updated on 2018-05-17 09:19:18 GMT+03:00
|17:00||MUM Pre-registration, Room - MALLIKA, Free soft drinks by Mikrotik||-||-|
|08:00||Check-in and Exhibitor hall opens. Bring your printed tickets||-||-|
|10:00||Opening and introduction, new products by Sergejs Boginskis (MikroTik, Latvia)|
|10:45||Some Networking Problems in Bangladesh, Solutions & Expectations from MikroTik by Syed Abu Saleh (SASTECH LIMITED, Bangladesh)|
|11:30||Preventing Traffic with Spoofed Source IP Addresses in MikroTik by Md. Abdullah Al Naser (MetroNet Bangladesh Ltd, Bangladesh)|
|12:15||MikroTik switches what's new since 6.41, configuration tips and tricks by Sergejs Boginskis (MikroTik, Latvia)|
|13:00||8 types of Link Redundancy and 35 Network Security tips by A.K.M. Jahangir (Bijoy Online Ltd, Bangladesh)|
|15:00||Monitoring Large Scale Network by The Dude by Abdul Kader Linkon (Network Engineer Fareast Islami Life Insurance Company Ltd)|
|15:30||Basic MikroTik Router’s Security by Titas Sarker (Titas Kumer Sarker, Bangladesh)|
|16:00||System and Network Security (MikroTik as a Firewall) by Tayab Khan (Ict Solutions Bangladesh, Bangladesh)||-|
|16:30||ISP setup with mikrotik and bandwidth limit in bridge mode by Md.Abdur Rob Miah (AlwaysOn Network, Bangladesh)|
|17:15||The Dude - Proactive monitoring by Kazi Ahsanuzzaman (Ribbon Technology, Bangladesh)||-|
|17:30||Raffle and closing of MUM||-||-|
|18:00||Afternoon soft drinks and socializing by MikroTik||-||-|
Mr. Syed Abu Saleh is first MikroTik Certified Trainer from Bangladesh. He has 20 years working experience on Networking & ISP. He will present some MikroTik related networking problems which are facing in Bangladesh. How can we solve those problems. Some Expectations from MikroTik.
I want to give a very important presentation for all IT managers on 8 types of link redundancy with mikrotik and 35 types of network security using mikrotik. I am listed mikrotik consultant from 2007. and working as network administrator of Bijoy Online Ltd, which is one of the largest ISP in Bangladesh.
Firstly I will discuss about reason for security.
Then slides will be how to secure our network? Here will discuss about those-
1. Administrative Users credentials
2. Winbox default ports
3. MAC binding
4. Site restriction
5. Virus port filtering
6. Log server
Finally will share how to configure those.
Last MUM Bangladesh I Presented "Priority Based Traffic Shaping by MikroTik" and have got lots of good responses. Hope, this event ( MUM Bangladesh 2018) will be successful.
This Presentation "System and Network Security (MikroTik as a Firewall)" will help our local IT community strongly to build security related awareness, how to use MikroTik as a firewall and my presentation will cover bellow topics
Why MikroTik ?
Security ? Router Security ? System and Network Security ?
Firewall ? How to ensure Router Security ?
DoS, DDoS ? Why DDoS ?
How to Stop DDoS Attacks ?
Black Hole Server, BCP 38 ?
Denial-of-service (DoS) attack protection by MikroTik
Mail Spammer detect by MikroTik.
Examples with Configuration
BSC in CSE, MSC from JU,
MCP, CCNA, CCNP, CCNSP, JNCIA, JNCIS-SEC,
DGM, Head of Technical Operations
Paradise Premium Group.
Want to show how to setup a professional ISP and control the bw in bridge system between core and distribution.
Modes of Operation
Pros. & Cons.