Controlling Access Between Devices in the same Layer 2 Segment
Layer2 is the network layer used to transfer data between adjacent network nodes in a wide area network or between nodes on the same local area network. How to control access between devices in the same layer 2 segment? we discussed on this webinar series Webinar topic: Controlling Access Between Devices in the same Layer 2 Segment Presenter: Achmad Mardiansyah (CEO GLC […]
GIT as Mikrotik Configuration Management
Git is a distributed version control system for tracking changes in any set of files. How it works as Mikrotik Configuration? we discussed on this webinar series Webinar topic: GIT as Mikrotik Configuration Management Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: Follow our social media […]
RouterOS Migration From v6 to v7
With the migration away from RouterOS v6 gaining more traction, it’s time learn how you can upgrade your MikroTik RouterOS to ROS v7 How it works ? we discussed on this webinar series Webinar topic: RouterOS Migration From v6 to v7 Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: https://www.glcnetworks.com/en/schedule/ Follow our […]
Building a Web Server with NGINX
Nginx (pronounced as “Engine-X”) is an open source web server that is often used as reverse proxy or HTTP cache. How it works to build a web server? we discussed on this webinar series Webinar topic: Building a Web Server with NGINX Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check […]
Best Current Practice (BCP) 38 Ingress Filtering for Security
The Internet community of engineers have elaborated some best practices namely the Best Current Practice 38 (BCP 38). How it works? we discussed on this webinar series Webinar topic: Best Current Practice (BCP) 38 Ingress Filtering for Security Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: […]
EOIP Deep Dive
EoIP. Ethernet over IP (EoIP) Tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two routers on. How it works? we discussed on this webinar series Webinar topic: EOIP Deep Dive Presenter: Achmad Mardiansyah (CEO GLC Networks) Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback Check our schedule for future events: https://www.glcnetworks.com/en/schedule/ […]
Policy Based Routing with Indirect BGP
Each routing policy is identified by a policy name. The name can contain letters, numbers, and hyphens (-) and can be up to 255 characters long. Policy-based routing (PBR) provides network administrators with agility and flexibility to better manage traffic How it works? we discussed on this webinar series Webinar topic: Policy Based Routing with Indirect BGP Presenter: […]
IP Address Deep Dive
To help keep your router secure from the Internet, It has come to our attention, that somebody has created a script that logs into unprotected devices and sets a password, along with a new identity name. This affects devices that have public IP addresses. How it works? we discussed on this webinar series Webinar topic: IP […]
Network Monitoring with The Dude and Whatsapp
The Dude can improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices and alert you in case some service has problems. How Network Monitoring works with The Dude and Whatsapp? we discussed on this […]
Mikrotik IP Settings For Performance and Security
To help keep your router secure from the Internet, It has come to our attention, that somebody has created a script that logs into unprotected devices and sets a password, along with a new identity name. This affects devices that have public IP addresses. How it works? we discussed on this webinar series Webinar topic: Mikrotik […]