Prevent netbird client to modify windows firewall #696

Open
opened 2025-11-20 05:16:05 -05:00 by saavagebueno · 4 comments
Owner

Originally created by @rpellerej on GitHub (Mar 11, 2024).

When I connect a windows server to my netbird server using a setup key, it will automatically add a rule in the windows firewall, allowing all incomming trafic from the netbird network.

I'd like to have the possibility to prevent this firewall modification, to have a second security check inside my server, and to not delegate fully to netbird server the ACLs. On Linux debian based servers, the netbird client does not seems to update iptables for instance.

I did not found a way to prevent directly from windows the firewall modification. I found someone who add an automatic task which trigger on a specifi event to rewrite the firewall, but I did not succeed to set up such a task.

Thank you in advance for your returns ! :)

Originally created by @rpellerej on GitHub (Mar 11, 2024). When I connect a windows server to my netbird server using a setup key, it will automatically add a rule in the windows firewall, allowing all incomming trafic from the netbird network. I'd like to have the possibility to prevent this firewall modification, to have a second security check inside my server, and to not delegate fully to netbird server the ACLs. On Linux debian based servers, the netbird client does not seems to update iptables for instance. I did not found a way to prevent directly from windows the firewall modification. I found someone who add an automatic task which trigger on a specifi event to rewrite the firewall, but I did not succeed to set up such a task. Thank you in advance for your returns ! :)
saavagebueno added the feature-requestwaiting-feedback labels 2025-11-20 05:16:05 -05:00
Author
Owner

@pappz commented on GitHub (Mar 12, 2024):

On the Dashboard, policies page you can create rules for groups. When you create a setup-key you can set auto-assigned groups for the key. If you start to use that key then the peers will set the restrictions automatically.

@pappz commented on GitHub (Mar 12, 2024): On the Dashboard, [policies page](https://app.netbird.io/access-control) you can create rules for groups. When you create a setup-key you can set **auto-assigned groups** for the key. If you start to use that key then the peers will set the restrictions automatically.
Author
Owner

@rpellerej commented on GitHub (Mar 12, 2024):

Even if my setup key does not have auto assigned groups, Netbird will add this inbound rule in the windows firewall :

image

The problem for me is the following :

  • Because of this rule, every trafic which is allowed by netbird will go in the windows server.

  • My windows firewall is configured to reject every inbound trafic which is not allowed by a specific rule. So, I want to be able to reject a connection on the windows server side, even if this connection was allowed by the Netbird server. Because of this rule, it is not possible.

The behaviour I would like to have :
A user try to connect to the server using RDP throug Netbird -> Check Netbird ACLs (OK) -> Check Windows firewall (NOT OK, because the windows firewall is bypassed by the automatic Netbird rule)

I can delete manually the rule to achieve what I want, but this is not a long term solution.

I would be very grateful if you have any idea or suggestion.

@rpellerej commented on GitHub (Mar 12, 2024): Even if my setup key does not have auto assigned groups, Netbird will add this inbound rule in the windows firewall : ![image](https://github.com/netbirdio/netbird/assets/159896546/f7525774-3351-4b0f-b803-59a4249ddf58) The problem for me is the following : - Because of this rule, every trafic which is allowed by netbird will go in the windows server. - My windows firewall is configured to reject every inbound trafic which is not allowed by a specific rule. So, I want to be able to reject a connection on the windows server side, even if this connection was allowed by the Netbird server. Because of this rule, it is not possible. The behaviour I would like to have : A user try to connect to the server using RDP throug Netbird -> Check Netbird ACLs (OK) -> Check Windows firewall (NOT OK, because the windows firewall is bypassed by the automatic Netbird rule) I can delete manually the rule to achieve what I want, but this is not a long term solution. I would be very grateful if you have any idea or suggestion.
Author
Owner

@nazarewk commented on GitHub (Apr 18, 2025):

@rpellerej having some related discussions within a team recently I believe this might not be an issue anymore in the recent versions, can you confirm?

@nazarewk commented on GitHub (Apr 18, 2025): @rpellerej having some related discussions within a team recently I believe this might not be an issue anymore in the recent versions, can you confirm?
Author
Owner

@hvolpers commented on GitHub (Oct 22, 2025):

I'm having the same issue the other way around. I cannot RDP into a client running netbird and am looking for the reason. RDP is active, Netbird firewall rule is in place (v.0.59.7, initial installation was v0.59.3).

@hvolpers commented on GitHub (Oct 22, 2025): I'm having the same issue the other way around. I cannot RDP into a client running netbird and am looking for the reason. RDP is active, Netbird firewall rule is in place (v.0.59.7, initial installation was v0.59.3).
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: SVI/netbird#696