Report About My First MUM

MUM (Mikrotik Users Meeting)


           Hallo it's me, you know me right? Okay that's not important, here is my first post i don't know it going to be good or not, so if anything wrong please comment at the bottom so i can improve my blog post ^_^

^_^This Is My First Blog^_^
           MikroTik User Meeting (MUM) is a conference on MikroTik RouterOS software and RouterBoard hardware. Ask questions, listen to presentations, talk with specialists and see interesting technology demos by MikroTik and the users themselves - all here, at the MUM.

           That is the definition of the MUM, Actually that was my first time so i don't really getting to it. But i try to make a report as much detailed as possible. Okay here is the report.

First Day (12 October 2016)

            The first day only for getting the MUM souvenirs. This day was really important because in this day we can get several items, that are T-shirt, Pen, Note book, Stickers, and a Catalog book of Mikrotik product, we also got some food there. Of course we are waiting in the line to get inside The Hall room. After we got some eats and drinks, we go home. This day report end here.

Second Day (13 October 2016)

              On the second day, there are 3 section of presentation

      1. Opening And Introduction From Mikrotik

In this section, The mikrotik officials member giving a speech to us, and introduce their new product.

      2. Main Problem Wireless Point to Multipoint

In this section, there are several point in this presentation, that was

        2.1 Data Rate
Data Rate is the maximum speed in teoritic based on Calculation and Modulation. On Wi-Fi there are two Data Rate, that are
1. Basic Data Rate
    Is a Data Rate that need support AP and Client, used for management.
2. Support Data Rate
    Is a Data Rate that used if the condition is fulfill,
        2.2 SNR (Signal to Noise Radio)
SNR is the difference between the signal we received and the noise that suround us
        2.3 CCQ (Client Connection Quality)
CCQ is percentation how effective the throughput that can be used on a link that count from frame that sended by software and hardware.

        3. Implementing EOIP over VPN on dynamic IP

It explain what is EOIP and VPN, and discuss the advantage of EOIP for overlapping network

  • EOIP (Ethernet Over IP) is a RouterOS from Mikrotik that connect between two routers.
  • VPN (Virtual Private Network) is a private network that use internet to connect between remote-site safely

Third Day (14 October 2016)

In this last day of MUM 2016, there are several presentation too, and at the last there be a lottery for many prize. Here's little from the presentation on the last day. I don't really get into it because i still a newbie person in this world. So really sorry i there anything wrong.

        1. Token Bucket

In this section there are several point. That was
  • HTB (Hierarchical Token Bucket)
  • Token Bucket has it own algoritm to process bandwidth on each one queue
  • Algoritm Token Bucket use ticket/token analogy that can be accommodated on a buffer (bucket)
  • Token count from unit 1 bps (bit persecond)
  • Token Rate was calculated from max limitation on one queue
  • Bucket Capacity count from Bucket-size * Max-limit
  • Token Bucket has same function with The Burst, that is to give extra Bandwidth

        2, Prevention Bruteforce Login

Brute Force is a method of attack against a system. This method used by try all possible password. The point is, 
  • Using all possible combination of characters
  • Waste so many time
  • Tools for Bruteforce : Hydra, Medusa, NCrack
  • How to handle it : Disable service SSH

        3. Radius

Radius is a computer security protocol that used to do Authentication, Authorization and Accounting to access the network.
What is Authentication? Authorization? Accounting?
  • Authentication is a method to verification
  • Authorization is a method that provide access control to an account that running
  • Accounting is do calculation and look event that connected, explore user action and the length of the source

Okay, that's all i have about MUM 2016, sorry if there is so many mistake, Thanks for viewing my Blog, don't forget to comment bellow to help me improve my Blog. So many thanks to you all
See You Later In My Next Post
That nobody know when it comes
Just stay with my BlogHope this is usefull