Cisco Blogs


Cisco Blog > SP360: Service Provider

Cbeyond’s Brent Cobb Talks with Cisco about Customer Intimacy and IPv6 (Part 2 of 2)

This is the second section of our two part interview with Brent Cobb, Cbeyond’s Chief Revenue and Customer Officer. The first part is located here.

How will IPv6 Transition affect your customers?

Brent Cobb:

Cbeyond has been watching IPv6 unfold since the late 90s. Today the company is in the implementation phase of its transition to support IPv6, and we’ve chosen Cisco’s Carrier Grade v6 (CGv6) implementation as its solution. To us IPv6 will impact how the plumbing of the Internet works – but we try to take the really sophisticated technology of operating a network and applications out of the discussion and service delivery to the small business into the discussion. The majority won’t be impacted directly by IPv6 because Cbeyond will make changes within our network, within our data centers, and within our application environment so our customers don’t have to understand the difference between v4 and v6. It will be transparent to our customers because we’ll handle the complexity.

Read More »

Tags: , , , , , , , , ,

Cbeyond’s Brent Cobb Talks with Cisco about Customer Intimacy and IPv6 (Part 1 of 2)

Since its founding in 1999, Cbeyond, the Atlanta-based managed services provider, has tried to remain true to its name. The company which focuses exclusively on small- and medium-sized businesses must observe and act on technology trends well in advance to maintain its position with its customers as both a communications and hosted IT provider.

We recently had an opportunity to interview Brent Cobb, Cbeyond’s Chief Revenue and Customer Officer to hear how Cbeyond enables its small business customers to reap the benefits of advanced technology usually unavailable without the IT infrastructure of a big business.

Cisco: What kind of challenges does Cbeyond see facing its customers? Read More »

Tags: , , , , , , , , ,

SNMP MIB Changes Related to IPv6

Simple Network Management Protocol (SNMP) is part of IETF’s Internet Protocol Suite that consists of four abstraction layers and defines a set of protocols used on the Internet. SNMP is mainly used for management and monitoring of networked devices. It can inform about the health of a network device or other reflections of its state (interfaces, IP addresses, traffic and more). SNMP is defined as part of IETF RFC 1157. For its function, it leverages Management Information Bases (MIBs), which define the structure of device information maintained. They represent a hierarchical namespace containing object identifiers (OIDs). Each OID identifies an object that holds the information of interest and can be polled or set via SNMP.

Read More »

Tags: , , ,

LISPmob, a new open source project for network mobility

What if your mobile device allowed you the freedom to seamlessly roam across any network in the world, regardless of location or operator and with all the attributes you would expect, security or privacy…  With LISPmob, we may have gotten a giant step closer as we open sourced a network stack for network mobility on Linux platforms, an implementation of basic LISP mobile node functionalities.

This is the Locator Identifier Separation Protocol, which supports the separation of the IPv4 and IPv6 address space following a network-based map-and-encapsulate scheme based on an IETF open standard.

We hope this will be a project and a community many will find not just interesting and vibrant, but necessary and fun to engage, collaborate and contribute.

How will this help your plans to deal with all these amazing possibilities of mobile access to an ever-growing Internet?

Tags: , , , , , , , , ,

Making a Secure Transition to IPv6

Moving your network from IPv4 to IPv6 can be risky if you don’t close security holes

In February 2011, the last blocks of IPv4 Internet addresses were allocated, highlighting the need for organizations everywhere to plan their transition to IPv6, the next generation Internet protocol. Because the move to IPv6 is happening gradually, applications will support both Internet protocols for some time—and so must your network. During the transition from IPv4 to IPv6 your network could become vulnerable to new security risks, so it’s critical that you phase in the new protocol as securely as possible.

Read More »

Tags: , , , , , ,