From ArchWiki

NetBird is an open-source VPN management platform built on top of WireGuard making it easy to create secure private networks for your organization or home. It is very similar to Tailscale, and has very similar features.

Netbird can be self-hosted.

Initial network setup

Sign up for an account, and then install netbird on each of your devices. By signing up for an account, a virtual network will be created automatically.


Install netbirdAUR.

Join the network

The netbird service is installed as a template unit. Create a default instance by starting/enabling netbird@main.service, then join the network:

# netbird up

If communication with the management server is successful, it will print a URL. Open it in a browser and sign in with your account credentials if needed. Follow the prompt on the browser, after which a success message will be printed on the console.

Note: Sometimes the netbird CLI will fail to connect to the netbird daemon, or fail to connect to the management server. In that case, just retry the command until it works.

Just like Tailscale, it is possible to use a setup key to add a node:

# netbird up --setup-key 2CA35F84-3D54-4997-884D-FE72864ACFD7


Network inaccessible

One possible cause is conflict with Tailscale. By default, the Tailscale service will create firewall entries to filter traffic within the virtual network. All traffic originating from Tailscale's subnet must come from Tailscale's network interface. However, Tailscale and Netbird both use the same subnet, thus Tailscale traffic will work fine, but Netbird traffic will be completely blocked.

This is the offending rule:

-A ts-input -s ! -i tailscale0 -j DROP

Removing this rule on all affected nodes resolves the issue. However, this is not a permanent solution. Instead, disable the iptables rules entirely:

# tailscale up --netfilter-mode off

A better solution would be to use different subnets for Tailscale and Netbird, but at the moment they are not supported: