atualizado em 2018-05-17 09:19:18 GMT+03:00
Horário | Apresentação | Arquivos | Vídeo |
---|---|---|---|
17:00 | MUM Pre-registration, Room - MALLIKA, Free soft drinks by Mikrotik | - | - |
Horário | Apresentação | Arquivos | Vídeo |
---|---|---|---|
08:00 | Check-in and Exhibitor hall opens. Bring your printed tickets | - | - |
10:00 | Opening and introduction, new products by Sergejs Boginskis (MikroTik, Latvia) | ||
10:45 | Some Networking Problems in Bangladesh, Solutions & Expectations from MikroTik by Syed Abu Saleh (SASTECH LIMITED, Bangladesh) | ||
11:30 | Preventing Traffic with Spoofed Source IP Addresses in MikroTik by Md. Abdullah Al Naser (MetroNet Bangladesh Ltd, Bangladesh) | ||
12:15 | MikroTik switches what's new since 6.41, configuration tips and tricks by Sergejs Boginskis (MikroTik, Latvia) | ||
13:00 | 8 types of Link Redundancy and 35 Network Security tips by A.K.M. Jahangir (Bijoy Online Ltd, Bangladesh) | ||
13:30 | Lunch | - | - |
15:00 | Monitoring Large Scale Network by The Dude by Abdul Kader Linkon (Network Engineer Fareast Islami Life Insurance Company Ltd) | ||
15:30 | Basic MikroTik Router’s Security by Titas Sarker (Titas Kumer Sarker, Bangladesh) | ||
16:00 | System and Network Security (MikroTik as a Firewall) by Tayab Khan (Ict Solutions Bangladesh, Bangladesh) | - | |
16:30 | ISP setup with mikrotik and bandwidth limit in bridge mode by Md.Abdur Rob Miah (AlwaysOn Network, Bangladesh) | ||
17:15 | The Dude - Proactive monitoring by Kazi Ahsanuzzaman (Ribbon Technology, Bangladesh) | - | |
17:30 | Raffle and closing of MUM | - | - |
18:00 | Afternoon soft drinks and socializing by MikroTik | - | - |
Mr. Syed Abu Saleh is first MikroTik Certified Trainer from Bangladesh. He has 20 years working experience on Networking & ISP. He will present some MikroTik related networking problems which are facing in Bangladesh. How can we solve those problems. Some Expectations from MikroTik.
I want to give a very important presentation for all IT managers on 8 types of link redundancy with mikrotik and 35 types of network security using mikrotik. I am listed mikrotik consultant from 2007. and working as network administrator of Bijoy Online Ltd, which is one of the largest ISP in Bangladesh.
Firstly I will discuss about reason for security.
Then slides will be how to secure our network? Here will discuss about those-
1. Administrative Users credentials
2. Winbox default ports
3. MAC binding
4. Site restriction
5. Virus port filtering
6. Log server
Finally will share how to configure those.
Dear Concern,
Last MUM Bangladesh I Presented "Priority Based Traffic Shaping by MikroTik" and have got lots of good responses. Hope, this event ( MUM Bangladesh 2018) will be successful.
This Presentation "System and Network Security (MikroTik as a Firewall)" will help our local IT community strongly to build security related awareness, how to use MikroTik as a firewall and my presentation will cover bellow topics
Why MikroTik ?
Security ? Router Security ? System and Network Security ?
Firewall ? How to ensure Router Security ?
DoS, DDoS ? Why DDoS ?
How to Stop DDoS Attacks ?
Black Hole Server, BCP 38 ?
Denial-of-service (DoS) attack protection by MikroTik
Mail Spammer detect by MikroTik.
Examples with Configuration
Regards,
Tayab Khan
BSC in CSE, MSC from JU,
MCP, CCNA, CCNP, CCNSP, JNCIA, JNCIS-SEC,
DGM, Head of Technical Operations
Paradise Premium Group.
Cell: +8801914035805
Email: tayab@tayabkhan.com
Web: http://www.tayabkhan.com/
Want to show how to setup a professional ISP and control the bw in bridge system between core and distribution.
Introduction
Features
Modes of Operation
Interface Layout
Logs
Probes
Snapshots
Pros. & Cons.
Proactive Notification
LAB
Conclusion
References