Indonesia on October 24 - 25, 2019

Agenda for MUM in Indonesia, OCTOBER 2019

updated on 2019-12-20 14:13:27 GMT+02:00


Oct 23, Wednesday

Time Presentation Files Video
16:00 Meet 'n' greet party, early registration until 18:00 - -

Oct 24, Thursday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Opening and introduction, new products by MikroTik presentation file presentation video
09:45 Optimizing Hotel WiFi Network by Valens Riyadi (Citraweb, Indonesia) - presentation video
10:30 Practical Packet Analysis for Network Incident Response with MikroTik RouterOS by Michael Takeuchi (Michael Takeuchi, Indonesia) presentation file presentation video
11:00 Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud by Teddy Yuliswar (Indonetworkers.com, Indonesia) - presentation video
11:45 Lunch - -
13:15 Implementasi Queue with Firewall Mangel at Mikrotik RouterOS by AT-THORIQ FIRDAUS RAMADHAN (SMK 1 BOJONEGORO, Indonesia) presentation file presentation video
13:45 Mikrotik Case Study - Capsman Implementation and case by Adyatma Yoga Kurnia (PT Citraweb Solusi Teknologi, Indonesia) - presentation video
14:15 Best Practice : Securing Your Router ! by Rindi Gusti Yatna (Smk Karya Guna Bhakti 2 Kota Bekasi, Indonesia) - presentation video
14:45 MikroTik Case Study - Connection Tracking Implementation and Case by Yoga Wahyu Mahendra (BelajarMikroTIk.COM, Indonesia) presentation file presentation video
15:30 Unlocking Indonesia's Digital Business Opportunity using Mikrotik by Ahmad Rosid Komarudin (PT Network Data Sistem, Indonesia) - presentation video

Oct 25, Friday

Time Presentation Files Video
08:00 Check-in and Exhibitor hall opens. Bring your printed tickets - -
09:00 Kesalahan umum pada konfigurasi MikroTik by Paul Darius (Indonesia) presentation file presentation video
09:30 Mikrotik Case Study - dot1x Implementation and case by Pujo Dewobroto (PT Citraweb Solusi Teknologi, Indonesia) - presentation video
10:15 In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark by Yohanes Gunawan Yusuf (Universitas Surabaya (UBAYA), Indonesia) presentation file presentation video
11:00 Secure data from MITM (Man in the Middle Attack) with SSTP Mikrotik by Haris Hardiansyah (Student, Indonesia) presentation file presentation video
11:45 Lunch - -
13:15 BGP IMPLEMENTATION by Reynaldi Mulyatama (PT ADIGAMA TEKNOLOGI SOLUSI, Indonesia) presentation file presentation video
14:00 Talk about API Mikrotik: basis of syntax, libraries and developed software by Chernosvitov Sergey (MTI-GROUP, Russia) presentation file presentation video
14:45 MikroTik IPSec IKEv2 VPN between routers (site-to-site): easy step-by-step guide by Nikita Tarikin (MikroTik PRO, Russia) presentation file presentation video
15:45 Connecting Mikrotik with Fiber Optic by Antonius Duty Susilo (Antonius Duty Susilo, Indonesia) presentation file presentation video
16:15 Raffle and closing of MUM - -

Speaker Profiles and Presentation Abstracts

Practical Packet Analysis for Network Incident Response with MikroTik RouterOS

This presentation is the next chapter of my previous presentation in MikroTik User Meeting 2018 in Indonesia (RouterOS, Firewall, and Beyond: Maintain IP Reputation Over the Internet)

I will talk about practical packet analysis technique for network incident response including some RBL/IP Reputation Blacklist case study, especially with MikroTik RouterOS as the infrastructure and combining with some tools such as wireshark to do in-depth analysis

Real Implementation Build a MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS (Cloud

I will presentation about how to Real Implementation Build an MPLS Network and Multihoming BGP for Fail-over with MikroTik CRS with overall distances of the location more than 40 kilometers and also show the config, result and tips and trick.

Mikrotik Case Study - Capsman Implementation and case

Implementation of Capsman including troubleshooting and case study

Best Practice : Securing Your Router !

My presentation material contains various tricks and steps to secure the router from various tricks.

MikroTik Case Study - Connection Tracking Implementation and Case

Implementation of Connection Tracking and case study. I will show some case about connection-tracking and also I will talk about how to optimize RouterOS Firewall using connection-tracking

Unlocking Indonesia's Digital Business Opportunity using Mikrotik

Reach the biggest market in SEA. Indonesia is potential market & has many internet and broadband users. Indonesia also the biggest Mikrotik market in the world. In the 2018, Indonesia made a new history with biggest MUM conference participants, around 3500 people attend that conference.

In this presentation, We will show you how we can using Mikrotik to unlock Indonesia's digital business opportunity.

Kesalahan umum pada konfigurasi MikroTik

Memperlihatkan sejumlah kesalahan yang sering dilakukan pada konfigurasi MikroTik dan cara mengoreksinya.

Mikrotik Case Study - dot1x Implementation and case

Implementation test and case study of new feature dot1x on Mikrotik

In-depth Analysis for L-2 Frame and Tunnel Protocols using GNS3 dan Wireshark

The objective of this presentation is explaining the in-depth analysis of frames running on Layer 2 (L-2) protocols, such as Ethernet, VLAN, QinQ, and layer tunnel protocols such as EoIP, L2TP and also tunnel over tunnel like EoIP over L2TP and VLAN over EoIP. Explanations will be provided in an interesting and easy to understand manner with topology images, MikroTik router settings, and the capture results in each of the frames. The supporting tools used in this experiment are the Wireshark as sniffers and GNS3 as the network emulator as well as WinBox and MikroTik Routers. This presentation is perfect for students in computer and electrical engineering and also computer network practitioners in exploring and applying network encapsulation concepts. After this presentation, the participants will be clearly understood about how L-2 protocol encapsulation work and how the tunnel work.

Secure data from MITM (Man in the Middle Attack) with SSTP Mikrotik

My presentation explains MITM works in the network and how to prevent it with the SSTP Tunnel, where the SSTP Tunnel has good security and is accompanied by TLS 1.2 Channels that make it possible to make a difference with other tunnels. And we can use it for the two-way communication that occurs. I also tried trying SSTP Server with SSTP Client on Linux.

BGP IMPLEMENTATION

1. BGP CONFIG
2. BGP AS PATH
3. Ibgp Ebgp LocalPref MED
4. Ibgp Ebgp Synchronization
5. Mp - Bgp

Talk about API Mikrotik: basis of syntax, libraries and developed software

Talk about API Mikrotik: the basis of syntax, libraries and developed software. I will show examples of syntax work for connection to Mikrotik Router OS, examples of interfaces developed on Delphi and realtime workshop remote controls system that located in Moscow, Russia.

MikroTik IPSec IKEv2 VPN between routers (site-to-site): easy step-by-step guide

From this presentation you will learn how to establish a super fast and very secure ipsec ike2 connection between your MikroTik routers. In this presentation i'd like to show you how easy to make your own IPSec ike2 site-to-site VPN connection. IKEv2 is an ultimate replacement for your outdated slow and insecure VPN between your offices and branches. You will understand how to properly issue certificates, setup RouterOS ikev2 ipsec configuration, firewall, adjust MTU settings, understand the VPN routing. I'll show you how to setup both server and client. Free live demo will be available during this presentation and after, so you will be able to connect your pocket router right from the MUM just within 5 minutes. This presentation is a next step after my MUM Malaysia 2019 where i did an easy step-by-step tutorial how to build ikev2 server for mobile devices (road warriors). Please check it out first.

Connecting Mikrotik with Fiber Optic

The fiber cable market has been growing 15% to 25% per year during the last several years. To cope with this demand, manufacturers plan to expand. This presentation will explain about Fiber Optic, Design, Implementation using Mikrotik and Measured with Testing Tools.