SlideShare a Scribd company logo
Mikrotik Router Backup
and Restore Process
Tsoft IT
1
Presented by:
Titas Sarker
CEO
Tsoft IT
Mikrotik Router Backup and
Restore ProcessTsoft IT
2
LCMC
Agenda Page no
What is Mikrotik Router?
04
Important of Keep back up configuration files
05
Types of Backup process
06
Manual Backup
07
Automatically Backup
08
Automatically Backup
09
Restore Process
10
Restore Process
11
Conclusion
12
3
 What is Mikrotik?
Mikrotik is the company Name. They makes networking
devices.
 What is Mikrotik Router?
Mikrotik router is a device to connect at least two networks.
 What is Mikrotik Router OS?
MikroTik RouterOS is the operating system. This operating
system use to operate the Mikrotik router.
Mikrotik Router Backup and
Restore ProcessTsoft IT
4
Important of Keep backup configuration files
Mikrotik Router Backup and
Restore ProcessTsoft IT
5
 Physical device damage
 Theft
 Humans make mistakes
 Nature is Unpredictable
Types of Backup process
Mikrotik Router Backup and
Restore ProcessTsoft IT
6
 Manual Backup
 Automatically Backup
Manual Backup
Mikrotik Router Backup and
Restore ProcessTsoft IT
7
 Log in Winbox
 Click on Files
 Click on Backup
Automatically Backup (Script)
Mikrotik Router Backup and
Restore ProcessTsoft IT
8
 Log in Winbox
 Click on System
 Click on Script “+”
Script
/system backup save name=([/system identity
get name]); /tool e-mail send from=" Your
email address" to="Your email address"
subject=([/system identity get name] . "
backup") body=([/system identity get name]
. " " .[/system clock get date] . " " . [/system
clock get time] . " backup") file=([/system
identity get name] . ".backup")
server=[:resolve Your smtp address ]
port=587 user="Your email address"
password="Your email password "; :log info
"Backup e-mail sent.";
Automatically Backup
Mikrotik Router Backup and
Restore ProcessTsoft IT
9
 Log in Winbox
 Click on System
 Click on Scheduler“+”
Restore process
Mikrotik Router Backup and
Restore ProcessTsoft IT
10
 Log in router
 Upload backup file
Restore Process
Mikrotik Router Backup and
Restore ProcessTsoft IT
11
 Log in Winbox
 Click on Files
 Click on Restore
THANK YOU
MUM, Dhaka, Bangladesh
12
www.tsoftit.com

More Related Content

What's hot

Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
Yaser Rahmati
 
Mender; the open-source software update solution
Mender; the open-source software update solutionMender; the open-source software update solution
Mender; the open-source software update solution
Mender.io
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
Chaing Ravuth
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
Vuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
Mender: The open-source software update solution
Mender: The open-source software update solutionMender: The open-source software update solution
Mender: The open-source software update solution
Mender.io
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
Irsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
Nil Menon
 
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Mender.io
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
Ronald Bartels
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
Muhd Mu'izuddin
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
Irsandi Hasan
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
joehurst87
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
Tiago Monteiro
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
Vuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
Nil Menon
 

What's hot (20)

Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
Mender; the open-source software update solution
Mender; the open-source software update solutionMender; the open-source software update solution
Mender; the open-source software update solution
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Mender: The open-source software update solution
Mender: The open-source software update solutionMender: The open-source software update solution
Mender: The open-source software update solution
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Cisco CCNA module 1
Cisco CCNA module 1Cisco CCNA module 1
Cisco CCNA module 1
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 

Similar to Mikrotik router backup and restore process

Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
CODE BLUE
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
IoT Protocols
IoT ProtocolsIoT Protocols
IoT Protocols
cprojector
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
Trend Micro (EMEA) Limited
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
khaihuynhit
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
Hamza Malik
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
Cybozucommunity
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
Ryu Yamashita
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
JOYZO
 
Contiki OS Research Projects Guidance
Contiki OS Research Projects GuidanceContiki OS Research Projects Guidance
Contiki OS Research Projects Guidance
Network Simulation Tools
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
Nil Menon
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
Irsandi Hasan
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Seungjoo Kim
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
Kuniyasu Suzaki
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
IJCSIS Research Publications
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?
Justin Black
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
seolangit4
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)Security Bootcamp
 

Similar to Mikrotik router backup and restore process (20)

Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
IoT Protocols
IoT ProtocolsIoT Protocols
IoT Protocols
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
 
Netinstall
NetinstallNetinstall
Netinstall
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
Contiki OS Research Projects Guidance
Contiki OS Research Projects GuidanceContiki OS Research Projects Guidance
Contiki OS Research Projects Guidance
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 

More from Titas Sarker

র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
Titas Sarker
 
Tsoft It
Tsoft ItTsoft It
Tsoft It
Titas Sarker
 
Osi model bangla by titassarker
Osi model bangla by titassarkerOsi model bangla by titassarker
Osi model bangla by titassarker
Titas Sarker
 
dynamic routing (eigrp)
dynamic routing (eigrp)dynamic routing (eigrp)
dynamic routing (eigrp)
Titas Sarker
 
mikrotik queues configuration
mikrotik queues configurationmikrotik queues configuration
mikrotik queues configuration
Titas Sarker
 
03. mikrotik router as gateway
03. mikrotik router as gateway03. mikrotik router as gateway
03. mikrotik router as gateway
Titas Sarker
 
pc based mikrotik router
pc based mikrotik routerpc based mikrotik router
pc based mikrotik router
Titas Sarker
 
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerDispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerTitas Sarker
 
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01Titas Sarker
 
Ict policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerIct policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerTitas Sarker
 

More from Titas Sarker (10)

র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Tsoft It
Tsoft ItTsoft It
Tsoft It
 
Osi model bangla by titassarker
Osi model bangla by titassarkerOsi model bangla by titassarker
Osi model bangla by titassarker
 
dynamic routing (eigrp)
dynamic routing (eigrp)dynamic routing (eigrp)
dynamic routing (eigrp)
 
mikrotik queues configuration
mikrotik queues configurationmikrotik queues configuration
mikrotik queues configuration
 
03. mikrotik router as gateway
03. mikrotik router as gateway03. mikrotik router as gateway
03. mikrotik router as gateway
 
pc based mikrotik router
pc based mikrotik routerpc based mikrotik router
pc based mikrotik router
 
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerDispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
 
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
 
Ict policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerIct policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarker
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

Mikrotik router backup and restore process

  • 1. Mikrotik Router Backup and Restore Process Tsoft IT 1
  • 2. Presented by: Titas Sarker CEO Tsoft IT Mikrotik Router Backup and Restore ProcessTsoft IT 2
  • 3. LCMC Agenda Page no What is Mikrotik Router? 04 Important of Keep back up configuration files 05 Types of Backup process 06 Manual Backup 07 Automatically Backup 08 Automatically Backup 09 Restore Process 10 Restore Process 11 Conclusion 12 3
  • 4.  What is Mikrotik? Mikrotik is the company Name. They makes networking devices.  What is Mikrotik Router? Mikrotik router is a device to connect at least two networks.  What is Mikrotik Router OS? MikroTik RouterOS is the operating system. This operating system use to operate the Mikrotik router. Mikrotik Router Backup and Restore ProcessTsoft IT 4
  • 5. Important of Keep backup configuration files Mikrotik Router Backup and Restore ProcessTsoft IT 5  Physical device damage  Theft  Humans make mistakes  Nature is Unpredictable
  • 6. Types of Backup process Mikrotik Router Backup and Restore ProcessTsoft IT 6  Manual Backup  Automatically Backup
  • 7. Manual Backup Mikrotik Router Backup and Restore ProcessTsoft IT 7  Log in Winbox  Click on Files  Click on Backup
  • 8. Automatically Backup (Script) Mikrotik Router Backup and Restore ProcessTsoft IT 8  Log in Winbox  Click on System  Click on Script “+” Script /system backup save name=([/system identity get name]); /tool e-mail send from=" Your email address" to="Your email address" subject=([/system identity get name] . " backup") body=([/system identity get name] . " " .[/system clock get date] . " " . [/system clock get time] . " backup") file=([/system identity get name] . ".backup") server=[:resolve Your smtp address ] port=587 user="Your email address" password="Your email password "; :log info "Backup e-mail sent.";
  • 9. Automatically Backup Mikrotik Router Backup and Restore ProcessTsoft IT 9  Log in Winbox  Click on System  Click on Scheduler“+”
  • 10. Restore process Mikrotik Router Backup and Restore ProcessTsoft IT 10  Log in router  Upload backup file
  • 11. Restore Process Mikrotik Router Backup and Restore ProcessTsoft IT 11  Log in Winbox  Click on Files  Click on Restore
  • 12. THANK YOU MUM, Dhaka, Bangladesh 12 www.tsoftit.com