This is an old revision of the document!
Router Hardware
(Dec 2024) The Supermicro SYS-E200-9B has stopped working. It posts bios, but will not boot further. I suspect hardware failure of some sort. The BMC failed a few years ago. I have ordered a replacement ikoolcore-r2-max
- Processor: Intel Alder Lake-N i3-N305
- Memory: 1 x SO-DIMM DDR5 4800MHz, 32GB(SAMSUNG).
- Ethernet Ports: 2 x Marvell AQC113C-B1-C 10Gbps Network cards(via PCIe 3.0 x 2), 2 x Intel i226-v 2.5G network cards (via PCIe 3.0 x 1)
- AQC113C-B1-C is a 6-Speed Commercial Temperature Grade, RoHS 6/6* network chipset
- Storage: 2 x M.2 2242/2280 NVMe SSD, PCIe 2.0 x 1
- USB Ports: 2 x USB-A 3.0(5Gbps), 1 x USB-C 3.2 Gen2(10Gbps)
- Display: HDMI 2.0 and Type-C display output with 4K 60fps support
- Cooling System: Full aluminum body passive cooling, dual 4010 fans active cooling for aluminum fins
- System Compatibility: Compatible with Windows, Linux, pfSense, OPNsense, OpenWrt, Proxmox VE, VMware ESXi, Unraid and more
- BIOS: AMI EFI BIOS with Auto Power-on, WOL, and PXE support
- Power Supply: DC IN 12-19V
- Dimensions: 157 x 118 x 40 mm
- Weight: Main unit 1050g (1110g for Fanless Unit), packed about 1600g
- More:
- Product wiki: wiki.ikoolcore.com
- Drivers, BIOS, Firmware: dl.ikoolcore.com
More Information AND FAQs, please visit wiki.ikoolcore.com.
VM / Docker on Router
Progress
As of 2023/01 I setup a VM manager (Libvirt/qemu/KVM) on the router and loaded Docker on it. It is slow but does seem to work. Next:
- ISC Kea DHCP in Docker (currently ISC DHCP in bare metal)
- ISC Bind 9 in Docker (currently ISC Bind 9 in bare metal)
- Wireguard VPN in Docker (currently Wireguard VPN in bare metal)
Router key features
- Operate reliably 24 hours per day, 7 days a week
- Low power operation, power cost money
- Headless Remote access, with separate BMC NIC (this could be integrated or external KVM, e.g. PiKVM)
- Hardware suitable for purpose:
- At least 2 NICs (1 WAN plus 1 or more LAN, quality native type NICs, not USB based), 4+ NICs preferable.
- NICs to be 1 GB/s type minimum, although as of 2023 2.5GB/s NIC would now be minimum specification
- Sufficient CPU power not to limit primary performance
- Correct CPU options, e.g. AES, virtualization (VT-x, and as of 2023 VT-d).
- No graphical user interface environment install (although individual applications could have web interface)
- Connectivity to upstream IPS provided internet
- Firewall
- DNS
- DCHP
- VPN for use as secure gateway to allow private access from public internet
The following key services define the router:
- network services (bare metal)
- ISP Internet connectivity (bare metal)
- main firewall (bare metal)
- DNS
- DHCP
- VPN (for secure public access to LAN)
Assumptions and Limitations
- Low power means low CPU resources, hence care with applications that require significant or otherwise unnecessary resources.
- Some services on bare metal to ensure reliable performance
- This machine is much slower than usual hardware, and this is noticeable on interface usage, even no graphical.
- The network and related services performance must NOT limit performance on upstream IP connectivity to greater than 100Mb/s and preferably only limit as speed get close to NIC's 1 Gb/s hardware speed. (At the moment my internet connection is via VSDL and is limited to about 65Mb/s down and 16MB/s up and this hardware and setup seem to be performing well.)
Docker really does some work on the firewall using iptables. For this reason I decided to setup a virtual machine (VM) environment, Linux QEMU/KVM/Libvirt based. VM's seem to impact the firewall / network setup less adversely than Docker. The use of the VM isolates the Docker firewall machinations from the bare metal.