updated on 2019-12-20 14:13:27 GMT+02:00
Time | Presentation | Files | Video |
---|---|---|---|
16:00 | Meet 'n' greet party, early registration until 18:00 | - | - |
This presentation is the next chapter of my previous presentation in MikroTik User Meeting 2018 in Indonesia (RouterOS, Firewall, and Beyond: Maintain IP Reputation Over the Internet)
I will talk about practical packet analysis technique for network incident response including some RBL/IP Reputation Blacklist case study, especially with MikroTik RouterOS as the infrastructure and combining with some tools such as wireshark to do in-depth analysis
I will presentation about how to Real Implementation Build an MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS with overall distances of the location more than 40 kilometers and also show the config, result and tips and trick.
Implementation of Capsman including troubleshooting and case study
My presentation material contains various tricks and steps to secure the router from various tricks.
Implementation of Connection Tracking and case study. I will show some case about connection-tracking and also I will talk about how to optimize RouterOS Firewall using connection-tracking
Reach the biggest market in SEA. Indonesia is potential market & has many internet and broadband users. Indonesia also the biggest Mikrotik market in the world. In the 2018, Indonesia made a new history with biggest MUM conference participants, around 3500 people attend that conference.
In this presentation, We will show you how we can using Mikrotik to unlock Indonesia's digital business opportunity.
Memperlihatkan sejumlah kesalahan yang sering dilakukan pada konfigurasi MikroTik dan cara mengoreksinya.
Implementation test and case study of new feature dot1x on Mikrotik
The objective of this presentation is explaining the in-depth analysis of frames running on Layer 2 (L-2) protocols, such as Ethernet, VLAN, QinQ, and layer tunnel protocols such as EoIP, L2TP and also tunnel over tunnel like EoIP over L2TP and VLAN over EoIP. Explanations will be provided in an interesting and easy to understand manner with topology images, MikroTik router settings, and the capture results in each of the frames. The supporting tools used in this experiment are the Wireshark as sniffers and GNS3 as the network emulator as well as WinBox and MikroTik Routers. This presentation is perfect for students in computer and electrical engineering and also computer network practitioners in exploring and applying network encapsulation concepts. After this presentation, the participants will be clearly understood about how L-2 protocol encapsulation work and how the tunnel work.
My presentation explains MITM works in the network and how to prevent it with the SSTP Tunnel, where the SSTP Tunnel has good security and is accompanied by TLS 1.2 Channels that make it possible to make a difference with other tunnels. And we can use it for the two-way communication that occurs. I also tried trying SSTP Server with SSTP Client on Linux.
1. BGP CONFIG
2. BGP AS PATH
3. Ibgp Ebgp LocalPref MED
4. Ibgp Ebgp Synchronization
5. Mp - Bgp
Talk about API Mikrotik: the basis of syntax, libraries and developed software. I will show examples of syntax work for connection to Mikrotik Router OS, examples of interfaces developed on Delphi and realtime workshop remote controls system that located in Moscow, Russia.
From this presentation you will learn how to establish a super fast and very secure ipsec ike2 connection between your MikroTik routers. In this presentation i'd like to show you how easy to make your own IPSec ike2 site-to-site VPN connection. IKEv2 is an ultimate replacement for your outdated slow and insecure VPN between your offices and branches. You will understand how to properly issue certificates, setup RouterOS ikev2 ipsec configuration, firewall, adjust MTU settings, understand the VPN routing. I'll show you how to setup both server and client. Free live demo will be available during this presentation and after, so you will be able to connect your pocket router right from the MUM just within 5 minutes. This presentation is a next step after my MUM Malaysia 2019 where i did an easy step-by-step tutorial how to build ikev2 server for mobile devices (road warriors). Please check it out first.
The fiber cable market has been growing 15% to 25% per year during the last several years. To cope with this demand, manufacturers plan to expand. This presentation will explain about Fiber Optic, Design, Implementation using Mikrotik and Measured with Testing Tools.