Controlling Access Between Devices in the same Layer 2 Segment

Controlling Access Between Devices in the same Layer 2 Segment _YouTube

Layer2 is the network layer used to transfer data between adjacent network nodes in a wide area network or between nodes on the same local area network. How to control access between devices in the same layer 2 segment? we discussed on this webinar series Webinar topic: Controlling Access Between Devices in the same Layer 2 Segment Presenter: Achmad Mardiansyah (CEO GLC […]

GIT as Mikrotik Configuration Management

GIT as Mikrotik Configuration Management _YouTube

Git is a distributed version control system for tracking changes in any set of files. How it works as Mikrotik Configuration? we discussed on this webinar series Webinar topic: GIT as Mikrotik Configuration Management Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: Follow our social media […]

RouterOS Migration From v6 to v7

RouterOS migration from v6 to v7 _YouTube

With the migration away from RouterOS v6 gaining more traction, it’s time learn how you can upgrade your MikroTik RouterOS to ROS v7 How it works ? we discussed on this webinar series Webinar topic: RouterOS Migration From v6 to v7 Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: https://www.glcnetworks.com/en/schedule/ Follow our […]

Building a Web Server with NGINX

Building a Web Server with NGINX_YouTube

Nginx (pronounced as “Engine-X”) is an open source web server that is often used as reverse proxy or HTTP cache. How it works to build a web server? we discussed on this webinar series Webinar topic: Building a Web Server with NGINX Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check […]

Best Current Practice (BCP) 38 Ingress Filtering for Security

Best Current Practice (BCP) 38 Ingress Filtering for Security YouTube

The Internet community of engineers have elaborated some best practices namely the Best Current Practice 38 (BCP 38). How it works? we discussed on this webinar series Webinar topic: Best Current Practice (BCP) 38 Ingress Filtering for Security Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: […]

EOIP Deep Dive

EOIP deep dive_ YouTube

EoIP. Ethernet over IP (EoIP) Tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two routers on. How it works? we discussed on this webinar series Webinar topic: EOIP Deep Dive Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: https://www.glcnetworks.com/en/schedule/ […]

Policy Based Routing with Indirect BGP

Each routing policy is identified by a policy name. The name can contain letters, numbers, and hyphens (-) and can be up to 255 characters long. Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic How it works? we discussed on this webinar series Webinar topic: Policy Based Routing with Indirect BGP Presenter: […]

IP Address Deep Dive

IP address deep dive_ YouTube

To help keep your router secure from the Internet, It has come to our attention, that somebody has created a script that logs into unprotected devices and sets a password, along with a new identity name. This affects devices that have public IP addresses. How it works? we discussed on this webinar series Webinar topic: IP […]

Network Monitoring with The Dude and Whatsapp

#Collaborationwebinarglcnetworks

The Dude can improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices and alert you in case some service has problems. How Network Monitoring works with The Dude and Whatsapp? we discussed on this […]

Mikrotik IP Settings For Performance and Security

Webinar glcnetworks

To help keep your router secure from the Internet, It has come to our attention, that somebody has created a script that logs into unprotected devices and sets a password, along with a new identity name. This affects devices that have public IP addresses. How it works? we discussed on this webinar series Webinar topic: Mikrotik […]