User Manual for PROTECTLI models including: V1410, V1410 Vault Mini PC, Vault Mini PC, Mini PC, PC

David Chow

Users Manual

Dewolf Technologies, Inc (DBA Protectli) V14XX Mini PCs 2A23B-V14XX 2A23BV14XX v14xx


File Info : application/pdf, 6 Pages, 493.31KB

PDF preview unavailable. Download the PDF instead.

GetApplicationAttachment.html?id=7425273
User Manual For V1410 Mini PC

V2024 1.0

This User Manual was designed for Protectli V14XX series Mini PCs. Including the typical model V1410 which is a 2 port networks hard ware.

1. Application

The most important consideration for choosing your hardware is what application it will be used for. The Protectli Vault can be used in a number of different applications. Customers have deployed Vaults as Windows Clients, Linux Desktops and Servers, Hypervisors, and of course firewalls.

Thinking about the requirements for your use case will help to narrow your choice when it comes to picking your Vault.

Our recommendation: Simple client machines will work great on our smaller 2-port Vaults, while you may want to consider a 4-port or 6-port for firewall or hypervisor applications.

2. Ports

The number of ethernet ports you need depends on your application. Firewalls can be configured on as little as a two physical ports, but for simplicity and throughput, consider that you may want multiple physical ports to segment traffic for multiple networks (i.e. a `secure' network, an `IoT' network, a `guest' network, etc).

For hypervisor applications, consider that a physical port can be `passed through' to an individual virtual machine so multiple virtual machines may need more physical ports.

The Vault is currently available in 2-Port, 4-Port, and 6-Port variations. In addition, some models have 2.5G or 10G Ethernet ports.

Our recommendation: It is smart to think about future-proofing your Vault from the start, so consider a model with more Ethernet ports and

3. Throughput Requirements

Every Vault's Ethernet ports are PCIe connected to the CPU and can run at linerate of either 1 Gbps, 2.5 Gbps or 10 Gbps. FIREWALL

As a firewall, every Vault has tested at full wire speed between ports using iperf as a synthetic load. As such, for basic routing applications any Vault is capable of gigabit

throughput. However, in most firewall application, additional services will be turned on that consume CPU and thus may reduce throughput. These include modest services such as DHCP and DNS or heavy CPU users such as Deep Packet Inspection (DPI). A key consideration is Virtual Private Networking (VPN) support. VPN requires processor intensive encryption.
Our recommendation: With a modest throughput of up to ~300 Mbps, you can run many firewall applications in `basic' routing and firewall mode on any of our 2-Port or 4-Port port models. With increased throughput (especially gigabit service) or if implementing VPN, DPI, IPS/IDS, SNORT, Sensei, or other firewall add-ons, we recommend a Vault with a performant CPU such as the VP4600 or VP6600.
Note: For sample VPN throughput tests we have performed to show baselined performance across all models, check out our OpenVPN and IPSEC VPN tests. HYPERVISOR
For hypervisor applications, the Vault's multiple gigabit ports are ideal for dedicated physical connections passed through to individual VM's.
Our recommendation: In most circumstances, using a Vault as a hypervisor means that the user will want to run multiple operating systems, requiring CPU, memory, and network connections. As such, we recommend the 6-Port Units. 4. Security
Security is an important consideration for any network or compute appliance. coreboot is available as an open source BIOS on all the Vaults. In addition, the Vault Pro (VP) series have additional security features.
Our recommendation: If security is important, we recommend coreboot in general and the advanced security features available on the Vault Pro Series.

5. Workload and Hardware Requirements by OS The OS you choose to run can greatly affect the performance requirements of the Vault. Some customers use the Vault to run a basic firewall, while others use it as a hypervisor, desktop, or SD-WAN. Therefore, hardware requirements vary widely. Here are a few examples of usage that typically require a stronger CPU.
· Routing all network traffic through a VPN requires higher CPU clock speeds, especially at higher throughput. Click here for more performance results.
· Running add-on packages like pfBlocker (pfSense), SNORT (pfSense), or Sensei (OPNsense)
· Using the Vault to run a hypervisor, and/or having other software running on the same device.
Here are hardware recommendations for common OS's:
6. The V1410 Photo

The Front Side
The Back Side 7. The Specifications

8. The Steps For Users Step One: Plug the power adaptor Step Two: Connect any display with HDMI cable Step Three: Press the power-on button, color blue Step four: Install the OS you needed Step Five: Plug in the networks cable and make setting with OS

FCC Caution.
§ 15.19 Labelling requirements. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
§ 15.21 Information to user. Any Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
§ 15.105 Information to the user. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -Reorient or relocate the receiving antenna. -Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help.
RF warning for Mobile device: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated withminimum distan ce 20cm between the radiator & your body



References

Adobe Acrobat Pro 9.0.0