updated on 2022-08-15 11:07:05 GMT+03:00
Time | Presentation | Files | Video |
---|---|---|---|
18:00 | Meet and greet, early registration, free drinks | - | - |
Time | Presentation | Files | Video |
---|---|---|---|
08:00 | Registration starts | - | - |
09:00 | Distributor exhibit hall, meet and greet | - | - |
10:00 | Introduction and opening, New products and features by MikroTik | - | - |
11:15 | MikroTik products in a datacenter environment by Patrik Schaub (FMS Internetservice, Germany) | - | - |
12:00 | Lunch (Free for PAID and VOUCHER visitors) | - | - |
13:30 | Radius - MikroTik UserManager VS FreeRadius and Net Flow logging how-to and resources by Martin Krug (Future Shop, Slovakia) | - | - |
14:15 | Mikrotik Router OS Network Security, Threats and Countermeasures by Tom Smyth (Wireless Connect, Ireland) | - | - |
15:00 | HWMP+ based MESH networks by Bartlomiej Rodek (Inter Projekt, Poland) | - | - |
15:45 | VPN技术:IPsec, OpenVPN PPTP——这是tter? by Pawel Cieplinski (AkademiaWIFI.pl, Poland) | - | - |
16:30 | Advanced Load Balance Workshop by Valens Riyadi, (Citraweb, Indonesia) and Janis Megis (MikroTik, Latvia) | - | - |
17:30 | Introduction to Layer7 filtering by Andrzej Bober and Jaroslaw Konieczny (Inter Projekt, Poland) | - | - |
Time | Presentation | Files | Video |
---|---|---|---|
08:00 | Distributor exhibit hall, meet and greet | - | - |
09:00 | Wireless QoS with WMM and DSCP by Andrea Grittini (Totalconn, Italy) | - | - |
09:45 | Multicast networking basics with RouterOS by Balazs Meretei (C4-NetWorks, Hungary) | - | - |
10:30 | 第二层安全——usi攻击和对策ng MikroTik RouterOS by Wardner Maia (MD Brasil, Brazil) | - | - |
11:15 | Lunch (Free for PAID and VOUCHER visitors) | - | - |
12:45 | Hybrid powered Mikrotik base stations by Lukas Hatas (ispadmin.eu, Czech Republic) | - | - |
13:30 | BFD feature by Bartosz Mazurczyk (Inter Project, Poland) | - | - |
14:15 | MPLS saved money for Municipality of Tranemo by Leo De Geer (Satellithuset, Sweden) | - | - |
15:00 | Possibilities of virtualization in MikroTik RouterOS by Martin Pina (hanacke.net, Czech Republic) | - | - |
15:45 | Raffle and closing of MUM | - | - |
Don't forget to bring your printed registration sheet. Online registration is mandatory for all visitors, both free and paid!
Don't forget to bring your printed registration sheet. Online registration is mandatory for all visitors, both free and paid!
Don't forget to bring your printed registration sheet. Online registration is mandatory for all visitors, both free and paid!
MikroTik products can significantly reduce the cost in the core of your network and provide a lot of exciting features. This presentation focuses on BGP routing for multihomed core routers
and high availability solutions like VRRP and link aggregation.
How to SET-UP MikroTik UserManager correctly with a RouterBoard, precautions and Advantages. All possible scenario's with HotSpot, DHCP and Wireless ption's. Short description of the FreeRadius as well. How to set-up a connection logging facility MikroTik - Traffic Flow with a stream Net Flow server, with a resource list and how-to report to the authorities.
MikroTik Router OS has a lot of cool features that can thwart many attacks that your network may face from threats on the Internet. In this presentation
we will discuss how MT ROS can counter each one of these attacks
This presentiation shows how to build efficient wireless mesh networks using Hybrid Wireless
Mesh Protocol. HWMP+ is a layer-2 protocol which may works as a (R)STP replacement
providing optimized route selection and loop-free topology.
Overview and comaparison of IP Security and Tunneling protocols, Pros and cons of using IPsec, OpenVPN and PPTP.
This workshop will explain some ways that can be used to perform loadbalance using RouterOS, with their respective strengths and weaknesses. Will be discussed also some problem or error that usually experienced during a load-balance configuration.
Layer7 Filter is a high level filtering tool which may be used as a flexible content inspection mechanism.
The presentation will show how to implement Prioritization of the Voice and
Video services in a wireless area with Mikrotik devices through the DSCP
code and priority field in the RouterOs configuration
The presentation is about how we configure wireless surveillance networks, based on multicast capable cameras, NVR-s etc.
IP Networks totally or partially bridged or switched may be exposed to a
series of attacks based on exploiting the vulnerabilities inherent to
Layer 2 protocols. Protecting those networks is challenging, specially
when the customer could have direct access to the link layer. The
presentation will show the theoretical concepts and practice behind such
types of attacks, including among them 'flooding the CAM table', 'Vlan's
vulnerabilities', 'Spanning Tree Protocol manipulation', 'ARP table
poisoning', 'DHCP denial of service by starvation', 'intra client and
intra node traffic segregation', etc. The main goal of the presentation
is raise awareness about the link layer security risks, as well as to
show how to use Mikrotik RouterOS to implement efficient defensive
measures avoiding such risks.
- - - About the presenter - - -
Wardner Maia:
- Electronics and Telecommunications Engineer, working with Telecom and
Information Technology since 1995.
- Technical director of MD Brasil IT %26 Telecom, a Brazilian
telecommunications operator and Mikrotik DIstributor
- Mikrotik Certified Trainer, providing Wireless trainings since 2002
and Mikrotik trainings since 2006.
Solar Mikrotik base stations are common, but in northern latitudes, expecially during winter, they have problems with depleted battery. Best solution is use small wind turbine on the top of the tower. This hybrid powered base station will operate reliable for long time, including Arctic.
Introduction to BFD protocol (Bidirectional Forwarding Detection) which provides faster
convergence of routing protocols and detects one-way link failures.
Multiple VLANs throw VPLS and PPPoE clients saved money and give them
total control and freedom. Pitfalls to think about then mixing different connection types.
What virtualization techlogies are offered on different supported hardware platforms and what can be the benefit of using them in an ISP network or in a Data Center.