M I K R O T I K C O N F E R E N C E

Please Wait - Loading...

TENTATIVE - SUBJECT TO CHANGE!

Agenda for European MTPC Conference in Prague, MARCH 2026

March 11th (Wednesday)

Time Event
18:00 – 21:00
Meet ‘n’ greet party, early registration

March 12th (Thursday)

(Exact times subject to change)

Time Speaker Event / Presentation Video Slide Deck
08:00
Check-in and Exhibitor hall opens. Bring your printed tickets
09:00-09:30
Opening and introduction (English)
09:30-10:15

Michal Dobšovič

From CLI to Co-Pilot: Using AI to Analyze and Secure RouterOS Configurations – MikroTik RouterOS configurations often grow complex over time, making manual review, troubleshooting, and security hardening increasingly challenging. While RouterOS offers powerful tools through the CLI and WinBox, analyzing large configurations and logs still depends heavily on human attention and experience. This session shows how Artificial Intelligence can act as a practical co-pilot for MikroTik professionals. Using AI consoles such as Codex or Claude, we explore workflows where AI analyzes RouterOS configuration exports and logs, highlights potential security and operational issues, and recommends configuration improvements and hardening steps. All results are provided as human-reviewed suggestions, helping engineers improve the security and consistency of RouterOS configurations while keeping full control.

YouTube Video

PDF
10:20-11:05

Marco Boschini

Why you should learn BGP, even if you’re not an ISP – This presentation starts from a “Hello, BGP” concept to explain basic BGP concept, with a real case study of a network infrastructure (made with MikroTik) of more than 300 sites connected with VPN on 2 MikroTik CHR Routers. With a complete redesign I have removed the static routing and netwatch/script using iBGP. Using iBGP we can add new services such as EVPN for L2 connectivity over remote sites

YouTube Video

PDF
11:05-11:50
Refreshment Break 45 mins
11:50-12:35

Jono Thompson

The Tale of Three Lanes – Looking at how you can use Layer 3 Hardware offloading with NAT on a compatible CRS3xx switch including covering which switches support it or not and will look at some of the features of RouterOS that are bypassed when using Layer 3 Hardware offloading with NAT

YouTube Video

PDF
12:35-14:00
Hot Lunch provided (1 hour 25 mins)
14:00-14:45

Male Grey Outline

To Be Announced 

Unfortunately Rein Põdra will no longer be able to present his talk on IDS/IPS for personal reasons. We wil update the agenda as soon as we have arranged an alternative speaker.

YouTube Video

PDF
14:50-15:35

Barry Higgins

IPv6 – From Transit to End User with RouterOS – The flow of IPv6 data between the transit supply to the end user in either direction. The methods available with RouterOS broken down into 3 sections, Your transit feed, the core network and the end user delivery

YouTube Video

PDF
15:35-16:15
Refreshment Break, 40 Mins
16:15-17:00

To Be Announced

To Be Announced

YouTube Video

PDF
18:30-23:00
The Traditional “MikroTik Professionals VIP Dinner” to be held in a typical Czech restaurant. Please note the time of 18:30 carefully!

March 13th (Friday)

(Exact times subject to change)

Time Speaker Event / Presentation Video Slide Deck
08:00
Check-in and Exhibitor hall opens. Bring your printed tickets
09:00-09:45

Alessandro Campanella

Architecting Scalable, Resilient, Multi-Tenant SD-WAN with MikroTik for Mobile and Segmented Networks – An architectural deep dive into SD-WAN design with MikroTik, focused on building resilience through control-plane intelligence rather than reactive failover mechanisms. The session explores how automated provisioning, distributed routing models, and dynamic path control enable scalable, multi-WAN infrastructures for real-world mobile and fixed deployments. Real configuration patterns and design examples illustrate how to create networks that adapt, converge, and remain predictable under constant change.

YouTube Video

PDF
09:50-10:35

Jody Lemoine

Jody Lemoine

Scalable and Secure Self-Serve RouterOS Remote Management – Problem: One of the most common questions I see asked is how to securely manage RouterOS devices remotely. Most often the suggestions will work under limited circumstances, but fall down in some way: IPv4-only, won’t work with CG-NAT, requires a third-party service, limited access methods, etc. How can we manage these devices without regard for these things and without requiring a third-party and/or an expensive monthly subscription to make it happen? Method: Layering secure IKEv2/IPSec transports and L2TPv3 pseudowires, we can easily create a scalable remote management architecture that allows us to use all of the access methods we’ve come to expect from RouterOS locally (WinBox, MAC-telnet, SSH, RoMON, etc) using one or more physical routers or CHRs and with minimal management requirements. Presentation: I’ll go through the basic setup, why I chose the methods I did, some contrasts with other approaches and some rabbit holes worth diving into to make the setup fit individual consultants’ needs.

YouTube Video

PDF
10:35-11:20
Refreshment Break (45 mins)
11:20-12:05

Michiel Visser

Michiel Visser

Exploring a Mikrotik (almost) enterprise-ready feature – Let’s build a spine-leaf switching architecture (and some other ones) – With the introduction of RouterOS 7.20 Mikrotik made BGP-EVPN available in the software. Together with VXLAN which is already available for a longer time, this makes it possible to build a modern spine-leaf switching architecture for the datacenter. In this talk I would like to present a short history of datacenter architectures, leading up to and including the spine-leaf design. We will build up this design based on VXLAN and EVPN during the talk and discuss its enterprise-ready state at the moment. Next to that we will briefly address some other enterprise-grade or semi-enterprise grade features that I have used in the past with some personal success stories ‘MikroTik for the win’.

YouTube Video

PDF
12:05-13:30
Hot Lunch provided (1hr 25 mins)
13:30-14:15

i4Wifi

Technical Presentation on 100Mega’s LiFePO4 battery solution AMVOLT

YouTube Video

PDF
14:20-15:05

Martin Pina

Martin Pina

ROSE Data Storage (RDS)

YouTube Video

PDF
15:05-15:45
Refreshment Break (40 mins)
15:45-16:30

Michael Takeuchi

RouterOS Layer-2 Engineering: Operating at Internet Exchange Points – Internet Exchange Points operate as shared Layer-2 environments where a single misconfiguration can affect the stability of the entire fabric. RouterOS is widely used by Internet Service Providers due to its flexibility and cost efficiency, yet its Layer-2 behavior is often assumed rather than intentionally engineered in IXP-facing deployments. This presentation explains how enterprise Layer-2 intents such as access VLAN isolation, control plane suppression, and broadcast domain hygiene are enforced in RouterOS through concrete configuration steps. By examining typical IXP-facing interface and bridge configurations, the session demonstrates how improper defaults can lead to ARP abuse, uncontrolled MAC learning, and protocol leakage, and how disciplined Layer-2 configuration is required to maintain a stable and responsible Internet Exchange environment.

YouTube Video

PDF
16:30-17:00
The Raffle and closing ceremony of the MTPC