SlideShare uma empresa Scribd logo
1 de 12
Mikrotik Router Backup
and Restore Process
Tsoft IT
1
Presented by:
Titas Sarker
CEO
Tsoft IT
Mikrotik Router Backup and
Restore ProcessTsoft IT
2
LCMC
Agenda Page no
What is Mikrotik Router?
04
Important of Keep back up configuration files
05
Types of Backup process
06
Manual Backup
07
Automatically Backup
08
Automatically Backup
09
Restore Process
10
Restore Process
11
Conclusion
12
3
 What is Mikrotik?
Mikrotik is the company Name. They makes networking
devices.
 What is Mikrotik Router?
Mikrotik router is a device to connect at least two networks.
 What is Mikrotik Router OS?
MikroTik RouterOS is the operating system. This operating
system use to operate the Mikrotik router.
Mikrotik Router Backup and
Restore ProcessTsoft IT
4
Important of Keep backup configuration files
Mikrotik Router Backup and
Restore ProcessTsoft IT
5
 Physical device damage
 Theft
 Humans make mistakes
 Nature is Unpredictable
Types of Backup process
Mikrotik Router Backup and
Restore ProcessTsoft IT
6
 Manual Backup
 Automatically Backup
Manual Backup
Mikrotik Router Backup and
Restore ProcessTsoft IT
7
 Log in Winbox
 Click on Files
 Click on Backup
Automatically Backup (Script)
Mikrotik Router Backup and
Restore ProcessTsoft IT
8
 Log in Winbox
 Click on System
 Click on Script “+”
Script
/system backup save name=([/system identity
get name]); /tool e-mail send from=" Your
email address" to="Your email address"
subject=([/system identity get name] . "
backup") body=([/system identity get name]
. " " .[/system clock get date] . " " . [/system
clock get time] . " backup") file=([/system
identity get name] . ".backup")
server=[:resolve Your smtp address ]
port=587 user="Your email address"
password="Your email password "; :log info
"Backup e-mail sent.";
Automatically Backup
Mikrotik Router Backup and
Restore ProcessTsoft IT
9
 Log in Winbox
 Click on System
 Click on Scheduler“+”
Restore process
Mikrotik Router Backup and
Restore ProcessTsoft IT
10
 Log in router
 Upload backup file
Restore Process
Mikrotik Router Backup and
Restore ProcessTsoft IT
11
 Log in Winbox
 Click on Files
 Click on Restore
THANK YOU
MUM, Dhaka, Bangladesh
12
www.tsoftit.com

Mais conteúdo relacionado

Mais procurados

Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
Mender; the open-source software update solution
Mender; the open-source software update solutionMender; the open-source software update solution
Mender; the open-source software update solutionMender.io
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
Mender: The open-source software update solution
Mender: The open-source software update solutionMender: The open-source software update solution
Mender: The open-source software update solutionMender.io
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - OverviewIrsandi Hasan
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...Mender.io
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorRonald Bartels
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkMuhd Mu'izuddin
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkjoehurst87
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 

Mais procurados (20)

Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
Mender; the open-source software update solution
Mender; the open-source software update solutionMender; the open-source software update solution
Mender; the open-source software update solution
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Mender: The open-source software update solution
Mender: The open-source software update solutionMender: The open-source software update solution
Mender: The open-source software update solution
 
VMware vShield - Overview
VMware vShield - OverviewVMware vShield - Overview
VMware vShield - Overview
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
Integrate IoT cloud analytics and over the-air (ota) updates with google and ...
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Cisco CCNA module 1
Cisco CCNA module 1Cisco CCNA module 1
Cisco CCNA module 1
 
CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
Itn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the networkItn instructor ppt_chapter1 - exploring the network
Itn instructor ppt_chapter1 - exploring the network
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and LicensingCCNAv5 - S3: Chapter9 IOS Images and Licensing
CCNAv5 - S3: Chapter9 IOS Images and Licensing
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 

Semelhante a Mikrotik router backup and restore process

Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...CODE BLUE
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor FiorimTI Safe
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsTrend Micro (EMEA) Limited
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Hamza Malik
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用Cybozucommunity
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018JOYZO
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018Ryu Yamashita
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterIJCSIS Research Publications
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?Justin Black
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guideseolangit4
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)Security Bootcamp
 

Semelhante a Mikrotik router backup and restore process (20)

Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
IoT Protocols
IoT ProtocolsIoT Protocols
IoT Protocols
 
Real-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 monthsReal-life patch test - vulnerabilities found in one simple server in 6 months
Real-life patch test - vulnerabilities found in one simple server in 6 months
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
 
Netinstall
NetinstallNetinstall
Netinstall
 
Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11Ccna v5-S1-Chapter 11
Ccna v5-S1-Chapter 11
 
STUXNET_
STUXNET_STUXNET_
STUXNET_
 
クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用クラウドトレンドを先取り&実践するkintone活用
クラウドトレンドを先取り&実践するkintone活用
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018クラウドトレンドを先取り&実践するkintone活用 - kintone hack 2018
クラウドトレンドを 先取り&実践するkintone活用 - kintone hack 2018
 
Contiki OS Research Projects Guidance
Contiki OS Research Projects GuidanceContiki OS Research Projects Guidance
Contiki OS Research Projects Guidance
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
 
Who needs iot security?
Who needs iot security?Who needs iot security?
Who needs iot security?
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
 
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
SBC 2012 - Malware Memory Forensics (Nguyễn Chấn Việt)
 

Mais de Titas Sarker

র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার Titas Sarker
 
Osi model bangla by titassarker
Osi model bangla by titassarkerOsi model bangla by titassarker
Osi model bangla by titassarkerTitas Sarker
 
dynamic routing (eigrp)
dynamic routing (eigrp)dynamic routing (eigrp)
dynamic routing (eigrp)Titas Sarker
 
mikrotik queues configuration
mikrotik queues configurationmikrotik queues configuration
mikrotik queues configurationTitas Sarker
 
03. mikrotik router as gateway
03. mikrotik router as gateway03. mikrotik router as gateway
03. mikrotik router as gatewayTitas Sarker
 
pc based mikrotik router
pc based mikrotik routerpc based mikrotik router
pc based mikrotik routerTitas Sarker
 
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerDispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerTitas Sarker
 
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01Titas Sarker
 
Ict policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerIct policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerTitas Sarker
 

Mais de Titas Sarker (10)

র‌্যানসমওয়্যার
র‌্যানসমওয়্যার র‌্যানসমওয়্যার
র‌্যানসমওয়্যার
 
Tsoft It
Tsoft ItTsoft It
Tsoft It
 
Osi model bangla by titassarker
Osi model bangla by titassarkerOsi model bangla by titassarker
Osi model bangla by titassarker
 
dynamic routing (eigrp)
dynamic routing (eigrp)dynamic routing (eigrp)
dynamic routing (eigrp)
 
mikrotik queues configuration
mikrotik queues configurationmikrotik queues configuration
mikrotik queues configuration
 
03. mikrotik router as gateway
03. mikrotik router as gateway03. mikrotik router as gateway
03. mikrotik router as gateway
 
pc based mikrotik router
pc based mikrotik routerpc based mikrotik router
pc based mikrotik router
 
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-SarkerDispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
Dispersion-Management-of-Optical-Fiber-Presented-by-Titas-Sarker
 
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
ictpolicyineducationandresearchpresentedbytitassarker-130520064827-phpapp01
 
Ict policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarkerIct policy in education and research presented by titas sarker
Ict policy in education and research presented by titas sarker
 

Último

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Último (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

Mikrotik router backup and restore process

  • 1. Mikrotik Router Backup and Restore Process Tsoft IT 1
  • 2. Presented by: Titas Sarker CEO Tsoft IT Mikrotik Router Backup and Restore ProcessTsoft IT 2
  • 3. LCMC Agenda Page no What is Mikrotik Router? 04 Important of Keep back up configuration files 05 Types of Backup process 06 Manual Backup 07 Automatically Backup 08 Automatically Backup 09 Restore Process 10 Restore Process 11 Conclusion 12 3
  • 4.  What is Mikrotik? Mikrotik is the company Name. They makes networking devices.  What is Mikrotik Router? Mikrotik router is a device to connect at least two networks.  What is Mikrotik Router OS? MikroTik RouterOS is the operating system. This operating system use to operate the Mikrotik router. Mikrotik Router Backup and Restore ProcessTsoft IT 4
  • 5. Important of Keep backup configuration files Mikrotik Router Backup and Restore ProcessTsoft IT 5  Physical device damage  Theft  Humans make mistakes  Nature is Unpredictable
  • 6. Types of Backup process Mikrotik Router Backup and Restore ProcessTsoft IT 6  Manual Backup  Automatically Backup
  • 7. Manual Backup Mikrotik Router Backup and Restore ProcessTsoft IT 7  Log in Winbox  Click on Files  Click on Backup
  • 8. Automatically Backup (Script) Mikrotik Router Backup and Restore ProcessTsoft IT 8  Log in Winbox  Click on System  Click on Script “+” Script /system backup save name=([/system identity get name]); /tool e-mail send from=" Your email address" to="Your email address" subject=([/system identity get name] . " backup") body=([/system identity get name] . " " .[/system clock get date] . " " . [/system clock get time] . " backup") file=([/system identity get name] . ".backup") server=[:resolve Your smtp address ] port=587 user="Your email address" password="Your email password "; :log info "Backup e-mail sent.";
  • 9. Automatically Backup Mikrotik Router Backup and Restore ProcessTsoft IT 9  Log in Winbox  Click on System  Click on Scheduler“+”
  • 10. Restore process Mikrotik Router Backup and Restore ProcessTsoft IT 10  Log in router  Upload backup file
  • 11. Restore Process Mikrotik Router Backup and Restore ProcessTsoft IT 11  Log in Winbox  Click on Files  Click on Restore
  • 12. THANK YOU MUM, Dhaka, Bangladesh 12 www.tsoftit.com