Some of our services appear not to be working at the moment.

Our team has been notified, and is working on sorting out the issue.

See Status Page
ZeroTier Knowledge Base
  • English
Go to website
Back
Articles on:Architecture
No description

Categories

  • Guides
  • Central
  • Architecture
  • Getting Started
  • OS / Platform Notes
  • Development
  • Service Providers
  • Client Configuration
    Architecture Client Configuration On this page ZeroTier One is a service that can run on laptops, desktops, servers, virtual machines, and containers to provide virtual network connectivity through a virtual network port much like a VPN client. It can also act as a network controller and as a federated root server. Binary packages are available on the ZeroTier site and source code is found on GitHub (https://github.comSome readers
  • The Protocol
    Architecture The Protocol On this page ZeroTier is a smart programmable Ethernet switch for planet Earth. It allows all networked devices, VMs, containers, and applications to communicate as if they all reside in the same physical data center or cloud region. Overview​ ZeroTier is a distributed network hypervisor built atop a cryptographically secure global peer to peer network. It provides advanced network virtualizatFew readers
  • What is a Network Controller?
    Architecture What is a Network Controller? On this page info Set up your own Controller Every ZeroTier virtual network has a network controller responsible for admitting members to the network, issuing certificates, and issuing default configuration information. This is our reference controller implementation and is almost the same as the one we use to power our own hosted services at my.zerotier.com. The only diffeFew readers
  • Rules Engine
    Architecture Rules Engine On this page Traffic on ZeroTier networks can be observed and controlled with a system of globally applied network rules. These are enforced in a distributed fashion by both the senders and the receivers of packets. To escape the rules engine a malicious attacker would need to fully compromise both sides of any conversation. The ZeroTier VL2 rules engine differs from most other firewalls and SDN rules engines in several ways. The most iFew readers
  • Security
    Architecture Security On this page Cryptography​ ZeroTier uses state of the art cryptographic methods to encrypt your traffic end-to-end. Read more here Report a vulnerability​ If you believe you've found a vulnerability please follow the instructions here to report it to our team (https://github.com/zerotier/ZeroFew readers
  • 📄️ The Protocol📄️ Security📄️ Rules Engine📄️ Client Configuration📄️ What is a Network Controller?
    📄️ The Protocol Detailed explanation of the ZeroTier wire protocol (/protocol)Few readers

Not finding what you are looking for?

Chat with us or send us an email.

  • Chat with us
© 2025 ZeroTier Knowledge BaseWe run on Crisp Knowledge.