This document provides an overview of how to become a MikroTik system administrator. It discusses the speaker's background and experience working with MikroTik routers. It also outlines key skills needed like networking fundamentals, routing, firewalls, wireless networking, and troubleshooting. Finally, it discusses possible business opportunities working with MikroTik like operating an internet cafe, becoming an ISP, training center, or online retailer of MikroTik equipment.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
With so many new line of products and features from MikroTik, choosing one might be bit confusing. This topic will cover how to choose the right devices for your network!
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
This presentation was presented at MUM Indonesia at Bali in 2008. Discussed about how to put extra layer of security into your MikroTik Router using Port Knocking mechanism.
With so many new line of products and features from MikroTik, choosing one might be bit confusing. This topic will cover how to choose the right devices for your network!
Multicast routing configuration and lab example in MikroTik
video multicast routing 1 router
https://www.youtube.com/watch?v=nqUlUIB93Mg
video multicast routing 2 router over wireless
https://www.youtube.com/watch?v=eYEocGYsGZ4
Konfig VLC sebagai stream server multicast
https://www.youtube.com/watch?v=Z1lthcBSSrM
Konfig VLC sebagai player
https://www.youtube.com/watch?v=s2uTs8NRQpY
This presentation was presented at MUM Indonesia at Bali in 2008. Discussed about how to put extra layer of security into your MikroTik Router using Port Knocking mechanism.
Build Connection Between Two Office Or More, With OSPF Over PPTP ( Or Some Other ), Which Both Office ( Or More ) Using Dynamic IP Public Or Behind Nat, We Will Use VPS / Dedicated Server Under Linux OS Or Mikrotik RouterOS Used As Tunnel/PPP Server , Sample Implemented On Local BANK ( BPR )
Real time Middleware Training .
I have 9years of IT experiences in Middleware only . I provide real time training after training I will share you project , code , ppt and design document . I also help in resume & interview preparation .
---------------------------------------------------------------------------
IBM WebSphere DataPower/IBM DataPower Gateway v 7
IBM WebSphere Message Broker / IBM Integration Bus v 9,10
IBM WebSphere MQ v 7.5
IBM WebSphere Application Server v 8.5
WebLogic 11g System Administration v 11g
-------------------------------------------------------------------------------
Email: middleware@consultant.com
IND: +91-9791079879
UK: +44 (0) 7024024551
Real time Middleware Training .
I have 9years of IT experiences in Middleware only . I provide real time training after training I will share you project , code , ppt and design document . I also help in resume & interview preparation .
---------------------------------------------------------------------------
IBM WebSphere DataPower/IBM DataPower Gateway v 7
IBM WebSphere Message Broker / IBM Integration Bus v 9,10
IBM WebSphere MQ v 7.5
IBM WebSphere Application Server v 8.5
WebLogic 11g System Administration v 11g
-------------------------------------------------------------------------------
Email: middleware@consultant.com
IND: +91-9791079879
UK: +44 (0) 7024024551
Thi spresentation is tells us about routers the network routers.What it does how it works everything and every aspect is been covered in this ppt.
This ppt was used by me to deliver In bound Training to my office staff.
Too soft[ware defined] networks SD-Wan vulnerability assessmentSergey Gordeychik
The software defined wide-area network is technology based on SDN approach applied to branch office connections in Enterprises. According to Gartner's predictions, more than 50% of routers will be replaced with SD-WAN Solutions by 2020.
The SD-WAN can have firewalls and other perimeter security features on board which makes them attractive targets for attackers. Vendors promise "on-the-fly agility, security" and many other benefits. But what does "security" really mean from a hand-on perspective? Most of SD-WAN solutions are distributed as Linux-based Virtual Appliances or a Cloud-centric service which can make them low-hanging fruit even for script kiddie.
This presentation will introduce practical analysis of different SD-WAN solutions from the attacker perspective. Attack surface, threat model and real-world vulnerabilities in SD-WAN solutions will be presented.
Presentation about securing the environment that the Blackboard Learn application runs on. Includes:
* IPS/IDS
* Database Security Recommendations
* Load Balancer
etc.
Presented @ Frederick Linux Users Group (KeyLUG)
May 7, 2016
A presentation on protecting Small Office/Home Office (SOHO) networks that I made at the Frederick Linux Users Group (KeyLUG). I work virtually from my home, and this presentation goes through some of my experiences setting up my home network to be better and more secure. I ditched my consumer-grade NAT router and have installed a firewall, commercial-grade wireless access points, and an intrusion detection system (IDS). I'm not finished yet, but this presentation will give you an idea of some of the things that I've done, where I'm thinking about going, and as some things to consider as you setup your own network.
TCP adalah teknik mentransfer data yang akan menggaransi tercapainya data yang dikirim. Cara ini mirip dengan perusahaan pengiriman barang yang menggaransi dan mengasuransikan paket yang anda kirim. Mereka berani menjamin sampainya barang. Cara ini dipakai di internet saat kita chating, membuka website, kirim email dan download.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. PROFIL PEMBICARA
•F. Adhie Lesmana
• Adhielesmana
• Team Pengajar ( Trainer ) di BelajarMikroTik.Com
• Administrator di Forum Mikrotik Indonesia
• www.forummikrotik.com
• Website : www.adhielesmana.com
• Facebook : www.fb.com/adhielesmana
• twitter : @adhielesmana
• Slideshare : www.slideshare.net/adhielesmana
• Tags Line #GantengGantengMaksimal :D
3. PENGALAMAN
•Networking Since 2005
•Warnet & GameCenter Sejak 2005
•Staff IT ( EDP ) Di Bank Bumi Arta 2006-2007
•Staff IT ( EDP ) Di BPR Sabar Artha 2007-2014
•Consultant & Techical NOC di Local Wireless ISP Sejak 2009
• ISP Subnet & RTRW Net
•Networking Trainer Sejak 2009
4. BELAJARMIKROTIK.COM
• MikroTik Training Center
• MikroTik Academy Coordinator
• Discovery Class Pre-MTCNA
• Certified Class
• MTCNA, MTCRE, MTCTCE, MTCWE, MTCUME,MTCINE
• Integration Class & Online Class
5. FORUMMIKROTIK.COM
• Berbahasa Indonesia
• Founded 2007 Oleh Akbar Azwir
• Membahas Mikrotik Basic Hingga Advance
• Free To Join,
• Berbasis Knowledge Sharing
• Member 54.555 user ( Today )
• Mengundang Segenap Teman Teman Untuk Bergabung
6. MIKROTIK
“Vendor Hardware dan Software”
•RouterBoard
•Hardware Router, Wireless dan Device Networking
•RouterOS
•Router Operating System
•Software yang menjalankan Router
8. ROUTERBOARD
•MikroTik memiliki Beberapa Jenis dan Type RouterBoard
yang bisa digunakan sesuai dengan skala dan topologi
jaringannya. Sehingga MikroTik bisa di aplikasikan di
jaringan skala kecil hingga skala besar (enterprise).
•RouterBOARD sendiri dibedakan menurut, jumlah interface,
jenis interface, fungsi dan arsitektur board nya ( mipsbe,
mipsle, tile, x86, ppc )
10. ROUTEROS (ROS)
•Merupakan system Operasi (Software), yang di gunakan
untuk menjalankan RouterBOARD.
•Setiap RouterBOARD hanya bisa di install / di operasikan
dengan RouterBOARD.
•RouterOS untuk setiap Arsitektur board berbeda-beda
11. SYSADMIN
Sebagai SysAdmin, kita harus bisa memastikan
bahwa uptime , kinerja , resource , dan security level
dari sebuah sistem jaringan bisa tetap berjalan
sesuai, terpenuhi serta terjaga dengan baik.
23. FLOOD AND FRIENDS
• Intrusion Detection System
• Inbound OutBound Inspection
• Attack & Malicious Identification
• Port Knocking
• Dos & DDos ( Flood )
• Brute Force
24. UNAUTHORIZED TRAFFIC
• Securing DNS & WebProxy
• DNS Poisoning Attack ( Spoofing )
• DNS Amplification Attack ( Flood Authoritive DNS )
• DNS Public Transparent
• WebProxy Public Transparent
25. WIRELESS PROBLEMS
• Wireless Troubleshooting
• Interference
• Country Regulation
• Channel & Max Power Regulation
• Client Isolation
29. LOCAL BUSINNESS
• Internet Cafe & Hotspot
• Warnet
• GameCenter
• RTRW Net ( WISP / Local ISP )
• Hotspot
30. GLOBAL BUSINESS #1
•ISP
•Content Provider
• Hosting
•Data Sharing
•VPN / VPS
• Networking Support & Maintenance
• Support
• Consultant
• Service & Troubleshooting
31. GLOBAL BUSINESS #2
• Training Center
• International Certification
• Local Certification
• Supplier & Service Center
• Distributor
• Reseller
• Online Shop
• Service Center
32. DISCUSSION
Belajar MikroTik sangatlah menyenangkan, mari
bergabung berbagi bersama, sharing pengalaman
dan tanya jawab mengenai MikroTik di :
•WWW.FORUMMIKROTIK.COM
•Forum berbahasa indonesia yang membahas MikroTik dan
segala sesuatunya.