mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-18 16:36:35 +00:00
* Streamlined site-to-site docs in new dedicated section. Removed old use-case guide and added redirects
* restructure use-cases, move network use cases to network sections
* Reorganize network routes and networks documentation structure
- Restructure use cases into by-scenario and by-configuration folders
- Reorganize images to match new doc structure (concepts, by-scenario, by-resource-type)
- Add screenshots for site-to-site guides (home, office, cloud)
- Add policy screenshots for networks use cases
- Update site-to-site docs to use two separate policies instead of bidirectional
- Fix Access Control Groups to use correct destination groups
- Move "Self-Hosted vs Cloud" page to about section
- Update navigation and add redirects for moved pages
- Add CLAUDE.md for Claude Code guidance
* cleaned up network docs/image folder structure
* Align site-to-site use case links and redirects
Co-authored-by: Cursor <cursoragent@cursor.com>
* Update CLAUDE.md with accurate project details
Fix Next.js version (14 → 16), add React 19/Tailwind/Pages Router
details, document MDX page conventions, image paths, and note
absence of test suite.
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* Fix broken images and hydration error on networks page
- Restore 6 network index images accidentally deleted in 4116092
- Fix keycloak image filename typo (keycloack -> keycloak)
- Fix hydration mismatch by replacing invalid <p><div> nesting with <div>
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
* Fix 4 broken internal links found in PR review
- Fix missing by-scenario/ segment in site-to-site-home and
site-to-site-office Tile hrefs (network-routes use-cases index)
- Fix lazy-connections typo to lazy-connection (implement-zero-trust)
- Update stale redirect link to direct path for access-control
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
---------
Co-authored-by: Jack Carter <128555021+SunsetDrifter@users.noreply.github.com>
Co-authored-by: Cursor <cursoragent@cursor.com>
Co-authored-by: Claude Opus 4.6 <noreply@anthropic.com>
90 lines
4.1 KiB
Plaintext
90 lines
4.1 KiB
Plaintext
import { Tiles } from '@/components/Tiles'
|
|
import { Note } from '@/components/mdx'
|
|
|
|
# Networks Use Cases
|
|
|
|
These guides show how to use the [Networks](/manage/networks) feature for VPN-to-Site access—where NetBird peers access devices on remote networks that don't have NetBird installed.
|
|
|
|
## What is VPN-to-Site?
|
|
|
|
VPN-to-Site allows a device running NetBird (like your laptop) to access devices on a remote network (like your home or office) without installing NetBird on every device.
|
|
|
|
```
|
|
Your Laptop ──────► NetBird Tunnel ──────► Routing Peer ──────► Target Device
|
|
(peer) (peer) (no NetBird)
|
|
```
|
|
|
|
**Example scenarios:**
|
|
- Access your home NAS from a coffee shop
|
|
- Reach office servers while traveling
|
|
- Connect to IoT devices on a remote network
|
|
|
|
<Note>
|
|
Networks supports VPN-to-Site only. For Site-to-VPN (clientless devices initiating connections) or Site-to-Site (connecting two networks), use [Network Routes](/manage/network-routes/use-cases).
|
|
</Note>
|
|
|
|
<Tiles
|
|
title="By Scenario"
|
|
items={[
|
|
{
|
|
href: '/manage/networks/use-cases/by-scenario/access-home-devices',
|
|
name: 'Access Home Devices',
|
|
description: 'Access your NAS, home automation, and media servers from anywhere',
|
|
},
|
|
{
|
|
href: '/manage/networks/use-cases/by-scenario/remote-worker-access',
|
|
name: 'Remote Worker Access',
|
|
description: 'Enable employees to access office resources while working remotely',
|
|
},
|
|
{
|
|
href: '/manage/networks/use-cases/by-scenario/cloud-to-on-premise',
|
|
name: 'Cloud to On-Premise',
|
|
description: 'Connect cloud workloads to on-premise databases and services',
|
|
},
|
|
]}
|
|
/>
|
|
|
|
## Understanding Resource Types
|
|
|
|
In Networks, a **resource** represents something you want to make accessible through the VPN tunnel—whether that's a single server, an entire subnet, or a domain-based service. Resources are what your routing peers make reachable to authorized NetBird clients.
|
|
|
|
NetBird supports three types of resources:
|
|
|
|
- **IP resources** — Single IP addresses (`192.168.1.10`) or CIDR ranges (`172.16.0.0/16`). Use these when you know the exact IP addresses of your target devices or want to grant access to an entire subnet.
|
|
|
|
- **Domain resources** — Specific fully-qualified domain names like `app.example.com`. Use these when the target service has a stable hostname but its IP address may change (common with cloud load balancers or dynamic DNS).
|
|
|
|
- **Wildcard domain resources** — Domain patterns like `*.internal.company.com` that match all subdomains. Use these when you have many services under a shared domain and want to avoid creating individual resources for each one.
|
|
|
|
Each resource can have its own access policy, allowing you to grant different levels of access to different teams—for example, giving developers full access to a development subnet while restricting everyone else to specific services.
|
|
|
|
<Tiles
|
|
title="By Resource Type"
|
|
items={[
|
|
{
|
|
href: '/manage/networks/use-cases/by-resource-type/routing-traffic-to-multiple-resources',
|
|
name: 'Multiple IP Resources',
|
|
description: 'Route traffic to multiple IP resources with different access policies',
|
|
},
|
|
{
|
|
href: '/manage/networks/use-cases/by-resource-type/accessing-restricted-domain-resources',
|
|
name: 'Domain Resources',
|
|
description: 'Access restricted websites and domain-based resources',
|
|
},
|
|
{
|
|
href: '/manage/networks/use-cases/by-resource-type/accessing-entire-domains-within-networks',
|
|
name: 'Wildcard Domains',
|
|
description: 'Access entire domains using wildcard DNS routing',
|
|
},
|
|
]}
|
|
/>
|
|
|
|
## Need More Than VPN-to-Site?
|
|
|
|
If your scenario requires:
|
|
- Clientless devices initiating connections (Site-to-VPN)
|
|
- Two networks communicating with each other (Site-to-Site)
|
|
- Disabling masquerade for source IP preservation
|
|
|
|
See [Network Routes Use Cases](/manage/network-routes/use-cases) instead.
|