Skip to content

docs: add How Routing Peers Work concept page#727

Merged
SunsetDrifter merged 3 commits intomainfrom
docs/how-routing-peers-work
May 5, 2026
Merged

docs: add How Routing Peers Work concept page#727
SunsetDrifter merged 3 commits intomainfrom
docs/how-routing-peers-work

Conversation

@SunsetDrifter
Copy link
Copy Markdown
Contributor

Summary

  • New conceptual page at /manage/networks/how-routing-peers-work covering the routing-peer mental model: traffic flow, host requirements, HA modes, masquerade, access control, DNS routing, exit nodes, and common pitfalls.
  • Sidebar entry added under Networks, beneath the existing Concept link.
  • One-line cross-link Note added near the top of manage/networks/index.mdx and manage/network-routes/index.mdx so readers on the existing concept pages can find the primer.

Notes

  • Feature-agnostic page that complements both Networks and Network Routes rather than replacing either.
  • Network Routes guidance scoped to its current real use cases (exit nodes and site-to-site).
  • HA section documents the binary metric choice: primary/failover (different metrics) and equal-metric latency switching (with the 20 ms threshold and a geographic-distribution example).
  • Includes Linux sysctl snippet and the Windows netbird service reconfigure --service-env NB_ENABLE_LOCAL_FORWARDING=true command.
  • Draft pending review.

Add a feature-agnostic primer covering the routing peer mental model:
traffic flow through forward vs input chains, host requirements (IP
forwarding on Linux/Windows, container caps, cloud settings), HA modes
(primary/failover and equal-metric latency switching), masquerade,
access control, DNS routing, exit nodes, and common pitfalls. Surface
it in the sidebar under Networks and cross-link from both the Networks
and Network Routes concept pages.
- Clarify mental-model walkthrough describes the Linux kernel-mode path
- Expand OS list to Linux/Windows/macOS/FreeBSD/Android/tvOS/Docker
- Correct container IP-forwarding guidance: set sysctl on the host
- Reframe Windows NB_ENABLE_LOCAL_FORWARDING as opt-in for exposing
  services on the routing peer's local addresses, off by default
- Soften failover wording to avoid implying tunnel rebuild; scope
  reset claim to established TCP connections, drop "typically"
- Add masquerade-off caveats: Linux only, breaks HA
- Drop unfounded ACL-Groups-require-masquerade Warning
- Drop misplaced internal-DNS-resolver link from DNS section intro
- Rename Wildcard domains section to Routing Peer DNS Resolution
- Drop container/host IP-forwarding pitfall (not a real-world failure)
- Rephrase exit-node ICMP pitfall: clients can't connect at all
A concrete scenario (office subnet behind the peer + Grafana on
TCP/3000 + SSH on TCP/22) showing the two policies needed: a network
resource policy on the forward chain and a peer-to-peer policy on
the input chain.
@SunsetDrifter SunsetDrifter marked this pull request as ready for review May 5, 2026 10:47
Copy link
Copy Markdown
Contributor

@emrcbrn emrcbrn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@SunsetDrifter SunsetDrifter merged commit 47b6aa5 into main May 5, 2026
1 check passed
@SunsetDrifter SunsetDrifter deleted the docs/how-routing-peers-work branch May 5, 2026 10:55
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants