

Doing routing/firewall in software is a lot more flexible, and easier to patch when vulnerabilities come out. Especially when software is integral to the routing (looking at you wireguard/openvpn).
Keep in mind those edgerouters look like they have dual core embedded MIPS CPUs.
My dell power edge is a full blown rack-mount server that could run a small plex instance. You could stick a 1060 in this thing and get Witcher 3 to play at a reasonable framerate.
That’s what makes up for the lack of dedicated asics.
As for the four NICs they are as follows:
- 1gb - wan (to modem)
- 1gb - config (to config vlan on switch)
- 10gbps - main lan trunk to LAN switch
- 10gbps - trunk line to public server VM host (DMZ’d from rest of lan, each VM has its own vlan/subnet/firewall ruleset)
They don’t act as a switch because it handles packets, not frames, allowing/dropping/denying them based on rules set in software.



Microsoft is already making use of more AI, and bug reports aren’t code?