actualizado el 2018-04-26 13:38:49 GMT+03:00
Hora | Presentación | Archivos | Video |
---|---|---|---|
18:00 | Meet 'n' greet party, early registration | - | - |
Hora | Presentación | Archivos | Video |
---|---|---|---|
08:00 | Check-in and Exhibitor hall opens. Bring your printed tickets | - | - |
09:00 | CHR and Remote VPN Support by Joshua Gray (Baltic Networks, USA) | - | |
09:30 | Delivering Managed Services with MikroTik Products by Brian Horn (WISP TRACON, USA) | ||
10:15 | Why Cybersecurity is Easy by Brent Watkins (Axiom Cyber Solutions, USA) | - | - |
11:00 | FCC Update by Mark Bayliss (Visual Link Internet, USA) | - | |
11:15 | 60GHz range improvements and multipoint capabilities by Uldis Cernevskis (MikroTik, Latvia) | ||
12:00 | Lunch | - | - |
13:30 | Threat Intelligence Integration to MikroTik RouterOS by Troy Wilkinson (Axiom Cyber Solutions, USA) | ||
14:15 | The path between fastpath and advanced features by Janis Megis (MikroTik, Latvia) | ||
15:00 | Raffle and closing of MUM | - | - |
15:30 | Happy hour - free drinks, hosted by Baltic Networks (www.balticnetworks.com) | - | - |
This presentation will focus on how to troubleshoot the Open Shortest Path First routing protocol (OSPF) in RouterOS.
Several types of troubleshooting will be covered:
1. Using information in the OSPF routing menu to troubleshoot
2. Using the Log to troubleshoot OSPF
3. Using packet captures to troubleshoot OSPF
4. Using Link State Advertisements to troubleshoot OSPF
The goal of this presentation is to help RouterOS users understand/remediate the root cause of instability and other problems within OSPF. The scenarios covered will include connecting to other RouterOS devices as well as other network vendors. IPv4 and IPv6 will both be included in this presentation.
Greg walks you through pulling free REAL full internet tables from multiple sources into your lab. This allows anyone to test their filtering, communities, and prepending inbound and outbound in a safe controlled environment(with demonstration of all three).
Learn about a complete MikroTik hardware based technology platform that has been developed
which allows the deployment of Building Scale ISPs to be deployed and configured in just a
few minutes. From history to concept to realization, you're going to hear about the
things that were needed to create what may just be the first fully scalable and web
managed retail product that lives purely in the cloud, and delivered entirely with
MikroTik equipment.
Greg Sowell, Tomas Kirnak, and Justin Miller from TheBrothersWISP.com take audience questions surrounding MikroTik routing. Have your questions ready!
Bridging local area networks over the internet is not a new idea. MikroTik’s own EOIP tunnel interface has made this easy for nearly 18 years. One disadvantage of EOIP is that the IP addresses of the endpoints must be public IP’s or the tunnel must be built over a separate VPN tunnel, thereby increasing packet overhead and adding additional configuration steps to make each tunnel. In this presentation, I will demonstrate the BCP or Bridge Control Protocol, which is a method of bridging PPP tunnels, that provides Layer 2 connectivity (and when combined with L2TP), provides encryption in a single configuration step even when both devices have dynamic IP addresses.
Building a Layer 2 WAN can be useful for many reasons, and in this presentation, I will show you how to easily build a Layer 2 WAN that can be used for a simple, yet powerful VOIP solution using VOIP phones in remote locations with a central PBX while still being able to utilize the Grandstream "Zero Configuration" feature not otherwise available with remotely located phones.
It’s one thing to deploy a MikroTik based solution to a network you manage, and familiar configurations, it’s another thing to deploy to environments and systems which you do not manage nor have access or knowledge about.
In this presentation we will review an extensive self discovery script that allows a developer to deploy a MikroTik based solution, to unknown configurations and network topologies. The script does that by automatically learning about the environment it runs in, and reporting back to the program the necessary variables to successfully deploy.
This presentation will talk about IPsec in general - the basics, how IPsec works, different IPsec modes, Phase 1, Phase 2, SAs, etc.
After the first part of the presentation, the listeners should have a decent understanding of how IPSec works, and what's involved in establishing an IPSec session.
After the basics, the presentation will focus on using IPsec XAuth mode-config for road-warrior VPN usage. We will cover split-routing, split-DNS, user auth (RADIUS vs. Local) and other topics.
Security and client-side configuration will also be covered, to provide a comprehensive solution that can be deployed in any network.
Using CHR, Remote MikroTik devices, and EOIP to support clients all over the world.
MikroTik products enable the provision of managed business and residential solutions, improving the user experience, reducing operating and support costs while increasing revenue, while providing extensive diagnostics.
Brent’s presentation will cover the many lessons he’s learned in 20 years of computer
intrusion investigations, and his “heretical” position that cyber security is easy.
Explore today's latest threats and learn how using RouterOS's firewall, security features,
deep packet inspection, and other product features will accomplish a higher level of
security.
Brent Watkins, founder of Globalsec Partners LLC, is a recently retired Special Agent
of the Federal Bureau of Investigation. He has over 20 years of diverse experience
investigating computer intrusions and international terrorism cases with the FBI. He’s
also a qualified forensic examiner and Special Agent Bomb Technician. Brent was a member
of one of the first FBI squads (1996) specifically dedicated to the investigation of
computer intrusions, and has investigated numerous high profile cyber cases. He’s been
stationed in Los Angeles, Washington DC, Knoxville, and Las Vegas. He’s had ten overseas
deployments over his FBI career. Prior to the FBI he was a military officer with the
United States Air Force. His academic background is in chemistry and electrical
engineering, and he holds an MBA. He’s now partnered with Axiom Cyber Solutions to lead
business development.
FCC "Technology Advisory council" Member The FCC’s Technological Advisory Council (TAC)
National Broadband Plan, CBRS, Sattatlte, 5G /IOT. Update and Q and A
Wireless Wire provides Gigabit wire speed over wireless network. New Wireless Wire product line provides low cost, high speed wireless links for shorter distances. In this presentation we will see how 60GHz devices could be used in different usage scenarios, we will look into link performance testing and troubleshoot common configuration and placement mistakes. We will also see how MikroTik improves performance and adds new features between different RouterOS versions.
Presentation is about using the MikroTik RouterOS to accomplish world class cybersecurity protections using a variety of rules, address lists, and continuous updates along with a platform that integrates to multiple open & closed sources of threat intelligence that pushes out automated updates to all devices.
Troy Wilkinson is a CISSP, MTCNA, and MTCTCE that started his law enforcement career over 20 years ago conducting large cyber investigations across the United States. In 2006, Wilkinson was recruited by the U.S. State Department to serve in an Embassy in Kosovo and investigate cyber crime for the US Government around the world. Wilkinson’s cases included numerous war crimes cases, financial crimes, organized crime and terrorist cases. After leaving the State Department and moving home to Las Vegas, Wilkinson along with his wife opened Axiom Cyber Solutions with the goal of providing world class cybersecurity protections for businesses at a price they can afford. Leveraging the affordability and capabilities of the MikroTik RouterOS product line, Axiom is able to help small and medium businesses enjoy enterprise level security at a price they can afford.
MUM closing cocktail - Happy hour - free drinks, hosted by Baltic Networks