Indonesia on October 24 - 25, 2019

Agenda for MUM in Indonesia, OCTOBER 2019

updated on 2019-08-30 10:45:04 GMT+03:00


Oct 23, Wednesday

Time Presentation Files Video
18:00 Meet 'n' greet party, early registration - -

Oct 24, Thursday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Opening and introduction, new products by MikroTik - -
09:45 RouterOS case study by Valens Riyadi (Citraweb, Indonesia) - -
10:30 Practical Packet Analysis for Network Incident Response with MikroTik RouterOS by Michael Takeuchi (Michael Takeuchi, Indonesia) - -
11:00 Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud by Teddy Yuliswar (Indonetworkers.com, Indonesia) - -
11:45 Lunch - -
13:15 Implementasi Queue with Firewall Mangel at Mikrotik RouterOS by AT-THORIQ FIRDAUS RAMADHAN (SMK 1 BOJONEGORO, Indonesia) - -
13:45 Mikrotik Case Study - Capsman Implementation and case by Adyatma Yoga Kurnia (PT Citraweb Solusi Teknologi, Indonesia) - -
14:15 Best Practice : Securing Your Router ! by Rindi Gusti Yatna (Smk Karya Guna Bhakti 2 Kota Bekasi, Indonesia) - -
14:45 MikroTik Case Study - Connection Tracking Implementation and Case by Yoga Wahyu Mahendra (BelajarMikroTIk.COM, Indonesia) - -
15:30 Unlocking Indonesia's Digital Business Opportunity using Mikrotik by Ahmad Rosid Komarudin (ID-Networkers, Indonesia) - -

Oct 25, Friday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Kesalahan umum pada konfigurasi MikroTik by Paul Darius (Asia Teknologi Solusi, Indonesia) - -
09:30 Mikrotik Case Study - dot1x Implementation and case by Pujo Dewobroto (PT Citraweb Solusi Teknologi, Indonesia) - -
10:15 In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark by Yohanes Gunawan Yusuf (Universitas Surabaya (UBAYA), Indonesia) - -
11:00 Secure data from MITM (Man in the Middle Attack) with SSTP Mikrotik by Haris Hardiansyah (Student, Indonesia) - -
11:45 Lunch - -
13:15 BGP IMPLEMENTATION by Reynaldi Mulyatama (PT ADIGAMA TEKNOLOGI SOLUSI, Indonesia) - -
14:00 Talk about API Mikrotik: basis of syntax, libraries and developed software by Chernosvitov Sergey (MTI-GROUP, Russia) - -
14:45 MikroTik IPSec IKEv2 VPN between routers (site-to-site): easy step-by-step guide by Nikita Tarikin (MikroTik PRO, Russia) - -
15:45 Connecting Mikrotik with Fiber Optic by Antonius Duty Susilo (Antonius Duty Susilo, Indonesia) - -
16:15 Raffle and closing of MUM - -

Speaker Profiles and Presentation Abstracts

Practical Packet Analysis for Network Incident Response with MikroTik RouterOS

This presentation is the next chapter of my previous presentation in MikroTik User Meeting 2018 in Indonesia (RouterOS, Firewall, and Beyond: Maintain IP Reputation Over the Internet) I will talk about practical packet analysis technique for network incident response including some RBL/IP Reputation Blacklist case study, especially with MikroTik RouterOS as the infrastructure and combining with some tools such as wireshark to do in-depth analysis

Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud

I will presentation about how to Real Implementation Build an MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS with overall distances of the location more than 40 kilometers and also show the config, result and tips and trick.

Mikrotik Case Study - Capsman Implementation and case

Implementation of Capsman including troubleshooting and case study

Best Practice : Securing Your Router !

My presentation material contains various tricks and steps to secure the router from various tricks.

MikroTik Case Study - Connection Tracking Implementation and Case

Implementation of Connection Tracking and case study. I will show some case about connection-tracking and also I will talk about how to optimize RouterOS Firewall using connection-tracking

Unlocking Indonesia's Digital Business Opportunity using Mikrotik

Reach the biggest market in SEA. Indonesia is potential market & has many internet and broadband users. Indonesia also the biggest Mikrotik market in the world. In the 2018, Indonesia made a new history with biggest MUM conference participants, around 3500 people attend that conference. In this presentation, We will show you how we can using Mikrotik to unlock Indonesia's digital business opportunity.

Kesalahan umum pada konfigurasi MikroTik

Memperlibatkan sejumlah kesalahan yang sering dilakukan pada konfigurasi MikroTik dan cara mengoreksinya.

Mikrotik Case Study - dot1x Implementation and case

Implementation test and case study of new feature dot1x on Mikrotik

In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark

The objective of this presentation is explaining the in-depth analysis of frames running on Layer 2 (L-2) protocols, such as Ethernet, VLAN, QinQ, and layer tunnel protocols such as EoIP, L2TP and also tunnel over tunnel like EoIP over L2TP and VLAN over EoIP. Explanations will be provided in an interesting and easy to understand manner with topology images, MikroTik router settings, and the capture results in each of the frames. The supporting tools used in this experiment are the Wireshark as sniffers and GNS3 as the network emulator as well as WinBox and MikroTik Routers. This presentation is perfect for students in computer and electrical engineering and also computer network practitioners in exploring and applying network encapsulation concepts. After this presentation, the participants will be clearly understood about how L-2 protocol encapsulation work and how the tunnel work.

Secure data from MITM (Man in the Middle Attack) with SSTP Mikrotik

My presentation explains MITM works in the network and how to prevent it with the SSTP Tunnel, where the SSTP Tunnel has good security and is accompanied by TLS 1.2 Channels that make it possible to make a difference with other tunnels. And we can use it for the two-way communication that occurs. I also tried trying SSTP Server with SSTP Client on Linux.

BGP IMPLEMENTATION

1. BGP CONFIG 2. BGP AS PATH 3. Ibgp Ebgp LocalPref MED 4. Ibgp Ebgp Synchronization 5. Mp - Bgp

Talk about API Mikrotik: basis of syntax, libraries and developed software

Talk about API Mikrotik: the basis of syntax, libraries and developed software. I will show examples of syntax work for connection to Mikrotik Router OS, examples of interfaces developed on Delphi and realtime workshop remote controls system that located in Moscow, Russia.

MikroTik IPSec IKEv2 VPN between routers (site-to-site): easy step-by-step guide

From this presentation you will learn how to establish a super fast and very secure ipsec ike2 connection between your MikroTik routers. In this presentation i'd like to show you how easy to make your own IPSec ike2 site-to-site VPN connection. IKEv2 is an ultimate replacement for your outdated slow and insecure VPN between your offices and branches. You will understand how to properly issue certificates, setup RouterOS ikev2 ipsec configuration, firewall, adjust MTU settings, understand the VPN routing. I'll show you how to setup both server and client. Free live demo will be available during this presentation and after, so you will be able to connect your pocket router right from the MUM just within 5 minutes. This presentation is a next step after my MUM Malaysia 2019 where i did an easy step-by-step tutorial how to build ikev2 server for mobile devices (road warriors). Please check it out first.

Connecting Mikrotik with Fiber Optic

The fiber cable market has been growing 15% to 25% per year during the last several years. To cope with this demand, manufacturers plan to expand. This presentation will explain about Fiber Optic, Design, Implementation using Mikrotik and Measured with Testing Tools.