RingLink Docs

Terminology and Concepts

This document explains the key concepts and terminology used in RingLink.

Core Concepts

Network

A secure private vpn mesh network that:

  • Connects all RingLink devices with end-to-end encryption
  • A Layer 2 vpn network
  • Enables direct peer-to-peer communication
  • Maintains optimal performance through Orb relay, ensuring lowest latency and best speed
  • Supports various networking protocols and topologies

Device

A network endpoint/node that:

  • Runs the RingLink client software
  • Participates in secure mesh networking
  • Can act as a regular node, gateway, or service provider
  • Maintains end-to-end encrypted connections with other devices

Network Components

Edge Tunnel (ELB)

A powerful network component that:

  • Provides load balancing capabilities
  • Enables secure local service exposure
  • Features:
    • Encrypted connections within the mesh network
    • Public endpoints with dedicated IPs and domains
    • Built-in global acceleration
    • Global traffic optimization and routing
    • Granular access control
    • Traffic monitoring and metrics
  • Use cases:
    • Hosting any applications/APIs securely
    • local service sharing
    • Load balancing across multiple backends
    • Accelerating global service access

Exit Node

A security-focused network component that:

  • Centralizes internet traffic routing
  • Enhances team privacy and security
  • Provides:
    • Secure internet access for team members
    • Traffic monitoring capabilities
    • Centralized security policies
  • Benefits:
    • Enhanced privacy for team communications
    • Simplified security management
    • Controlled internet access
    • Traffic audit capabilities

Site Gateway

A bridge component that:

  • Connects traditional network infrastructure (routers, switches, firewalls) to RingLink
  • Supports industry-standard protocols:
    • IPSec
    • WireGuard
  • Enables:
    • Legacy device integration
    • Hybrid network deployments

Identity and Authentication

Device Key

A cryptographic key pair that:

  • Consists of public and private keys
  • Ensures secure communication between devices
  • Forms the basis of device identity
  • Enables cryptographic authentication

Device ID

A unique 10-character identifier that:

  • Is derived from the Device Key
  • Uniquely identifies devices within the network
  • Remains consistent across sessions
  • Helps in network management and troubleshooting

Device Token

A secure authentication mechanism that:

  • Verifies device identity
  • Controls network access permissions
  • Enables secure device onboarding
  • Supports token rotation for enhanced security

Network ID

A unique 8-character identifier used to:

  • Distinguish different RingLink networks
  • Enable network-specific configurations
  • Facilitate network management
  • Support multi-network deployments

Additional Features

Access Control

A comprehensive security system that:

  • Manages device permissions
  • Controls network access
  • Enables granular security policies
  • Supports role-based access control

Path Control

A flexible routing management feature that:

  • Enables manual control over device-to-device routing paths
  • Supports multiple connection methods:
    • Direct peer-to-peer connections
    • Specific Orb relay nodes
    • Private backbone routing paths
    • Override automatic routing decisions

For detailed information about specific features, please refer to their respective documentation sections.

On this page