updated on 2018-10-18 15:45:21 GMT+03:00
|08:00||Check-in and Exhibitor hall opens. Bring your printed tickets||-||-|
|09:00||Opening and introduction, new products by Pauls Jukonis (MikroTik, Latvia)||-||-|
|09:45||MikroTik workshop by Yavuz Selim (WI.COM.TR, Turkey)||-|
|10:30||Providing the customer with real time analytics by Brian Horn (WISP TRACON, USA)||-||-|
|11:15||How To Secure MikroTik Wireless Link Using WPA / WPA2 EAP by Iman Farahi Porshegefti (United Arab Emirates)||-||-|
|11:45||Web content filtering and log data analysis with Mikrotik routers by Paul Greeff (LucidView, South Africa)||-|
|13:30||Fast Path, Fast Track and ISP Network Desing by Himmet TURKAN (sekuritim, Turkey)||-|
|14:00||MikroTik & Deep Data & Data Mining by Goker Goksel (MHZ Kablosuz Ag Sis.San.Tic.Ltd.Şti, Turkey)||-||-|
|14:30||Hardening RouterOS security by Osman Kazdal (Sekuritim Bilişim, Turkey)||-|
|15:00||Virtual Network Design With RouterOS by Eray HAŞAR (wirelesssistem.net , Turkey)||-||-|
|15:45||Important Points Regarding Wireless System Mountings by Seyhun OGUZ and Alican YILMAZ (wirelesssistem.net , Turkey)||-||-|
|16:30||Raffle and closing of MUM||-||-|
|17:00||Afternoon drinks (beer and soft drinks) and socializing by MikroTik||-||-|
Virtual Metro Line. Use of simultaneous total traffic using 2 or more DSL lines. Mikrotik Bounding, L2tp and EoIP Tunneling examples.
Using the MikroTik API and scripting to deliver cost effective real time analytics to your customers
We will describe WPA/WPA2 PSK and EAP and there is fully describe of Certificate Authority with RouterOS
Web content filtering on Mikrotik routers is often performed using either layer 7 filtering, DNS filtering or a combination of both. Both have their advantages and disadvantages.
We'll explore both and show how they can be implemented on a Mikrotik router and then introduce LucidView's Big Data analysis offering as an additional option.
Log data analysis is usually performed on Netflow traffic flows exported to a log analyzer. Free and paid for options are available on the Internet. We explore some options available to Mikrotik router users and how to configure the Mikrotik router to export data to a log analyzer.
We also introduce LucidView's solution to the above and how it is different and then demonstrate how to script the Mikrotik to perform content filtering, firewall blocking and Big Data log analysis on the LucidView's cloud portal.
MikroTik Traffic Analysis and How to Use it For Future.
- Hardening RouterOS
- Firewall Strategies
- Some tips to configure RouterOS to proactively protect itself
Presenter will talk about Virtual network and will show benefits and step by step configuration examples using RouterOS.
Will show common mistakes while mounting MikroTik wireless systems. Possible problems you will face and solutions for all your mountings.