I thought l did setup the device correctly with the “quick set” as a router. I realized later apparent it wasn’t “complete”.
Found this on the internet {Mikrotik CRS310-8G+2S+IN Config · GitHub} and followed the steps per line using Winbox not CLI only. From line “22 - 30” for some unknown reason l can’t succeed. I can perform all task with winbox from line “3 - 20” and “32- 85”… l guess.
I believe I need that block line “22 - 30” to configure from line “86 - 142”. Any suggestions or guidance would be appreciated.
That github was probably assuming a "blank config".
Are you sure there isn't alread a bridge defined that is using the ether ports?
Post sanitized config export you are starting from.
I think you are going to be disappointed with routing performance of the CRS310-8g+2s+, that's why the recommendation to look at the RB5009 in this thread
The RB5009 has over 10x the routing performance of the CRS310-8g+2s+ unless the L3HW "inter-vlan" routing is good enough for your "routing" needs. See Issues with l3-hw-offloading on CRS310-8G+2S+
and compare to RB5009 (which has a much better CPU and routing performance and a more limited switch (but still quite capable, just no L3HW in the switch chip).
That is what the link shows but it said for "V6". I don't have a V6 device around to test if that is a valid option on V6 or not. @gigabyte091 do you know if the =yes does work with V6? If it does not, can you edit the post (maybe add "for V7 do this" and "for V6 do this" in code blocks.
You are correct, hide-sensitive (default on V7) doesn't sanitize a config.
And show-sensitive doesn't export a config that can be used to restore from.
This is one thing vyatta/edgeos does much better. The config.boot file there is text based and will recreate users and passwords. The hashed passwords are saved, similar to the way that cisco show startup will display hashed passwords. The backup made with the webUI is a gziped tar archive of the /config tree so if you have wg, it also gets the saved wg private key. But you have to treat the vyatta backups as sensitive, because they are easily extracted with utilities like 7-Zip. These should not be published because they can be "offline brute forced", but it at least makes it possible to store configurations offline that will be able to restore to a differnent device. And you can use encyryption tools (even 7-zip with aes) for archiving a more secure backup.
The vyatta/edgeos show configuration command will replace the hashed passwords with ********* but it does nothing to sanitize any dhcp reserved mac addresses, public ip addresses, etc. That still needs to be done there as well.
The ROS export (at least through 7.19.6 which is last I tested) never saves any users or login passwords (not even hashed) when show-sensitive is used.
This is something Mikrotik should repair ASAP as many users will automatically just copy/paste their configuration on the forum with sensitive data thinking everything is sanitized…
I also tested with 7.20.8 long term and same thing is happening.
I will open a ticket for that so they check what’s happening and I will put warning in tutorial to check if sensitive data is redacted.