Indonesia on October 24 - 25, 2019

Agenda for MUM in Indonesia, OCTOBER 2019

updated on 2019-06-17 15:47:52 GMT+03:00


Oct 23, Wednesday

Time Presentation Files Video
18:00 Meet 'n' greet party, early registration - -

Oct 24, Thursday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Opening and introduction, new products by MikroTik - -
09:45 RouterOS case study by Valens Riyadi (Citraweb, Indonesia) - -
10:30 Practical Packet Analysis for Network Incident Response with MikroTik RouterOS by Michael Takeuchi (Michael Takeuchi, Indonesia) - -
11:00 Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud by Teddy Yuliswar (Indonetworkers.com, Indonesia) - -
11:45 Implementasi Queue with Firewall Mangel at Mikrotik RouterOS by AT-THORIQ FIRDAUS RAMADHAN (SMK 1 BOJONEGORO, Indonesia) - -
12:15 Lunch - -
13:45 Best Practice : Securing Your Router ! by Rindi Gusti Yatna (Smk Karya Guna Bhakti 2 Kota Bekasi, Indonesia) - -
14:15 Mikrotik Case Study - Capsman Implementation and case by Adyatma Yoga Kurnia (PT Citraweb Solusi Teknologi, Indonesia) - -
14:45 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
15:30 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
16:15 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -

Oct 25, Friday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
09:45 Mikrotik Case Study - dot1x Implementation and case by Pujo Dewobroto (PT Citraweb Solusi Teknologi, Indonesia) - -
10:30 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
11:15 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
12:00 In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark by Yohanes Gunawan Yusuf (Universitas Surabaya (UBAYA), Indonesia) - -
12:45 Lunch - -
14:15 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
15:00 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
15:45 RouterOS workshop or case study. Register for the MUM to sign up for a presentation slot. - -
16:30 Raffle and closing of MUM - -

Speaker Profiles and Presentation Abstracts

Practical Packet Analysis for Network Incident Response with MikroTik RouterOS

This presentation is the next chapter of my previous presentation in MikroTik User Meeting 2018 in Indonesia (RouterOS, Firewall, and Beyond: Maintain IP Reputation Over the Internet) I will talk about practical packet analysis technique for network incident response including some RBL/IP Reputation Blacklist case study, especially with MikroTik RouterOS as the infrastructure and combining with some tools such as wireshark to do in-depth analysis

Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud

I will presentation about how to Real Implementation Build an MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS with overall distances of the location more than 40 kilometers and also show the config, result and tips and trick.

Best Practice : Securing Your Router !

My presentation material contains various tricks and steps to secure the router from various tricks.

Mikrotik Case Study - Capsman Implementation and case

Implementation of Capsman including troubleshooting and case study

Mikrotik Case Study - dot1x Implementation and case

Implementation test and case study of new feature dot1x on Mikrotik

In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark

The objective of this presentation is explaining the in-depth analysis of frames running on Layer 2 (L-2) protocols, such as Ethernet, VLAN, QinQ, and layer tunnel protocols such as EoIP, L2TP and also tunnel over tunnel like EoIP over L2TP and VLAN over EoIP. Explanations will be provided in an interesting and easy to understand manner with topology images, MikroTik router settings, and the capture results in each of the frames. The supporting tools used in this experiment are the Wireshark as sniffers and GNS3 as the network emulator as well as WinBox and MikroTik Routers. This presentation is perfect for students in computer and electrical engineering and also computer network practitioners in exploring and applying network encapsulation concepts. After this presentation, the participants will be clearly understood about how L-2 protocol encapsulation work and how the tunnel work.