Canada on September 24, 2019

Agenda for MUM in Canada, SEPTEMBER 2019

updated on 2019-06-17 10:59:15 GMT+03:00


Sep 24, Tuesday

Time Presentation Files Video
09:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
10:00 Opening and introduction, new products by MikroTik - -
10:45 Wireless Registration Table, VoIP Security, challenges and solutions by Hani Rahrouh (Hani Rahrouh- wirelessnetware.ca, Canada) - -
11:45 How to get protected from common threats with MikroTik RouterOS by Wilmer Almazan (Mikrotik Network Solutions, Canada) - -
12:15 Lunch - -
13:45 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
14:30 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
15:15 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
16:00 Wireless to Wireless by Payam Poursaied (Payam, Canada) - -
16:45 Raffle and closing of MUM - -

Speaker Profiles and Presentation Abstracts

Wireless Registration Table, VoIP Security, challenges and solutions

Monitoring, Notification, Syslog...!!! It's a tool every Network administrator know about the power of The Dude! The best practice on how to set up MikroTik Wireless devices. How to secure VoIP network in using MikroTik Router.

How to get protected from common threats with MikroTik RouterOS

Five minutes is the average amount of time it takes for a device to be attacked once plugged into the Internet. Network Security is fundamental to be successful in our daily activities. Mikrotik RouterOS offers a powerful firewall to protect our assets. Learn how to deploy a security plan using Mikrotik RouterOS with some practical examples.

Wireless to Wireless

Back in 2016 MikroTik added a nice and unique feature to the RouterOS and RouterBOARDs which allows utilizing "Virtual Wireless Interface" to have simultaneously two interfaces one in AP mode and the other in Station mode on a single radio. This presentation aims to review such configuration and some of the applications which are possible based on this feature and the drawbacks. One of the main applications of this solution is securing actual clients and preventing the disclosure of them by putting the nodes behind a simple and handy RouterBOARD while connecting to a wireless network.