Mikrotik Certified User Management Engineer (MTCUME)
1500 Students taken this course
Paper Code – MTCUME

Duration
1 Month
Fee
PKR25000
Outlines
Fee
Outlines
Duration
Fee
Outlines
NOTE:
1. Above fee is applicable in class / Group study.
2. Fee package will be Different for one on one session & International Students.
About this Course
(MTCUME) is a course to understand Mikrotik RouterOS User Management principles.
By the end of this training session, the student will be able to securely manage large scale RouterOS based network with centralized user management.
Why Choose Us
- Online Training
- One to One Training
- Regular and Weekend Training
Modes of Trainings Available:
- Online Training
- Class Room Training
- One to One Training
- Regular and Weekend Training
Course Content
- PPP Profile
- Local and remote addresses
- Incoming and outgoing filters
- Address list
- Change TCP-MSS
- Use encryption
- Session timeout
- Rate-limit configuration
- Only-one setting
PPP Secret
- Service and Profile
- Local and Remote address
- Routes configuration
- Limit Bytes In/Limit Bytes Out configuration
IP Pool
- Set addresses ranges
- Next pool options
PPTP and L2TP
- Theory
- Comparison
PPTP Client configuration
- Client setup
- Set profile
- Dial on demand
- Add default route and static routes
L2TP Client configuration
- Client setup
- Configure profile
- Dial on demand
- Add default route and static routes
L2TP Server configuration
- Enable server
- Set profiles
- Add clients to PPP secret
- Set Static interfaces for clients
PPPoE server and client
- Theory
- Usage environment
- Comparison to other PPP protocols
PPPoE client configuration
- Client setup
- Select interface
- Service name
- Configure profile
PPPoE Server configuration
- Enable PPPoE server
- Set profiles
- Add clients to PPP secret
- Add Static interfaces for clients
- Secure server by removing any IP address from PPPoE server interface
Encryption
- Set profile without encryption
- Set profile with encryption
- Configure PPPoE client without encryption
Introduction
- Theory and concepts
- Comparison to other VPN protocols
IPsec Peer
- Use different authentication methods
- IPsec exchange modes
- Encryption and hash algorithms
- NAT-Traversal
- Lifetime and life bytes
- DPD protocol
Policy
- IPsec protocol and action
- Tunnels
- Generate dynamic Policy
Proposal
- Encryption and authentication algorithms
- Lifetime
- PFS
- Installed-SA
- Flush SA
Create IPsec between two routers with NAT
- Set peer
- Set policy
- Set NAT rules
- Confirm the secure link is established
- Introduction
- Concepts
- Usage environments
- Setup Hotspot with default settings
Reviews and Ratings
Top Reviews
5/5
Get 50% off before it's tool late
Days
Hours
Minutes
Seconds