SlideShare a Scribd company logo
www.glcnetworks.com
UP and RUNNING
SSH service
GLC collaboration webinar,
9 nov 2021
Achmad Mardiansyah
M. Taufik nurhuda
1
Source: wikipedia.com
www.glcnetworks.com
Agenda
● Introduction
● Review prerequisite knowledge
● SSH application
● SSH implementation
● Q & A
2
www.glcnetworks.com
introduction
3
www.glcnetworks.com
What is GLC?
● Garda Lintas Cakrawala (www.glcnetworks.com)
● Based in Bandung, Indonesia
● Areas: Training, IT Consulting
● Certified partner for: Mikrotik, Ubiquity, Linux foundation
● Product: GLC radius manager
● Regular event
4
www.glcnetworks.com
Trainer Introduction
● Name: Achmad Mardiansyah
● Base: bandung, Indonesia
● Linux user since 1999, mikrotik user since 2007, UBNT
2011
● Mikrotik Certified Trainer
(MTCNA/RE/WE/UME/INE/TCE/IPv6)
● Mikrotik/Linux Certified Consultant
● Website contributor: achmadjournal.com, mikrotik.tips,
asysadmin.tips
● More info:
http://au.linkedin.com/in/achmadmardiansyah
5
www.glcnetworks.com
Past experience
6
● 2021 (Congo DRC, Malaysia): network support,
radius/billing integration
● 2020 (Congo DRC, Malaysia): IOT integration,
network automation
● 2019, Congo (DRC): build a wireless ISP from
ground-up
● 2018, Malaysia: network revamp, develop billing
solution and integration, setup dynamic routing
● 2017, Libya (north africa): remote wireless migration
for a new Wireless ISP
● 2016, United Kingdom: workshop for wireless ISP,
migrating a bridged to routed network
www.glcnetworks.com
About GLC webinar?
● First webinar: january 1, 2010 (title:
tahun baru bersama solaris - new year
with solaris OS)
● As a sharing event with various topics:
linux, networking, wireless, database,
programming, etc
● Regular schedule
● Irregular schedule: as needed
● Checking schedule:
http://www.glcnetworks.com/schedule
● You are invited to be a presenter
○ No need to be an expert
○ This is a forum for sharing: knowledge,
experiences, information
7
www.glcnetworks.com
Please introduce yourself
● Your name
● Your company/university?
● Your networking experience?
● Your general experience?
● Your expectation from this course?
8
www.glcnetworks.com
Prerequisite
● This presentation some prerequisite knowledge
● We assume you already know:
○ Networking in general
○ Computer network
9
www.glcnetworks.com
Review prerequisite knowledge
10
www.glcnetworks.com
7 OSI layer & protocol
11
● OSI layer Is a conceptual model from ISO
(International Standard Organization) for project
OSI (Open System Interconnection)
● When you send a message with a courier, you
need to add more info to get your message arrived
at the destination (This process is called
encapsulation)
● What is protocol
○ Is a set of rules for communication
○ Available on each layer
● Communication consist of series encapsulation
○ SDU: service data unit (before PDU)
○ PDU: protocol data unit (after header is added)
www.glcnetworks.com
Layered model (TCP/IP vs ISO) and encapsulation
12
/ datagram
www.glcnetworks.com
Layer 4 header (which one is TCP?)
13
www.glcnetworks.com
Layer 3 header (which one is IPv4?)
14
www.glcnetworks.com
Ethernet header (which is the MTU?)
15
www.glcnetworks.com
802.11 header
16
www.glcnetworks.com
Did you notice?
● There is a big overhead on encapsulation process
● More encapsulation means less payload?
17
www.glcnetworks.com
Layers in internet communication
18
Source: APNIC
www.glcnetworks.com
Security and encryption
19
www.glcnetworks.com
General Security Aspects (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
20
www.glcnetworks.com
AAA security
• Authentication: only registered user can
access
– What you know: username and password
– What you have: token, sms
– What you are: retina scan, fingerprint
• Authorization: define rights of a user
– Access control
– Data access control
– Restriction
– Type of Service
• Accounting: recording of what user is doing
(useful for billing/reporting)
– Traffic volume
– Online time
– Session
– Log: login, logout
Mainly implemented using radius
www.glcnetworks.com 21
www.glcnetworks.com
Goals of Information Security (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
22
www.glcnetworks.com
Security mechanism…
Source: william stalling, network security essentials
www.glcnetworks.com
Cryptography - encryption
● practice and study of techniques for
secure communication in the presence
of third parties.
● cryptography is about constructing and
analyzing protocols that prevent third
parties or the public from reading
private messages
● General implementation:
○ Start with asymmetric encryption, to transfer
shared-key
○ Switch to symmetric encryption
24
Source:
medium/com/hackernoon
www.glcnetworks.com
Secure shell (SSH)
25
www.glcnetworks.com
A bit of history, accessing remote nodes...
Remote access protocols
● Command line interface:
○ Lighter, faster
○ Less bandwidth
○ Example:
■ Telnet
■ Rsh (remote shell)
○ Issue: no security (plain text) → alternatives :
SSH
● GUI
○ Require higher bandwidth
○ slower
○ Example:
■ VNC
■ Remote desktop
26
www.glcnetworks.com
SSH
● An alternative of insecure protocol (telnet, rsh)
● Open standard: RFC 4250
● Security feature:
○ Asymmetric encryption for initial connection
○ Symmetric encryption for data exchange
○ Authentication:
■ key-based authentication
■ password-based authentication
● Implementation:
○ Openssh (openbsd community)
○ Solaris SSH
○ Other ssh
○
27
www.glcnetworks.com
LIVE practice
28
www.glcnetworks.com
preparation
● SSH client
● SSH parameters
○ SSH address
○ SSH port
○ SSH username
○ SSH password
29
www.glcnetworks.com
Q & A
30
www.glcnetworks.com
Interested? Just come to our training...
● Topics are arranged in systematic and logical way
● You will learn from experienced teacher
● Not only learn the materials, but also sharing experiences, best-practices, and
networking
31
www.glcnetworks.com
End of slides
● Thank you for your attention
● Please submit your feedback: http://bit.ly/glcfeedback
● Find our further event on our website : https://www.glcnetworks.com/en/
● Like our facebook page: https://www.facebook.com/glcnetworks
● Slide: https://www.slideshare.net/glcnetworks/
● Discord (bahasa indonesia): (https://discord.gg/6MZ3KUHHBX)
● Recording (youtube): https://www.youtube.com/c/GLCNetworks
● Stay tune with our schedule
● Any questions?
32

More Related Content

What's hot (20)

PDF
Zabbix for Monitoring
GLC Networks
 
PDF
Choosing Mikrotik Platform x86 vs chr
GLC Networks
 
PDF
Trusted Email Server DKIM, SPF, DMARC, RDNS
GLC Networks
 
PDF
Logical Volume Manager
GLC Networks
 
PDF
Running Moodle for High Concurrent Users
GLC Networks
 
PDF
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
PDF
Using Kubernetes to Provide Services
GLC Networks
 
PDF
Using Control-Webpanel for Hosting Service - Part 1
GLC Networks
 
PDF
Up and Running with Freebsd
GLC Networks
 
PDF
CCNA : Intro to Cisco IOS - Part 1
GLC Networks
 
PDF
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
PDF
MTCNA Intro to routerOS
GLC Networks
 
PDF
Mikrotik IP Settings For Performance and Security
GLC Networks
 
PDF
Machine Learning with Python
GLC Networks
 
PDF
Using Docker Platform to Provide Services
GLC Networks
 
PDF
Network Monitoring with The Dude and Whatsapp
GLC Networks
 
PDF
MTCNA : Intro to RouterOS - Part 1
GLC Networks
 
PDF
Building Indoor Wireless Network
GLC Networks
 
PDF
ACL on Linux - Part 1
GLC Networks
 
PDF
Building Local-loop Services for Customers
GLC Networks
 
Zabbix for Monitoring
GLC Networks
 
Choosing Mikrotik Platform x86 vs chr
GLC Networks
 
Trusted Email Server DKIM, SPF, DMARC, RDNS
GLC Networks
 
Logical Volume Manager
GLC Networks
 
Running Moodle for High Concurrent Users
GLC Networks
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
Using Kubernetes to Provide Services
GLC Networks
 
Using Control-Webpanel for Hosting Service - Part 1
GLC Networks
 
Up and Running with Freebsd
GLC Networks
 
CCNA : Intro to Cisco IOS - Part 1
GLC Networks
 
Networking in Telecommunication (signalling, tcp, ucp, ss7, sctp, sigtran)
GLC Networks
 
MTCNA Intro to routerOS
GLC Networks
 
Mikrotik IP Settings For Performance and Security
GLC Networks
 
Machine Learning with Python
GLC Networks
 
Using Docker Platform to Provide Services
GLC Networks
 
Network Monitoring with The Dude and Whatsapp
GLC Networks
 
MTCNA : Intro to RouterOS - Part 1
GLC Networks
 
Building Indoor Wireless Network
GLC Networks
 
ACL on Linux - Part 1
GLC Networks
 
Building Local-loop Services for Customers
GLC Networks
 

Similar to Up and Running SSH Service - Part 1 (20)

PDF
BGP Services IP Transit vs IP Peering
GLC Networks
 
PDF
IPv6 with Mikrotik
GLC Networks
 
PDF
Mikrotik Hotspot
GLC Networks
 
PDF
Best Current Practice (BCP) 38 Ingress Filtering for Security
GLC Networks
 
PDF
IPsec on Mikrotik
GLC Networks
 
PDF
Internet Protocol Deep-Dive
GLC Networks
 
PDF
Running BGP with Mikrotik
GLC Networks
 
PDF
Dynamic Website with Python
GLC Networks
 
PDF
RouterOS Migration From v6 to v7
GLC Networks
 
PDF
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
 
PDF
Controlling Access Between Devices in the same Layer 2 Segment
GLC Networks
 
PDF
EOIP Deep Dive
GLC Networks
 
PDF
Building a Web Server with NGINX
GLC Networks
 
PDF
Build Your Own ISP
GLC Networks
 
PDF
OSPF On Router OS7
GLC Networks
 
PDF
BGP on RouterOS7 -Part 1
GLC Networks
 
PDF
Introduction to Python
GLC Networks
 
PDF
Firewall mangle PBR: steering outbound path similar to inbound
GLC Networks
 
PDF
Telecommunication Evolution
GLC Networks
 
PDF
Hackerworkshop exercises
Henrik Kramshøj
 
BGP Services IP Transit vs IP Peering
GLC Networks
 
IPv6 with Mikrotik
GLC Networks
 
Mikrotik Hotspot
GLC Networks
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
GLC Networks
 
IPsec on Mikrotik
GLC Networks
 
Internet Protocol Deep-Dive
GLC Networks
 
Running BGP with Mikrotik
GLC Networks
 
Dynamic Website with Python
GLC Networks
 
RouterOS Migration From v6 to v7
GLC Networks
 
Network LACP/Bonding/Teaming with Mikrotik
GLC Networks
 
Controlling Access Between Devices in the same Layer 2 Segment
GLC Networks
 
EOIP Deep Dive
GLC Networks
 
Building a Web Server with NGINX
GLC Networks
 
Build Your Own ISP
GLC Networks
 
OSPF On Router OS7
GLC Networks
 
BGP on RouterOS7 -Part 1
GLC Networks
 
Introduction to Python
GLC Networks
 
Firewall mangle PBR: steering outbound path similar to inbound
GLC Networks
 
Telecommunication Evolution
GLC Networks
 
Hackerworkshop exercises
Henrik Kramshøj
 
Ad

More from GLC Networks (19)

PDF
Internal BGP tuning: Mesh peering to avoid loop
GLC Networks
 
PDF
BGP tuning: Peer with loopback
GLC Networks
 
PDF
BGP security tuning: pull-up route
GLC Networks
 
PDF
BGP troubleshooting: route origin
GLC Networks
 
PDF
Steering traffic in OSPF: Interface cost
GLC Networks
 
PDF
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
GLC Networks
 
PDF
Tuning OSPF: Prefix Aggregate
GLC Networks
 
PDF
Tuning OSPF: area hierarchy, LSA, and area type
GLC Networks
 
PDF
Stable OSPF: choosing network type.pdf
GLC Networks
 
PDF
GIT as Mikrotik Configuration Management
GLC Networks
 
PDF
Policy Based Routing with Indirect BGP - Part 2
GLC Networks
 
PDF
Policy Based Routing with Indirect BGP - Part 1
GLC Networks
 
PPTX
Automatic Backup via FTP - Part 2
GLC Networks
 
PDF
Automatic Backup via FTP - Part 1
GLC Networks
 
PDF
Voice Services, From Circuit Switch to VoIP
GLC Networks
 
PDF
MPLS on Router OS V7 - Part 2
GLC Networks
 
PDF
MPLS on Router OS V7 - Part 1
GLC Networks
 
PDF
BGP on RouterOS7 - Part 2
GLC Networks
 
PDF
OSPF On Router OS7 - Part 2
GLC Networks
 
Internal BGP tuning: Mesh peering to avoid loop
GLC Networks
 
BGP tuning: Peer with loopback
GLC Networks
 
BGP security tuning: pull-up route
GLC Networks
 
BGP troubleshooting: route origin
GLC Networks
 
Steering traffic in OSPF: Interface cost
GLC Networks
 
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
GLC Networks
 
Tuning OSPF: Prefix Aggregate
GLC Networks
 
Tuning OSPF: area hierarchy, LSA, and area type
GLC Networks
 
Stable OSPF: choosing network type.pdf
GLC Networks
 
GIT as Mikrotik Configuration Management
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 2
GLC Networks
 
Policy Based Routing with Indirect BGP - Part 1
GLC Networks
 
Automatic Backup via FTP - Part 2
GLC Networks
 
Automatic Backup via FTP - Part 1
GLC Networks
 
Voice Services, From Circuit Switch to VoIP
GLC Networks
 
MPLS on Router OS V7 - Part 2
GLC Networks
 
MPLS on Router OS V7 - Part 1
GLC Networks
 
BGP on RouterOS7 - Part 2
GLC Networks
 
OSPF On Router OS7 - Part 2
GLC Networks
 
Ad

Recently uploaded (20)

PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Advancing WebDriver BiDi support in WebKit
Igalia
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
July Patch Tuesday
Ivanti
 
Advancing WebDriver BiDi support in WebKit
Igalia
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 

Up and Running SSH Service - Part 1

  • 1. www.glcnetworks.com UP and RUNNING SSH service GLC collaboration webinar, 9 nov 2021 Achmad Mardiansyah M. Taufik nurhuda 1 Source: wikipedia.com
  • 2. www.glcnetworks.com Agenda ● Introduction ● Review prerequisite knowledge ● SSH application ● SSH implementation ● Q & A 2
  • 4. www.glcnetworks.com What is GLC? ● Garda Lintas Cakrawala (www.glcnetworks.com) ● Based in Bandung, Indonesia ● Areas: Training, IT Consulting ● Certified partner for: Mikrotik, Ubiquity, Linux foundation ● Product: GLC radius manager ● Regular event 4
  • 5. www.glcnetworks.com Trainer Introduction ● Name: Achmad Mardiansyah ● Base: bandung, Indonesia ● Linux user since 1999, mikrotik user since 2007, UBNT 2011 ● Mikrotik Certified Trainer (MTCNA/RE/WE/UME/INE/TCE/IPv6) ● Mikrotik/Linux Certified Consultant ● Website contributor: achmadjournal.com, mikrotik.tips, asysadmin.tips ● More info: http://au.linkedin.com/in/achmadmardiansyah 5
  • 6. www.glcnetworks.com Past experience 6 ● 2021 (Congo DRC, Malaysia): network support, radius/billing integration ● 2020 (Congo DRC, Malaysia): IOT integration, network automation ● 2019, Congo (DRC): build a wireless ISP from ground-up ● 2018, Malaysia: network revamp, develop billing solution and integration, setup dynamic routing ● 2017, Libya (north africa): remote wireless migration for a new Wireless ISP ● 2016, United Kingdom: workshop for wireless ISP, migrating a bridged to routed network
  • 7. www.glcnetworks.com About GLC webinar? ● First webinar: january 1, 2010 (title: tahun baru bersama solaris - new year with solaris OS) ● As a sharing event with various topics: linux, networking, wireless, database, programming, etc ● Regular schedule ● Irregular schedule: as needed ● Checking schedule: http://www.glcnetworks.com/schedule ● You are invited to be a presenter ○ No need to be an expert ○ This is a forum for sharing: knowledge, experiences, information 7
  • 8. www.glcnetworks.com Please introduce yourself ● Your name ● Your company/university? ● Your networking experience? ● Your general experience? ● Your expectation from this course? 8
  • 9. www.glcnetworks.com Prerequisite ● This presentation some prerequisite knowledge ● We assume you already know: ○ Networking in general ○ Computer network 9
  • 11. www.glcnetworks.com 7 OSI layer & protocol 11 ● OSI layer Is a conceptual model from ISO (International Standard Organization) for project OSI (Open System Interconnection) ● When you send a message with a courier, you need to add more info to get your message arrived at the destination (This process is called encapsulation) ● What is protocol ○ Is a set of rules for communication ○ Available on each layer ● Communication consist of series encapsulation ○ SDU: service data unit (before PDU) ○ PDU: protocol data unit (after header is added)
  • 12. www.glcnetworks.com Layered model (TCP/IP vs ISO) and encapsulation 12 / datagram
  • 13. www.glcnetworks.com Layer 4 header (which one is TCP?) 13
  • 14. www.glcnetworks.com Layer 3 header (which one is IPv4?) 14
  • 17. www.glcnetworks.com Did you notice? ● There is a big overhead on encapsulation process ● More encapsulation means less payload? 17
  • 18. www.glcnetworks.com Layers in internet communication 18 Source: APNIC
  • 20. www.glcnetworks.com General Security Aspects (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 20
  • 21. www.glcnetworks.com AAA security • Authentication: only registered user can access – What you know: username and password – What you have: token, sms – What you are: retina scan, fingerprint • Authorization: define rights of a user – Access control – Data access control – Restriction – Type of Service • Accounting: recording of what user is doing (useful for billing/reporting) – Traffic volume – Online time – Session – Log: login, logout Mainly implemented using radius www.glcnetworks.com 21
  • 22. www.glcnetworks.com Goals of Information Security (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 22
  • 23. www.glcnetworks.com Security mechanism… Source: william stalling, network security essentials
  • 24. www.glcnetworks.com Cryptography - encryption ● practice and study of techniques for secure communication in the presence of third parties. ● cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages ● General implementation: ○ Start with asymmetric encryption, to transfer shared-key ○ Switch to symmetric encryption 24 Source: medium/com/hackernoon
  • 26. www.glcnetworks.com A bit of history, accessing remote nodes... Remote access protocols ● Command line interface: ○ Lighter, faster ○ Less bandwidth ○ Example: ■ Telnet ■ Rsh (remote shell) ○ Issue: no security (plain text) → alternatives : SSH ● GUI ○ Require higher bandwidth ○ slower ○ Example: ■ VNC ■ Remote desktop 26
  • 27. www.glcnetworks.com SSH ● An alternative of insecure protocol (telnet, rsh) ● Open standard: RFC 4250 ● Security feature: ○ Asymmetric encryption for initial connection ○ Symmetric encryption for data exchange ○ Authentication: ■ key-based authentication ■ password-based authentication ● Implementation: ○ Openssh (openbsd community) ○ Solaris SSH ○ Other ssh ○ 27
  • 29. www.glcnetworks.com preparation ● SSH client ● SSH parameters ○ SSH address ○ SSH port ○ SSH username ○ SSH password 29
  • 31. www.glcnetworks.com Interested? Just come to our training... ● Topics are arranged in systematic and logical way ● You will learn from experienced teacher ● Not only learn the materials, but also sharing experiences, best-practices, and networking 31
  • 32. www.glcnetworks.com End of slides ● Thank you for your attention ● Please submit your feedback: http://bit.ly/glcfeedback ● Find our further event on our website : https://www.glcnetworks.com/en/ ● Like our facebook page: https://www.facebook.com/glcnetworks ● Slide: https://www.slideshare.net/glcnetworks/ ● Discord (bahasa indonesia): (https://discord.gg/6MZ3KUHHBX) ● Recording (youtube): https://www.youtube.com/c/GLCNetworks ● Stay tune with our schedule ● Any questions? 32