Europe on February 25 - 26, 2016

Agenda for MUM in Europe, FEBRUARY 2016

updated on 2016-05-13 10:30:09 GMT+03:00


Feb 24, Wednesday

Time More info Files Video
18:00 Meet 'n' greet party, early registration - -

Feb 25, Thursday

Time More info Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Opening and introduction, new products by Sergejs Boginskis (MikroTik, Latvia) presentation file -
09:45 Live demo and setup of IPv6 BGP peering by Leo De Geer (Satellithuset i Limmared AB, Sweden) presentation file presentation video
10:30 How to choose the right VPN for you by Andis Āriņš (router.lv - Andis Arins, Latvia) presentation file presentation video
11:15 The Dude is back! by Patrik Schaub (FMS, Germany) presentation file presentation video
12:00 Wireless workshop by Uldis Cernevskis (MikroTik, Latvia) presentation file presentation video
12:30 Lunch at Hotel "Breakfast" and "Blue" rooms - -
14:00 MikroTik Academy Experience by Martin Krug (MikroTik Cool Academy, Slovakia) and Miran Bunderla (CBRZNET d.o.o., Slovenia) presentation file presentation video
14:45 FastPath Overview by Janis Megis (MikroTik, Latvia) presentation file presentation video
15:30 Conserving IPv4 Addresses in a Routed Network by Brian Horn (Brian Horn - WISP TRACON, USA) presentation file presentation video
16:15 ISP Architecture – Deploy virtualized public BGP routers with CHR for large scale transit peering by Kevin Myers - iparchitechs.com (IP ArchiTechs, USA) presentation file presentation video
17:15 DDoS attacks detection and mitigation - a real case implementation by Wardner Maia (MD Brasil - Information Technology, Brazil) presentation file presentation video
17:30 Free beer in Exhibitors halls by MikroTik - -

Feb 26, Friday

Time More info Files Video
08:00 Check-in and Exhibitor hall opens - -
09:00 Aggregated Monitoring Chapter One: RouterOS by Bartlomiej Kos (Netia S.A., Poland) presentation file presentation video
09:45 NetFlow: what happens in your network? by Lorenzo Busatti, Grifonline S.r.l. (Grifonline S.r.l., Italy) presentation file presentation video
10:30 Fully redundant networks by Mihai Saftoiu (TIER SRL, Romania) presentation file presentation video
11:15 MikroTik lifehacking by Daniel Starnowski (StarTik, Poland) presentation file presentation video
12:00 Inside Mikrotik Switch by Massimo Nuvoli (Progetto Archivio S.r.l., Italy) presentation file presentation video
12:30 Lunch at Hotel "Breakfast" and "Blue" rooms - -
14:00 RoMON vs Management Vlan case study by Pawel Cieplinski (IP-PRO / MS-DIST, Poland) presentation file presentation video
14:30 Why using MikroTik workshop? by Thierry Wehr (WideVOIP, France) presentation file presentation video
14:45 Quality Considerations in Wireless Networking by Michel Bodenheimer (MTI Wireless Edge Ltd., Israel) presentation file presentation video
15:30 Securing and testing with MikroTik by José Manuel Román Fernández-Checa (Cloud Networking Communications S.L., Spain) presentation file presentation video
16:00 Mikrotik as a soho router - lessons learned by Arijan Siska (Siopti, Slovenia) presentation file presentation video
16:30 Raffle and closing of MUM - -

Speaker Profiles and Presentation Abstracts

Live demo and setup of IPv6 BGP peering

Live demo and setup of IPv6 BGP peering with Hurricane Electric for small ISP with RIPE assigned IPv6 until upstream provider are ready and configure of OSPFv3 for internal routing of IPv6

How to choose the right VPN for you

RouterOS offers a rich set of VPN technologies. This presentation covers multiple uses cases and best practice for choosing VPN for your network arhitecture. Security/Performance/Flexibility.

Conserving IPv4 Addresses in a Routed Network

Implement OSPF routing in a /32 address based network, conserving IPv4 addresses. Presentation will include migration plan to /32 based OSPF network in a WISP environment.

ISP Architecture – Deploy virtualized public BGP routers with CHR for large scale transit peering

ISPs are frequently struggling to add capacity both in traffic volume as well as peering capacity. This presentation will explore a solution to the problem of resource utilization when adding peerings for downstream customers who purchase transit and want to announce their IP space. By using virtualization with ESXi and the Cloud Hosted Router as well as MPLS, we are able to bring up transit on demand and not limit peerings to 1 or 2 physical routers that may become overwhelmed. Part of the design discussion includes using VPLS as an overlay to avoid leaking multiple full BGP tables into the ISP core. Using the CHR in VMWARE ESXi will also be discussed.

DDoS attacks detection and mitigation - a real case implementation

Distributed Denial of Service (DDoS) attacks are dramatically increasing in the recent times. Last year, a big network operator in Asia faced the largest attack ever detected in the history of Internet. At the same time DDoS attacks tend to gain more and more power, they are also are increasing in number and targets, signaling troubles, even for small companies. Unfortunately being a target of such type of attack is not a matter of if, but when it will happen. In this presentation, after a short background about DDoS attacks and techniques for prevention and mitigation, it will be shown a real case implementation on a small operator in Brazil. In this network open source tools to detect the attacks were installed, as well as a system integrated with Mikrotik routers to automatically trigger the mitigation. About the presenter: Wardner Maia is Electronic Engineer, CTO of MDBrasil (Brazil), Mikrotik Trainer (#021) since 2007 and member of the board of directors of LACNIC.





Aggregated Monitoring Chapter One: RouterOS

The presentation aims at showing how one can use baseline techniques and protocols for retrieving interesting RouterOS information from a monitoring-fixated guy's perspective; all in a way that is scalable and maintainable, its simplicity notwithstanding.

Bash, sed, SNMP? Come right in! API, PHP; C++? Begone!

NetFlow: what happens in your network?

A practical guide to use the MikroTik Traffic Flow with NetFlow analyzers: your torch into the darkness of your customers traffic.

Fully redundant networks

Building better, faster, more reliable networks for the ISP & enterprise sector using MikroTik routers and switches.

MikroTik lifehacking

Lifehacking - way of life involving common tools used in unobvious (often funny) ways to increase efficiency.
The presentation shows many short and funny tricks on how to make life easier using MikroTik features to get some surprising results. For example - how to make some new values and variables accessible via SNMP? Or how to load balance a PPTP (or L2TP) tunneled connection using few WANs?
Special place in the presentation, including the theoretical background, is dedicated to understanding ARP, proxy-ARP, /32 addresses and routing with gateway set directly to interface. This leads to discovering many new tricks, like using the same IP address and gateway on few different interfaces independently or forwarding WAN address from the router to a computer without using NAT.

Inside Mikrotik Switch

Inside inspection on how Mikrotik different devices can do "pure" switch in a network.
How to use vlan, ports and many other functions.
Simple use of a CRS125 for two nodes VMWARE cluster.

Quality Considerations in Wireless Networking

This presentation covers the longstanding experience MTI Wireless Edge has with MikroTik based wireless networks. Special attention is given to the wireless aspects of networks based on MikroTik. The difference between a fixed line and RF links in a network are covered. Design considerations in a wireless network are discussed, including Distance of transmission, Throughput achievable, Quality of Service (QoS), Interference immunity (C/N, C/I), Frequency re-use, Reliability, Survivability etc.
Special attention is given to different antenna parameters such as Frequency, Gain (main Lobe), Half Power Beam Width, Front to Back Ratio, Side Lobe, Nulls, Cross Polarization,
Environmental Conditions and their influence on the performance of the network are discussed.
Finally a few real-life examples are given to illustrate the abovementioned issues.

Securing and testing with MikroTik

In this presentation we will see how to avoid the most common security threats. We use Mikrotik tools to detect and stop attacks.

Mikrotik as a soho router - lessons learned

Mikrotik offers a range of products most of which are very suitable for Small Office / Home Office environment. We present a practical study of issues that occur in such environment based on our 5+ year experiance: from failure rate, installation issues, encryption performance, routing protocols, windows environment issues, maintenance issues, security issues.