutes
  • Typical case (manual intervention): 15-30 minutes
  • Data loss window: equal to backup frequency

NetBird has native automatic failover for routing peers — no enterprise license required.

How it works:

  1. Create a route for an office LAN
  2. Add multiple routing peers with different metric priorities
  3. Clients automatically select the best available peer
  4. If the primary goes offline, failover is automatic

Recommended HA configuration:

  • Boulder: Primary on DATA001, secondary on DATA007
  • Honolulu: Primary on DATA003, secondary on DATA004

SettingValue
Default period24 hours
Range1 hour to 180 days
Setup key peersCompletely exempt — never expire
Can be disabledGlobally or per-peer

When login expires, the WireGuard tunnel drops and the user must re-authenticate via SSO. Setup key peers (routing peers, servers) maintain connections indefinitely.

For TRMM-managed endpoints: Enroll infrastructure with setup keys (no expiration). User workstations can use either setup keys (convenient) or SSO login (more secure, periodic re-auth required).


Terminal window
$DownloadUrl = "https://pkgs.netbird.io/windows/msi/x64/netbird_installer_windows_amd64.msi"
$NetBirdMSI = "$env:TEMP\netbird-installer.msi"
Invoke-WebRequest -Uri $DownloadUrl -OutFile $NetBirdMSI -UseBasicParsing
Start-Process "msiexec.exe" -ArgumentList "/i", $NetBirdMSI, "/qn", "/norestart", "SETUP_KEY=$SetupKey", "MANAGEMENT_URL=$ManagementUrl" -Wait
Terminal window
$statusJson = & "C:\Program Files\NetBird\netbird.exe" status --json | ConvertFrom-Json
if ($statusJson.management.connected) { Write-Host "Connected"; exit 0 }
else { Write-Host "Disconnected"; exit 1 }
Terminal window
& "C:\Program Files\NetBird\netbird.exe" down
& "C:\Program Files\NetBird\netbird.exe" service uninstall
Start-Process "C:\Program Files\NetBird\netbird_uninstall.exe" -ArgumentList "/S" -Wait
  • Bulk Script: Execute against Clients/Sites/Selected Agents/All
  • Automation Policies: Run scripts automatically on groups
  • Onboarding Tasks: Auto-install NetBird on new machines
  • Script Checks: Periodic status monitoring with alerts
  • API: Full REST API for programmatic management

This directly addresses the “no automatic deprovisioning” concern: when an employee leaves, run the uninstall script on their machines via TRMM bulk operations.


Five complementary mechanisms:

  1. Login Expiration: Default 24 hours. Disable user in Entra ID; access revoked at next token refresh.
  2. TRMM Uninstall: netbird down + netbird_uninstall.exe /S — 2-3 minutes per endpoint.
  3. TRMM Bulk Uninstall: Fire-and-forget to all agents — 15-30 minutes for all endpoints.
  4. NetBird API: Programmatic peer deletion, group management, policy updates.
  5. Entra ID Integration: Disable user in Entra ID = access revoked at next token refresh.

Setup key peers (servers, routing peers) are completely exempt from login expiration and managed separately from user endpoint lifecycle.


  1. Enterprise pricing: No public pricing found. Contact sales@netbird.io.
  2. TLS certificate handling on standby: Let’s Encrypt HTTP-01 challenge requires the standby to be reachable. DNS-01 or wildcard certs are more reliable.
  3. Signal server during management outage: If on the same host, connection re-establishment may fail. Consider separating Signal to its own host.
  4. Route flapping in HA: Issue #2150 (fixed), but #4769 reports intermittent routing peer connectivity loss.

Official: netbird.io/pricing, docs.netbird.io (plans-and-billing, self-hosted-vs-cloud, network-routes, scaling guide, backup, login expiration, setup keys, Windows install, CLI reference)

GitHub: #1584, #4788, #2802, #4603, #2150, #4769

Community: WZ-IT comparison, NetBird knowledge hub, forum.netbird.io, TacticalRMM docs