Ring Video Doorbell on a modern home.

Ring Network Management Disclosures

Information about Network Management and Performance of Ring Internet Service

Ring wants to help users make informed choices about use of the Internet Service (as defined in Terms of Service). This summary of the network practices and applicable terms is provided only for informational purposes and may be changed at any time without notice.

Commercial Terms and Privacy Policies

The Terms of Service applicable to the Internet Service, are posted on the Ring website at ring.com/terms. In addition to those terms, more information about Ring’s privacy policies and practices is available at ring.com/privacy.  Descriptions of the charges applicable to the Ring Protect services that include Internet Service are available at ring.com/protect-plans. If you have questions or concerns, please contact us at https://ring.com/callus.

Network Management

The Internet Service’s third party underlying carriers have reported that they do not: (i) favor certain internet applications by blocking or throttling lawful internet traffic on the basis of content, application, service, or user; (ii) modify particular protocols, protocol ports, or protocol fields in ways not prescribed by the protocol standards; or (iii) favor some traffic over other traffic in exchange for consideration from a third party or to benefit an affiliate, except to address the needs of emergency communications, law enforcement, public safety, or national security authorities, consistent with or as permitted by applicable law.

However, Ring or the carriers may limit or manage the flow of traffic from certain locations, prevent the use of certain ports, block malicious or unlawful traffic, or take other appropriate actions to respond to or address network congestion, security threats or concerns (including viruses, botnets, worms, distributed denial of service attacks, spam, and other harmful activity).  Information about ports that the carriers have reported blocking as known or suspected to be associated with malicious or disruptive traffic can be found below. Additional ports may be blocked based upon threat assessments.

Typical Performance

The Internet Service’s performance depends on the carriers’ networks and particular minimum speeds for the Internet Service are not guaranteed. Speeds are affected by many different factors. Based on estimates measured from the primary device that houses the SIM card, most customers will typically experience download speeds of 14-65 Mbps, upload speeds of 3-13 Mbps, and latency of 29-46 milliseconds.   

Other factors that affect availability and speed include: congestion (which might occur, for example, when numerous users in a concentrated area access the network at the same time, or when some users consume a very large amount of network capacity during busy periods); how close the user is to a cell site and if walls, terrain and other obstructing features are between the user and the cell site; the capacity of the cell site; the nature or destination of the applications or content the user is accessing or sending and the server with which the user is communicating; radio frequency interference; network outages or maintenance; internal network management factors (including overhead, which is the various control and signaling data required to achieve the reliable transmission of internet access data); and other factors outside of Ring’s control. 

Blocked Ports

Port
Transport
Protocol
Direction
Threats
0
TCP
Reserved
Both
Reserved Port
19
UDP
Chargen
Both
Reflective DDOS
25
TCP
SMTP
Outbound
SPAM, Malware
68
UDP
BOOTP
Outbound
DHCP server spoofing
123
UDP
NTP
Both
Reflective DDOS
135
TCP
NetBios
Both
Worms, Malware, Reflective DDOS
139
TCP
NetBios
Both
Worms, Malware
445
TCP
MS-DS SMB
Both
Worms, Malware
520
UDP
RIPv
Both
Reflective DDOS
1900
UDP
SSDP
Both
Reflective DDOS
3479
TCP
Twrpc
Both
End user device instability
7547
TCP
CWMP
Both
End user device instability
49152
TCP
Dynamic
Inbound
Unauthorized access, DoS
49955
TCP
Dynamic
Inbound
Unauthorized access, DoS
50001
TCP
Dynamic
Inbound
Unauthorized access, DoS
51001-51003
TCP
Dynamic
Inbound
Unauthorized access, DoS
51010-51011
TCP
Dynamic
Inbound
Unauthorized access, DoS
51020
TCP
Dynamic
Inbound
Unauthorized access, DoS
61001
TCP
IPDR
Both
Data exposure, end user device instability

Tap here for Internet Access Additional Terms.

Last updated 5 months ago