updated on 2019-01-30 08:02:51 GMT+02:00
|08:00||Check-in and Exhibitor hall opens. Bring your printed tickets||-||-|
|09:00||Opening and introduction, new products by Martins Strods (MikroTik, Latvia)||-|
|09:45||Basic things you should do on RouterOS by Sovandara Teav (MaxBIT, Cambodia)|
|10:15||Basic Config MikroTik Captive Portal (Hotspot) by Teddy Yuliswar (Indonetworkers.com, Indonesia)|
|11:00||MPLS VPLS Implementaion by Antonius Duty Susilo (Antonius Duty Susilo, Indonesia)|
|11:30||MikroTik Security : Built-in Default Configuration by Erick Setiawan (Maxindo Mitra Solusi, Indonesia)|
|13:30||Using BCP to Create Layer 2 Networks Over the Internet by Faris Jawad (SMK IDN, Indonesia)|
|14:15||VLAN tagged over Wireless Uplink (PtMP) & CapMANs (Layer 3) by Sopheary Sun (Angkor Hospital For Children, Cambodia)|
|15:15||Monitoring RouterOS using SNMP and internal tools as basic, ELK Stack with traffic flow by Soragan Ong (MikroTik.SG | Alagas Network, Singapore)|
|16:00||MikroTik Security : The Forgotten Things by Michael Takeuchi (Michael Takeuchi, Indonesia)|
|16:30||Raffle and closing of MUM||-||-|
|17:00||Beer & Soft Drinks by MikroTik, Socializing & Networking||-||-|
You can do many things on MikroTik RouterOS. On my topic, I will show you the basic things you should do on your MikroTik RouterOS to keep everything clean and secure.
I will give more detail information how to make a MikroTik captive portal (Hotspot) and also with case study.
MPLS is a hybrid model adopted by IETF to incorporate best properties in both packet routing & circuit switching.VPLS defines an architecture allows MPLS networks offer Layer 2 multipoint Ethernet Services.The presentation will explain the theory and implementation of MPLS and tunneling using VPLS
Discussing on RouterOS default-configuration in general, more detail in network security related section of the configuration set and additional tips afterwards.
Bridging a local area network through the internet is not a new idea. The interface of the MikroTik EOIP tunnel has made this easy for almost 18 years. One of the disadvantages of EOIP is that the endpoint IP address must be a public IP or tunnel must be built on a separate VPN tunnel, thus increasing packet overhead and adding additional configuration steps to create each tunnel. In this presentation, I will show BCP or Bridge Control Protocol, which is a method of bridging PPP tunnels, which provide Layer 2 connectivity (and when combined with L2TP), providing encryption in a single configuration step even when both devices have dynamic IP addresses
This presentation is a real case or requirements of a Japanese business resort in the remote area in Siem Reap province. Their resort has about 12 tents and an office. We are going to build wireless infrastructure which provides roaming WiFi to their customers who stay in each tent and also use IP cameras in each tent through wireless uplink. The distance between each tent to office is about 50 to 200 meters and between each tent has many trees. Our solution is to build a wireless infrastructure by using all Mikrotik products. We will make PtMP connection between office and each tent and separate network traffic between office network, roaming WiFi with CapMANs, and IP cameras traffic by using VLAN which we will need to do VLAN tag over wireless uplink between office and each tent. I will bring Mikrotik devices which already prepared for the LAB and make a demo for participants.
Part 1, monitoring your router using tools provided inside RouterOS and Simple Network Management Protocol. While RouterOS provide tools that administrator can use to monitor/analyze your router, it does not keep the information pamanently. SNMP allow you to get data from your router and store it externally. Part 2, Introduction to ELK. How to get it work with RouterOS? What information can you see?
Discussing on RouterOS security in general and some forgotten things, more detail in securing the router it-self from unauthorized access with few configuration set and additional tips afterwards