How to turn anything into a router

DIY Routing Basics

  • Many commenters stress that “a router is just a computer doing IP forwarding + NAT,” and Linux already has everything needed (iptables/nftables, dnsmasq, hostapd).
  • Even very old x86 hardware can route gigabit in software for typical home use; routing itself is rarely the bottleneck.
  • Some appreciate the article for demystifying routing; others argue it’s mainly useful as a learning exercise, not the easiest production setup.

Hardware Choices & Performance

  • Common DIY platforms: old laptops/Desktops, mini‑PCs (N100/N150, Atoms), fanless appliances, SBCs (Pi, Banana Pi, NanoPi), and x86 running OpenWRT.
  • Several report 1–2+ Gbps NAT, VPN, and complex firewall rules on modest CPUs (Atoms, low‑end desktop CPUs).
  • Concerns include power consumption (old Macs and generic PCs vs low‑power ARM/mini‑PCs) and reliability of cheap AliExpress boxes.
  • For 10G+, performance gets trickier; some claim modern desktop CPUs can saturate 25G, others say typical router CPUs struggle without offload.

Single NIC + VLANs vs Multiple NICs

  • Strong theme: you can build a “router on a stick” with one NIC and a managed VLAN‑capable switch.
  • Advantages: reuse old hardware; flexible network segmentation (IoT, guest, WAN/LAN separation) over one trunk.
  • Counterpoints: added configuration complexity, potential single‑port bottleneck if pushing near‑symmetrical gigabit, and fear (often called unfounded) of VLAN hopping due to misconfig.
  • Extra NICs or USB NICs are proposed as a simpler mental model for many users.

Wi‑Fi, Mesh, and AP Strategy

  • Many prefer separating routing from Wi‑Fi: run a wired router and dedicated access points (Unifi, Mikrotik, Ruckus, etc.), often with VLAN‑per‑SSID.
  • Hostapd on commodity cards is seen as educational but often worse in performance and reliability than purpose‑built APs.
  • Mesh in homes is debated: some see it as common for larger houses; others call it a minority or overhyped. Mesh is described as mainly AP coordination and wireless backhaul, not magic.

Router OS vs General Linux

  • Split opinion:
    • Pro‑appliance: OpenWRT, OPNsense, pfSense, Sophos, ClearOS give web UIs, updates, backups, and less “weekend sysadmin” work.
    • Pro‑generic Linux/BSD: more flexible, easier to co‑host services, and avoids opaque GUIs that abstract/hide underlying networking.

Firewalling, nftables, and Security

  • Routing is considered “easy”; secure firewalling is hard, especially with modern encrypted traffic.
  • nftables is widely seen as superior to iptables (atomic updates, better debugging), though some stick with iptables out of familiarity.
  • Strong warnings against UPnP and against running many exposed services on the edge router; others argue careful container/VM isolation can be acceptable but increases complexity.
  • Docker’s automatic firewall rules are cited as a common foot‑gun on router hosts.

Tuning, Offload, and Latency

  • A few discuss sysctl and queueing tweaks (e.g., disabling early_demux, fq_codel/CAKE, NIC/stack tuning) to improve latency and jitter, especially for gaming/VoIP.
  • Hardware acceleration: certain NICs and SoCs can offload connection tracking and flow handling via netfilter flowtables; this is niche and hardware‑specific.
  • Dedicated router/switch ASICs (as in commercial routers) are generally acknowledged as lower‑latency and more power‑efficient than Linux bridging/routing on generic NICs.

Policy & “Banning Routers” Angle

  • Some speculate about policy motivations for restricting router imports:
    • Using compromised routers for surveillance, lateral movement, and DDoS.
    • Ability to remotely disable large numbers of devices and cause communication blackouts.
    • Access to metadata (DNS, IPs, volumes) even with TLS.
  • Others are skeptical, pointing out that similar risks exist with domestic brands and that better baseline security requirements (unique passwords, patching obligations) might address many problems.

Practical Recommendations & Gotchas

  • Many advocate: learn with DIY Linux, then consider moving to an appliance OS for day‑to‑day stability.
  • Recommended patterns: router in a closet with serial console for recovery; keep Wi‑Fi separate; avoid overloading the router with unrelated services; use VLANs or extra NICs based on comfort.
  • Several share long‑term success stories with old PCs and embedded boards running OpenBSD, OpenWRT, or OPNsense for years with minimal maintenance.