Turkey on October 15, 2018

Agenda for MUM in Turkey, OCTOBER 2018

updated on 2018-10-18 15:45:21 GMT+03:00


Oct 15, Monday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Opening and introduction, new products by Pauls Jukonis (MikroTik, Latvia) - -
09:45 MikroTik workshop by Yavuz Selim (WI.COM.TR, Turkey) presentation file -
10:30 Providing the customer with real time analytics by Brian Horn (WISP TRACON, USA) - -
11:15 How To Secure MikroTik Wireless Link Using WPA / WPA2 EAP by Iman Farahi Porshegefti (United Arab Emirates) - -
11:45 Web content filtering and log data analysis with Mikrotik routers by Paul Greeff (LucidView, South Africa) presentation file -
12:00 Lunch - -
13:30 Fast Path, Fast Track and ISP Network Desing by Himmet TURKAN (sekuritim, Turkey) presentation file -
14:00 MikroTik & Deep Data & Data Mining by Goker Goksel (MHZ Kablosuz Ag Sis.San.Tic.Ltd.Şti, Turkey) - -
14:30 Hardening RouterOS security by Osman Kazdal (Sekuritim Bilişim, Turkey) presentation file -
15:00 Virtual Network Design With RouterOS by Eray HAŞAR (wirelesssistem.net , Turkey) - -
15:45 Important Points Regarding Wireless System Mountings by Seyhun OGUZ and Alican YILMAZ (wirelesssistem.net , Turkey) - -
16:30 Raffle and closing of MUM - -
17:00 Afternoon drinks (beer and soft drinks) and socializing by MikroTik - -

Speaker Profiles and Presentation Abstracts

MikroTik workshop

Virtual Metro Line. Use of simultaneous total traffic using 2 or more DSL lines. Mikrotik Bounding, L2tp and EoIP Tunneling examples.

Providing the customer with real time analytics

Using the MikroTik API and scripting to deliver cost effective real time analytics to your customers

How To Secure MikroTik Wireless Link Using WPA / WPA2 EAP

We will describe WPA/WPA2 PSK and EAP and there is fully describe of Certificate Authority with RouterOS

Web content filtering and log data analysis with Mikrotik routers

Web content filtering on Mikrotik routers is often performed using either layer 7 filtering, DNS filtering or a combination of both. Both have their advantages and disadvantages.

We'll explore both and show how they can be implemented on a Mikrotik router and then introduce LucidView's Big Data analysis offering as an additional option.

Log data analysis is usually performed on Netflow traffic flows exported to a log analyzer. Free and paid for options are available on the Internet. We explore some options available to Mikrotik router users and how to configure the Mikrotik router to export data to a log analyzer.

We also introduce LucidView's solution to the above and how it is different and then demonstrate how to script the Mikrotik to perform content filtering, firewall blocking and Big Data log analysis on the LucidView's cloud portal.

MikroTik & Deep Data & Data Mining

MikroTik Traffic Analysis and How to Use it For Future.

Hardening RouterOS security

RouterOS Security
- Hardening RouterOS
- Firewall Strategies
- Some tips to configure RouterOS to proactively protect itself

Virtual Network Design With RouterOS

Presenter will talk about Virtual network and will show benefits and step by step configuration examples using RouterOS.

Important Points Regarding Wireless System Mountings

Will show common mistakes while mounting MikroTik wireless systems. Possible problems you will face and solutions for all your mountings.