Terminology and Concepts
This document explains the key concepts and terminology used in RingLink.
Core Concepts
Network
A secure private vpn mesh network that:
- Connects all RingLink devices with end-to-end encryption
- A Layer 2 vpn network
- Enables direct peer-to-peer communication
- Maintains optimal performance through Orb relay, ensuring lowest latency and best speed
- Supports various networking protocols and topologies
Device
A network endpoint/node that:
- Runs the RingLink client software
- Participates in secure mesh networking
- Can act as a regular node, gateway, or service provider
- Maintains end-to-end encrypted connections with other devices
Network Components
Edge Tunnel (ELB)
A powerful network component that:
- Provides load balancing capabilities
- Enables secure local service exposure
- Features:
- Encrypted connections within the mesh network
- Public endpoints with dedicated IPs and domains
- Built-in global acceleration
- Global traffic optimization and routing
- Granular access control
- Traffic monitoring and metrics
- Use cases:
- Hosting any applications/APIs securely
- local service sharing
- Load balancing across multiple backends
- Accelerating global service access
Exit Node
A security-focused network component that:
- Centralizes internet traffic routing
- Enhances team privacy and security
- Provides:
- Secure internet access for team members
- Traffic monitoring capabilities
- Centralized security policies
- Benefits:
- Enhanced privacy for team communications
- Simplified security management
- Controlled internet access
- Traffic audit capabilities
Site Gateway
A bridge component that:
- Connects traditional network infrastructure (routers, switches, firewalls) to RingLink
- Supports industry-standard protocols:
- IPSec
- WireGuard
- Enables:
- Legacy device integration
- Hybrid network deployments
Identity and Authentication
Device Key
A cryptographic key pair that:
- Consists of public and private keys
- Ensures secure communication between devices
- Forms the basis of device identity
- Enables cryptographic authentication
Device ID
A unique 10-character identifier that:
- Is derived from the Device Key
- Uniquely identifies devices within the network
- Remains consistent across sessions
- Helps in network management and troubleshooting
Device Token
A secure authentication mechanism that:
- Verifies device identity
- Controls network access permissions
- Enables secure device onboarding
- Supports token rotation for enhanced security
Network ID
A unique 8-character identifier used to:
- Distinguish different RingLink networks
- Enable network-specific configurations
- Facilitate network management
- Support multi-network deployments
Additional Features
Access Control
A comprehensive security system that:
- Manages device permissions
- Controls network access
- Enables granular security policies
- Supports role-based access control
Path Control
A flexible routing management feature that:
- Enables manual control over device-to-device routing paths
- Supports multiple connection methods:
- Direct peer-to-peer connections
- Specific Orb relay nodes
- Private backbone routing paths
- Override automatic routing decisions
For detailed information about specific features, please refer to their respective documentation sections.