updated on 2016-05-13 10:30:09 GMT+03:00
|18:00||Meet 'n' greet party, early registration||-||-|
|08:00||Check-in and Exhibitor hall opens. Bring your printed tickets||-||-|
|09:00||Opening and introduction, new products by Sergejs Boginskis (MikroTik, Latvia)||-|
|09:45||Live demo and setup of IPv6 BGP peering by Leo De Geer (Satellithuset i Limmared AB, Sweden)|
|10:30||How to choose the right VPN for you by Andis Āriņš (router.lv - Andis Arins, Latvia)|
|11:15||The Dude is back! by Patrik Schaub (FMS, Germany)|
|12:00||Wireless workshop by Uldis Cernevskis (MikroTik, Latvia)|
|12:30||Lunch at Hotel "Breakfast" and "Blue" rooms||-||-|
|14:00||MikroTik Academy Experience by Martin Krug (MikroTik Cool Academy, Slovakia) and Miran Bunderla (CBRZNET d.o.o., Slovenia)|
|14:45||FastPath Overview by Janis Megis (MikroTik, Latvia)|
|15:30||Conserving IPv4 Addresses in a Routed Network by Brian Horn (Brian Horn - WISP TRACON, USA)|
|16:15||ISP Architecture – Deploy virtualized public BGP routers with CHR for large scale transit peering by Kevin Myers - iparchitechs.com (IP ArchiTechs, USA)|
|17:15||DDoS attacks detection and mitigation - a real case implementation by Wardner Maia (MD Brasil - Information Technology, Brazil)|
|17:30||Free beer in Exhibitors halls by MikroTik||-||-|
|08:00||Check-in and Exhibitor hall opens||-||-|
|09:00||Aggregated Monitoring Chapter One: RouterOS by Bartlomiej Kos (Netia S.A., Poland)|
|09:45||NetFlow: what happens in your network? by Lorenzo Busatti, Grifonline S.r.l. (Grifonline S.r.l., Italy)|
|10:30||Fully redundant networks by Mihai Saftoiu (TIER SRL, Romania)|
|11:15||MikroTik lifehacking by Daniel Starnowski (StarTik, Poland)|
|12:00||Inside Mikrotik Switch by Massimo Nuvoli (Progetto Archivio S.r.l., Italy)|
|12:30||Lunch at Hotel "Breakfast" and "Blue" rooms||-||-|
|14:00||RoMON vs Management Vlan case study by Pawel Cieplinski (IP-PRO / MS-DIST, Poland)|
|14:30||Why using MikroTik workshop? by Thierry Wehr (WideVOIP, France)|
|14:45||Quality Considerations in Wireless Networking by Michel Bodenheimer (MTI Wireless Edge Ltd., Israel)|
|15:30||Securing and testing with MikroTik by José Manuel Román Fernández-Checa (Cloud Networking Communications S.L., Spain)|
|16:00||Mikrotik as a soho router - lessons learned by Arijan Siska (Siopti, Slovenia)|
|16:30||Raffle and closing of MUM||-||-|
Live demo and setup of IPv6 BGP peering with Hurricane Electric for small ISP with RIPE assigned IPv6 until upstream provider are ready and configure of OSPFv3 for internal routing of IPv6
RouterOS offers a rich set of VPN technologies. This presentation covers multiple uses cases and best practice for choosing VPN for your network arhitecture. Security/Performance/Flexibility.
Implement OSPF routing in a /32 address based network, conserving IPv4 addresses. Presentation will include migration plan to /32 based OSPF network in a WISP environment.
ISPs are frequently struggling to add capacity both in traffic volume as well as peering capacity. This presentation will explore a solution to the problem of resource utilization when adding peerings for downstream customers who purchase transit and want to announce their IP space. By using virtualization with ESXi and the Cloud Hosted Router as well as MPLS, we are able to bring up transit on demand and not limit peerings to 1 or 2 physical routers that may become overwhelmed. Part of the design discussion includes using VPLS as an overlay to avoid leaking multiple full BGP tables into the ISP core. Using the CHR in VMWARE ESXi will also be discussed.
Distributed Denial of Service (DDoS) attacks are dramatically increasing in the recent times. Last year, a big network operator in Asia faced the largest attack ever detected in the history of Internet. At the same time DDoS attacks tend to gain more and more power, they are also are increasing in number and targets, signaling troubles, even for small companies. Unfortunately being a target of such type of attack is not a matter of if, but when it will happen. In this presentation, after a short background about DDoS attacks and techniques for prevention and mitigation, it will be shown a real case implementation on a small operator in Brazil. In this network open source tools to detect the attacks were installed, as well as a system integrated with Mikrotik routers to automatically trigger the mitigation. About the presenter: Wardner Maia is Electronic Engineer, CTO of MDBrasil (Brazil), Mikrotik Trainer (#021) since 2007 and member of the board of directors of LACNIC.
The presentation aims at showing how one can use baseline techniques and protocols for retrieving interesting RouterOS information from a monitoring-fixated guy's perspective; all in a way that is scalable and maintainable, its simplicity notwithstanding.
Bash, sed, SNMP? Come right in! API, PHP; C++? Begone!
A practical guide to use the MikroTik Traffic Flow with NetFlow analyzers: your torch into the darkness of your customers traffic.
Building better, faster, more reliable networks for the ISP & enterprise sector using MikroTik routers and switches.
Lifehacking - way of life involving common tools used in unobvious (often funny) ways to increase efficiency.
The presentation shows many short and funny tricks on how to make life easier using MikroTik features to get some surprising results. For example - how to make some new values and variables accessible via SNMP? Or how to load balance a PPTP (or L2TP) tunneled connection using few WANs?
Special place in the presentation, including the theoretical background, is dedicated to understanding ARP, proxy-ARP, /32 addresses and routing with gateway set directly to interface. This leads to discovering many new tricks, like using the same IP address and gateway on few different interfaces independently or forwarding WAN address from the router to a computer without using NAT.
Inside inspection on how Mikrotik different devices can do "pure" switch in a network.
How to use vlan, ports and many other functions.
Simple use of a CRS125 for two nodes VMWARE cluster.
This presentation covers the longstanding experience MTI Wireless Edge has with MikroTik based wireless networks. Special attention is given to the wireless aspects of networks based on MikroTik. The difference between a fixed line and RF links in a network are covered. Design considerations in a wireless network are discussed, including Distance of transmission, Throughput achievable, Quality of Service (QoS), Interference immunity (C/N, C/I), Frequency re-use, Reliability, Survivability etc.
Special attention is given to different antenna parameters such as Frequency, Gain (main Lobe), Half Power Beam Width, Front to Back Ratio, Side Lobe, Nulls, Cross Polarization,
Environmental Conditions and their influence on the performance of the network are discussed.
Finally a few real-life examples are given to illustrate the abovementioned issues.
In this presentation we will see how to avoid the most common security threats. We use Mikrotik tools to detect and stop attacks.
Mikrotik offers a range of products most of which are very suitable for Small Office / Home Office environment. We present a practical study of issues that occur in such environment based on our 5+ year experiance: from failure rate, installation issues, encryption performance, routing protocols, windows environment issues, maintenance issues, security issues.