actualizado el 2018-05-29 12:35:48 GMT+03:00
|Check-in and Exhibitor hall opens. Bring your printed tickets
|Opening and introduction, new products by Janis Megis (MikroTik Latvia)
|3 from the small end of town by Mike Everest (DuxTel Pty Ltd, Australia)
|Managing indoor wireless with MikroTik CAPsMAN by Achmad Mardiansyah (GLC networks, Indonesia)
|The path between fastpath and advanced features by Janis Megis (MikroTik, Latvia)
|MikroTik from a PABX technician perspective by Joel Cornale (Australia)
|Using MikroTik in Rural/Regional Australia by David Ryan (RJS Communications, Australia)
|Using MikroTik routers as an NBN BNG by Murray Southwell (TASMANET, Australia)
|60GHz range improvements and multipoint capabilities by Pauls Jukonis (MikroTik, Latvia)
|Applying Threat Intelligence and Cyber Security using MikroTik RouterOS by Troy Wilkinson (Axiom Cyber Solutions, USA)
|Understanding Packet Flow in RouterOS v6 by Herry Darmawan (BelajarMikroTik, Indonesia)
|Raffle and closing of MUM
|Afternoon drinks (beer and soft drinks) sponsored by DuxTel, socializing and networking
Mike Everest of DuxTel Australia, demonstrates how three of the smallest MikroTik products can take on a huge range of applications! Featuring mAP, mAP-lite and woobm!
In this presentation, I will talk about CAPsMAN application that is used to manage indoor wireless network
I'm a PABX technician of 20 years with IP knowledge ,I want to let people who
have clients that have IP PABX's how I have been using MikroTik to help with toll fraud
prevention & general deployment / diagnostics with IP PABX's
Presentation will be an overview of several projects installed in rural South-East Australia using MikroTik
Techniques and tricks to provide NBN-based services using MikroTik CCR routers.
This includes queues, IP addressing, and automation.
Using the MikroTik RouterOS to accomplish world class cybersecurity protections using a variety of rules, address lists, and continuous updates along with a platform that integrates to multiple open & closed sources of threat intelligence that pushes out automated updates to all devices.
Many people think Packet Flow is hard to learn. By using some simple approach, we can make Packet Flow quite fun and easy to understand. This presentation will focus on how a packet is treated inside the router to get better understanding about in which chain should we put our rule