Safe Architecture Toolkit
Safe Architecture Toolkit
Architecture
Toolkit
July 2018
SAFE Security Architecture Toolkit
Table of Contents
• SAFE Toolkit Overview
• Capabilities Flows and Endpoints
• Architectures
• Designs
• SAFE Icon Library
• Tools, Rules and Techniques
• Contact
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Toolkit Overview
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
The following slides contain
High-level SAFE graphics that you can use to
Graphics introduce SAFE and explain
SAFE concepts and components.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
The Key to SAFE
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Progression
of Capabilities
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Architecture
Wheel
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
First, identify the capabilities your
customer needs their network to
provide to the business.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Internal Business Flows:
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Email Server-
Based Assessment Prevention Analytics Intelligence Malware Visibility Security Based
CEO Security Control Security Shareholder
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Web Server-
Based Assessment Prevention Analytics Intelligence Malware Visibility Application Based
Clerk Security Control Firewall Security Payment Application
\
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Web
Based Assessment Prevention Analytics Intelligence Malware Visibility Security
Employee Security Control Website
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Posture Identity Client-
Based Assessment Prevention Analytics Intelligence Malware Assessment Based
Expert Security Security Colleague
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Third-Party Business Flows:
Secure remote access for third party: Connected device with remote vendor support
DNS Identity Firewall Intrusion Flow Threat Anti- Tagging Virtual Posture Identity Client-
Security Prevention Analytics Intelligence Malware Private Assessment Based
Thermostat Network Security Remote Technician
Secure remote access for employees: Field engineer updating work order
Client- Identity Posture Virtual Firewall Intrusion Flow Threat Anti- Tagging Distributed Web Server-
Based Assessment Private Prevention Analytics Intelligence Malware Denial Application Based
Engineer Security Network of Service Firewall Security Workflow Application
Protection
Secure east-west traffic for compliance: PCI compliance for financial transactions
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Customer Business Flows:
Secure web access for guests: Guest accessing the Internet for comparative shopping
Secure web access for guests: Guest accessing the Internet to watch hosted video
DNS Wireless Wireless Firewall Intrusion Flow Threat Anti- Tagging Distributed Application Web Server-
Security Intrusion Rogue Prevention Analytics Intelligence Malware Denial Visibility Application Based
Guest Prevention Detection of Service Control Firewall Security
Protection Website
Identity Firewall Intrusion Flow Threat Anti- Tagging Distributed Application Web Server-
Prevention Analytics Intelligence Malware Denial Visibility Application Based
Customer of Service Control Firewall Security
Protection E-commerce
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Endpoints
Use these endpoints to further customize your SAFE capabilities flows. Industry-
specific endpoints are provided on the following slides.
CEO Shareholder Guest Server Customer Guest Salesperson Shareholder Server Server Automated
Process
Manager Manager Salesperson Technician Server Clerk Server Customer Technician Remote Server Building
Employee Controls
Subject Matter Remote Remote Video Server Video CEO Shareholder Customer Manager Clerk Guest Subject
Expert Colleague Employee Surveillance Camera Matter Expert
Technician Automated Server Building Building Remote Secure Server Server Building Building
Remote
Technician Process Controls Controls Employee Partner Controls Controls
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE architecture diagrams
SAFE Architecture convey the network structure at a
high level without naming specific
Diagrams products. Architectures can also
reference capabilities.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
The following architecture
diagrams are best-practice
references for each Place in
the Network (PIN).
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Small Branch Architecture
Secure Web
Branch Manager
browsing
information
Corporate
Wi-Fi Device \
Product Information
Website
Guest Wireless
Customer
browsing prices Mobile Wireless
Device Access Point Comparative
Shopping Website
Secure Applications
Secure Communications
Remote Colleague
Third-party Technician
accessing logs
Secure Third Parties
Secure Web
Secure Applications
Secure Communications
Remote Colleague
Third-party Technician
Secure Third Parties accessing logs
Secure Web
Product Information
Website
Guest Wireless
Customer
browsing prices Mobile Wireless Switch Web Security
Device Access Point
Comparative
Shopping Website
Secure Applications
Clerk processing Corporate Switch Distribution Firewall Switch Router Payment Processing
credit card Device Switch
Secure Communications
Remote Colleague
Subject Matter
Expert Employee Switch Communications
Phone Manager
Third-party Technician
Secure Third Parties accessing logs
Secure Email
Shareholder receiving
email from CEO
Guest Wireless
Guest
browsing Mobile Wireless Wireless Switch
Device Access Point Controller
Comparative
Shopping Website
Secure Web
Employee Corporate Switch Distribution Core Switch Firewall Switch Router Wholesaler Website
browsing Device Switch
Secure Communications
Remote Colleague
Third-party Technician
accessing logs
Secure Third Parties
Building
Controls Environmental Blade Server Communications
Controls Manager
WAN Architecture
NETWORK
East/West
Traffic
Payment
Processing
Communications Firewall Leaf Switch Spine Switch Leaf Switch Secure Server Payment
Manager Application
Software-defined
Shareholder
CEO sending Emails
email to
Shareholders
Identity Firewall Load Balancer Secure Server Communication
Server Appliance Services
Guest
browsing
Services Core Distribution Access Endpoints Business
TO WAN Use Cases
Employee
browsing
Edge Architecture
NETWORK
TO INTERNET TO ENTERPRISE
CORE
Shareholder receiving
email from CEO
Web Security Switch Firewall Trusted
Untrusted Enterprise CEO sending
email to Shareholders
Wholesaler
Website
Payment Employee
Router Switch Firewall Switch Load Balancer Switch Secure Server Application Switch browsing
Appliance
Customer DMZ
making purchase
Workflow
Application
Firewall
Field engineer
submitting work order
VPN
Building
Controls
Third-party Technician
accessing logs
VPN Switch SD WAN
Concentrator
Cloud Architecture
SERVICES NETWORK APPLICATIONS SERVICES
East/West
Traffic
Anti-Malware Identity
Authorization
Firewall vSwitch Storage Server Database
Virtual Appliance Zone
Threat
Intelligence Payment DNS Security
Processing
Workflow
Automation
Application
TO INTERNET Visibility
Control (AVC) Workflow
Firewall vSwitch Secure Server Application
Virtual Appliance
Customer
making purchase Shareholder
Emails
Hosted
Firewall Load vSwitch Secure Server E-Commerce
Virtual Appliance Balancer
Technician
submitting task
Services Business
Use Cases
Guest browsing
SAFE design diagrams show the
specific products and flow/
structure needed to satisfy the
desired security capabilities of a
particular network.
SAFE Design
The following design diagrams are
Diagrams best-practice references for
selected Places in the Network
(PINs). Contact the Cisco SAFE
Team for assistance in building
customized SAFE designs in Visio.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
If you need to customize
SAFE capabilities flows or
SAFE Icon Library architectures, you’ll find the
icons on the following slides.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Human Icons
Users: Rogue: Identity: Identity Directory • Cisco Identity Services Engine Appliance
Employees, third parties, Attackers accessing restricted Identity-based access. • Cisco Identity Services Engine Virtual Appliance
customers, and administrators. information resources.
Identity
Identity
Directory
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Humans Icons
Identity
Directory
Identity Directory
Identity Directory
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Clients: Malware: Client-Based Security: Corporate Device • Cisco Advanced Malware Protection for Endpoints
Devices such as PCs, laptops, Viruses, malware, and attacks This capability represents • Cisco Umbrella
smartphones, tablets. that compromise systems. multiple types of security
software to protect clients. • Cisco AnyConnect
• Built-in OS Firewall or Partner Products
Workstation Client-Based
Security Corporate Device
Anti-Malware
Anti-Virus
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Clients: Exploit Redirection: Personal Firewall Corporate Device • Built-in OS Firewall
Devices such as PCs, laptops, Unauthorized access and • Partner Products
smartphones, tablets. malformed packets connecting
to client.
Firewall
Workstation Corporate Device
Phish Link: Cloud Security: • Cisco Umbrella - Secure Internet Gateway (SIG)
Redirection of user to malicious Combination icon representing • Cisco AnyConnect Agent
web site. several security capabilities
provided by the cloud. • Cisco Cloudlock
• Cisco Web Security Appliance
• Cisco Meraki MX
• Cisco Firepower with URL Filtering
Cloud Security
• Cisco Viptela SD-WAN
Posture
Assessment
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Voice: Rogue: Phone • Cisco Unified Communications
Phone Attacker accessing private • Cisco IP Phones
information.
phone
Phone
sensor
Environmental
Controls
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Devices Icons
Corporate Device Corporate Mobile Phone Video Endpoint Actuator Sensor Automated
Wireless Device System
Standardized Infrastructure
System Images Redundancy
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Wired Network: Exploit Redirection: Firewall: Firewall • Cisco Adaptive Security Appliance (ASA)
Physical network infrastructure; Unauthorized access and Stateful filtering and protocol • Cisco Firepower Appliance
routers, switches, used to malformed packets connecting inspection.
connect access, distribution, core, to client. • Cisco Next Generation Firewall
and services layers together • Cisco Next Generation Firewall Virtual
Firewall
Firewall
L2/L3 Router
Network
Exploit Redirection: Intrusion Prevention: Intrusion Prevention • Cisco Adaptive Security Appliance (ASA)
Attacks using worms, viruses, or Blocking of attacks by • Cisco Firepower Appliance
other techniques. signatures and anomaly
analysis. • Cisco Next Generation Intrusion Prevention System
Fabric Distribution
Switch Switch • Cisco Next Generation Intrusion Prevention System Virtual
Intrusion Prevention
Intrusion
Access Prevention
Switch
Unauthorized Network Access: Tagging: Switch • Cisco Adaptive Security • Cisco Aggregation Services
Lateral spread of infiltration. Policy-based, software-defined Appliance (ASA) Routers
segmentation. • Cisco Firepower Appliance • Cisco Nexus Switches
• Cisco Catalyst Switches • Cisco ACI Fabric
• Cisco Wireless Controller and • Cisco DNA Fabric
Access Points
• Cisco Tetration
Tagging • Cisco Identity Services Engine
Switch
• Cisco Integrated Services
Routers
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Wireless Network: Malware: Mobile Device MDM Appliance • Cisco Identity Services Engine
Physical network infrastructure; Compromised devices Management (MDM): • Cisco Meraki Mobile Device Management
access points and controllers connecting to infrastructure. Endpoint access control
used to connect mobile devices based on policies.
to the access layer.
Mobile Device
Management (MDM) MDM Appliance
Wireless
Rogue: Wireless Rogue Detection: Wireless LAN Controller • Cisco Catalyst Switches with Unified Access
Unauthorized access and Detection and containment of • Cisco Wireless Controller and Access Points
disruption of wireless network. malicious wireless devices not
controlled by the company. • Cisco Mobility Services Engine
Wireless Rogue
Detection Wireless LAN
Controller
Rogue: Wireless Intrusion Prevention Wireless Access Point • Cisco Catalyst Switches with Unified Access
Attacks on the infrastructure (WIPS): • Cisco Wireless Controller and Access Points
via wireless technology. Blocking of wireless attacks by
signatures and anomaly analysis.
Wireless Intrusion
Prevention (WIPS) Wireless
Access Point
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Analysis: Malware: Anti-Malware for Networks: Firewall • Cisco Advanced Malware Protection for Networks
Telemetry and analysis of Malware distribution across Identify, block, and analyze • Cisco Next Generation Firewall
traffic across the enterprise. networks or between servers malicious files and
and devices. transmissions. • Cisco Next Generation Firewall Virtual
• Cisco Next Generation Intrusion Prevention System
• Cisco Next Generation Intrusion Prevention System Virtual
Network
Anti-Malware Firewall
Analytic
Engine
Advanced Threat: Threat Intelligence: Threat Intelligence • Cisco Collective Security Intelligence
Zero-day malware and attacks. Contextual knowledge is a capability leveraged • Cisco Global Threat Analytics and Encrypted Traffic Analytics
of emerging hazards. by many systems and
not deployed separately; • Cisco Talos Security Intelligence
there is no dedicated • Cisco Firepower Management Center
architecture icon.
• Cisco Umbrella Investigate
• Cisco AMP Console – Telemetry
Threat
Intelligence • Cisco Stealthwatch Management Console
Exfiltration: Flow Analytics: Flow Sensor Flow Sensors and Collectors: • Cisco NetFlow Generation
Traffic, telemetry, and data Network traffic metadata Appliance
• Cisco Integrated Services
exfiltration from successful identifying security Incidents. Router • Cisco Stealthwatch Flow
attacks. Sensor
• Cisco Adaptive Security
Appliance Analysis:
• Cisco Wireless LAN Controller • Cisco Stealthwatch
Management Console
Flow Analytics • Cisco Catalyst Switch
Flow Sensor • Cisco Stealthwatch Cloud
• Cisco Nexus Switch
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
WAN: Exfiltration: VPN Concentrator: VPN Concentrator • Cisco Adaptive Security Appliance (ASA)
Public and untrusted Wide Area Traffic, telemetry, and data Encrypted remote access. • Cisco Firepower Appliance
Networks that connect to the exfiltration from successful
company, such as the Internet. attacks. • Cisco Next Generation Firewall
• Cisco Next Generation Firewall Virtual
VPN Concentrator
VPN Concentrator
WAN
Man-in-the-Middle: Virtual Private Network (VPN): SD WAN • Cisco Adaptive Security • Cisco Meraki SD-WAN
Connection of information and Encrypted communication Appliance (ASA)
• Cisco IWAN
identities. tunnels. • Cisco Aggregation Services
Routers • Cisco Next Generation
Firewall
• Cisco Cloud Services Router
• Cisco Next Generation
• Cisco Integrated Services Firewall Virtual
Router
Virtual Private • Cisco Viptela SD-WAN vEdge
Network (VPN) SD WAN • Cisco Firepower Appliance
Botnets DDOS: DDOS Protection: DDOS Protection Appliance • Cisco Aggregation Services Routers with Radware
Massively scaled attacks that Protection against scaled • Cisco Firepower Appliance with Radware
overwhelm services. attack forms.
• Distributed Denial of Service Technology Partner
Distributed Denial
of Service Protection DDOS Protection
Appliance
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Cloud: Phish Link: Cloud Security: VPN Concentrator • Cisco Umbrella - Secure • Cisco Meraki MX
Security services from the Attacks from malware, Combination icon representing Internet Gateway (SIG)
• Cisco Firepower with URL
cloud. viruses, and malicious URLs. several security capabilities • Cisco AnyConnect Agent Filtering
provided by the cloud.
• Cisco Cloudlock • Cisco Viptela SD-WAN
• Cisco Cloud Services Router
• Cisco Web Security
Cloud Security Appliance
Cloud Security
Cloud
DNS Security
Secure DNS
CASB
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Cloud: Redirect Link: Web Security: Web Security • Cisco Umbrella - Secure Internet Gateway (SIG)
Security services from the Infiltration and exfiltration via Internet access integrity • Cisco Web Security Virtual Appliance
cloud. Web protocols. and protections.
• Cisco Meraki URL Filtering
Web Security
Web Security
Cloud
Malware C2: Web Reputation/Filtering: Web Reputation Filtering • Cisco Umbrella - Secure Internet Gateway (SIG)
Attacks directing to a Tracking against URL-based • Cisco Web Security Virtual Appliance
malicious URL. threats.
• Cisco Meraki URL Filtering
Web Reputation/
Filtering/DCS Web Filtering
Redirect Link: Cloud-based Firewall: • Cisco Adaptive Security Virtual Appliance (ASAv)
Unauthorized access and Filter and inspect traffic via the • Cisco Cloud Services Router
malformed packets connecting cloud.
to services. • Cisco Next Generation Firewall Virtual (NGFWv)
Firewall
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Network Icons
Firewall IPS Router VPN Concentrator DDOS Identity Web Security Web Filtering
Protection Directory
Firewall IPS Router VPN Concentrator DDOS Identity Web Security Web Filtering
Protection Directory
MS Active MS Active
Directory Directory
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Network Icons
Access Distribution Core Fabric Leaf Spine SD SD WAN Wireless Mobile Device Wireless
Switch Switch Switch Switch Switch Switch Controller Access Point Management (MDM) LAN Controller
Distribution Core Fabric Leaf Spine ACI SD WAN Access Point Mobile Device Wireless
Access Switch Switch Switch Switch Switch Controller Management (MDM) LAN Controller
Switch
Switch
Stack
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Network Icons
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Applications Icons
Applications: Redirect Link: Web Application Firewalling: Web Application Firewall • Web Application Firewall Technology Partner
Application-specific security Attacks against poorly- Advanced application inspection
services. developed applications. and monitoring.
Application Visibility
Control (AVC)
Spying: TLS Encryption Offload: TLS Appliance • Cisco Next Generation Firewall
Theft of unencrypted traffic. Accelerated encryption/ • Transport Layer Security Offload Technology Partner
decryption of data services.
TLS Offload
TLS Appliance
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Applications Icons
Applications: Phishing: Email Security: Email Security • Cisco Email Security Appliance
Application-specific security Infiltration and exfiltration via Messaging integrity • Cisco Cloud Email Security
services. email. and protections.
Email
Application Security Email Security
Malware
Sandbox Sandbox
Appliance
Storage Disk
Encryption
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Applications Icons
Servers: Malware: Server-based Security: Secure Server • Cisco Advanced Malware Protection for Endpoint
Application hosting operation Viruses, malware and attacks Combination icon representing • Cisco Umbrella
systems. that compromise systems. several security capabilities to
secure the server. • Cisco Tetration
• Built-in OS Firewall or Partner Products
Load
Balancer
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Applications Icons
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Analysis/Correlation: SIEM • Cisco Stealthwatch
Infrastructure systems Security event management of • Cisco Stealthwatch Cloud
management and orchestration. real-time information.
• Cisco Visibility
• SIEM Technology Partner Products
Central Analysis/
Correlation SIEM
Management
Anomaly
Detection
Identity/
Authorization Identity
Directory
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Logging/Reporting: Log Collector • Cisco Stealthwatch
Infrastructure systems Centralized event information • Logging Technology Partner Products
management and orchestration. collection.
Central Logging/
Reporting Log Collector
Management
Monitoring
Monitoring
Name
Resolution Secure
DNS
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Policy/Configuration: Policy • Cisco Firepower • Cisco Advanced Malware
Infrastructure systems Unified infrastructure Management Center Protection Console
management and orchestration. management and compliance • Cisco Identity Services • Cisco Defense Orchestrator
verification. Engine
• Cisco Tetration
• Cisco DNA Center
• Cisco Security Manager
• Cisco ACI APIC
• Cisco Prime LMS
Central Policy/ • Cisco Stealthwatch
Configuration Policy Management Console
Management
Time
Synchronization NTP
Vulnerability
Management Vulnerability
Management
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Management Icons
MS Active MS Active
Directory Directory
Generic
Appliance
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Please refer to the guidelines and
helpful elements on these pages
Tools and Rules to ensure that your diagrams and
presentations are SAFE!
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Building SAFE Architectures
To customize one of the
architecture diagrams on slides
20-27, or to build one, please
refer to this key as well as the
Architecture Toolkit and the
Dos and Don’ts information on
the following slides.
For assistance, contact
Christian Janoff.
[email protected]
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Title Example
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Using Selection Pane
The Selection Pane enables you to view and access layers easily
1. Turn on the Selection Pane
2. Each object in the pane is listed in the hierarchical order (depth) that it is on the slide.
3. Click the eye to make them invisible/visible so you can access objects below them without having
to move them from their position
4. By clicking on an object or group name you can select objects that are hard to grab
5. Once selected, you can change their order via the Arrange menu, or move them with cursor keys
1 2 3 4 5
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
How to draw smooth business flows
By editing the points of a freeform shape you can create smooth consistent corners (steps 1-8).
• Make the line with square turns, click and drag to make each segment (hold shift to constrain)
• Select Edit Shape then Edit Points from the Drawing Tools menu
• Using the gridlines from the View menu, add points before and after (Ctrl+click)
• After adding the new points, then select and delete the corner point
• Stretch handles as appropriate (back to where the corner point was, and the next corner)
to create a smooth arching corner
1 2 3
4 5 6 7 8
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design/Drawing Elements
VLAN201
VLAN201
HSRP G1/6
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
If you have questions about SAFE and constructing SAFE architectures with
the resources in this toolkit, contact Christian Janoff. [email protected]
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public