Safe Architecture Toolkit
Safe Architecture Toolkit
SAFE
Security
Architecture
Toolkit
June 2021
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Proven Cisco Security with SAFE
A Security-Centric methodology and model
for an effective Security Architecture
• Focuses on addressing Risks and Threats
1. Capability
by identifying required Capabilities through
gap analysis and aligning business priorities
to IT initiatives
• Architectural guidance for using Capabilities 2. Architecture
when building your Places In the Network
• Solution guidance across your organization
using a simplified layered approach which Cisco FP2110
FW-B4123-G
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Security Architecture
Toolkit Overview
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Security Architecture Toolkit Overview
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Security Architecture Toolkit for LucidCharts!
EXA
• Reference Security M PL
E
Architecture
• Cyber BluePrint
Templates
• Customize to your
environments
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Security Architecture Toolkit for Visio!
• Reference Security
Architecture EXA
M PL
• Cyber BluePrint E
Templates
• Customize to your
environments
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
High-level SAFE Graphics
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Capabilities and Flow Endpoints
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Capabilities Flows and Endpoints
1
First, identify the capabilities your customer needs
their network to provide to the business.
Next, you can use the endpoints and capabilities
icons to map the business flows.
Mapping the threats the customer faces onto the
capabilities is the key to SAFE.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Internal Business Flows:
Secure communications for email: CEO sending email to shareholder
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Email Server-
Based Assessment Prevention Analytics Intelligence Malware Visibility Security Based
CEO Security Control Security Shareholder
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Web Server-
Based Assessment Prevention Analytics Intelligence Malware Visibility Application Based
Clerk Security Control Firewall Security Payment Application
\
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Application Web
Based Assessment Prevention Analytics Intelligence Malware Visibility Security
Employee Security Control Website
Client- Identity Posture Firewall Intrusion Flow Threat Anti- Tagging Posture Identity Client-
Based Assessment Prevention Analytics Intelligence Malware Assessment Based
Expert Security Security Colleague
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Third-Party Business Flows:
Secure remote access for third party: Connected device with remote vendor support
DNS Identity Firewall Intrusion Flow Threat Anti- Tagging Virtual Posture Identity Client-
Security Prevention Analytics Intelligence Malware Private Assessment Based
Thermostat Network Security Remote Technician
Secure remote access for employees: Field engineer updating work order
Client- Identity Posture Virtual Firewall Intrusion Flow Threat Anti- Tagging Distributed Web Server-
Based Assessment Private Prevention Analytics Intelligence Malware Denial Application Based
Engineer Security Network of Service Firewall Security Workflow Application
Protection
Secure east-west traffic for compliance: PCI compliance for financial transactions
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Capabilities Flows
Customer Business Flows:
Secure web access for guests: Guest accessing the Internet for comparative shopping
Secure web access for guests: Guest accessing the Internet to watch hosted video
DNS Wireless Wireless Firewall Intrusion Flow Threat Anti- Tagging Distributed Application Web Server-
Security Intrusion Rogue Prevention Analytics Intelligence Malware Denial Visibility Application Based
Guest Prevention Detection of Service Control Firewall Security Website
Protection
Identity Firewall Intrusion Flow Threat Anti- Tagging Distributed Application Web Server-
Prevention Analytics Intelligence Malware Denial Visibility Application Based
Customer of Service Control Firewall Security E-commerce
Protection
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Master Endpoints
•Use these endpoints to further customize your SAFE capabilities flows.
Industry-specific endpoints are provided on the following slides.
CEO Shareholder Guest Server Customer Guest Salesperson Shareholder Server Server Automated
Process
Manager Manager Salesperson Technician Server Clerk Server Customer Technician Remote Server Building
Employee Controls
Subject Matter Remote Remote Video Server Video CEO Shareholder Customer Manager Clerk Guest Subject
Expert Colleague Employee Surveillance Camera Matter Expert
Technician Automated Server Building Building Remote Secure Server Server Building Building
Remote
Technician Process Controls Controls Employee Partner Controls Controls
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Workshop Sample Slides
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure Web Access
ENDPOINT
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure Web Access – Gap Analysis
ENDPOINT
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Secure Web Access - Cisco Recommendation
ENDPOINT
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Workshop
https://cisco-safe.ideas.aha.io
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architectures
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Architecture Diagrams
2
SAFE architecture diagrams
convey the network structure at
a high level without naming
specific products. Architectures
can also reference capabilities.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Building SAFE Architectures
Architecture Diagram Components
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
The following architecture diagrams
are best-practice references for each
Place in the Network (PIN).
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Small Branch Architecture
Secure Web
Customer
browsing prices Mobile Wireless
Device Access Point Comparative
Shopping Website
Secure Applications
Secure Communications
Remote Colleague
Third-party Technician
Secure Third Parties accessing logs
Secure Web
Secure Applications
Secure Communications
Remote Colleague
Third-party Technician
Secure Third Parties accessing logs
Secure Web
Product Information
Website
Guest Wireless
Secure Applications
Clerk processing Corporate Switch Distribution Firewall Switch Router Payment Processing
credit card Device Switch
Secure Communications
Remote Colleague
Subject Matter
Expert Employee Switch Communications
Phone Manager
Third-party Technician
Secure Third Parties accessing logs
Secure Email
Shareholder receiving
email from CEO
Guest Wireless
Secure Web
Employee Corporate Switch Distribution Core Switch Firewall Switch Router Wholesaler Website
browsing Device Switch
Secure Communications
Remote Colleague
Third-party Technician
accessing logs
Secure Third Parties
Building
Controls Environmental Blade Server Communications
Controls Manager
WAN Architecture
NETWORK
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Third-party
Technician
Field Engineer
submitting
Wholesaler
Website
Shareholder
receiving Email
Comparative
Shopping
Data Center Architecture
accessing logs work order from CEO Website
East/West
Traffic
Wireless Firewall Controller Load Balancer Secure Server Database
TO EDGE Controller Appliance
Payment
Processing
Communications Firewall Leaf Switch Spine Switch Leaf Switch Secure Server Payment
Manager Application
Software-defined
Shareholder
CEO sending
email to
Emails
Shareholders
Identity Firewall Load Balancer Secure Server Communication
Server Appliance Services
Guest
browsing
Services Core Distribution Access Endpoints Business
TO WAN
Use Cases
Employee
browsing
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Edge Architecture
NETWORK
TO INTERNET TO ENTERPRISE
CORE
Shareholder receiving
email from CEO
Web Security Switch Firewall Internal
External CEO sending
Enterprise email to Shareholders
Wholesaler
Website
Payment Employee
Router Switch Firewall Switch Load Balancer Switch Secure Server Application Switch browsing
Appliance
Customer DMZ
making purchase
Workflow
Application
Firewall
Field engineer
submitting work order
VPN
Building
Controls
Third-party Technician
accessing logs VPN Switch SD WAN
Concentrator
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cloud Architecture
East/West
Traffic
Anti-Malware Identity
Database Authorization
Firewall vSwitch Storage Server
Virtual Appliance Zone
vRouter vSwitch
Anomaly
Detection
Workflow
Automation
TO INTERNET Application
Visibility Workflow
Firewall vSwitch Secure Server Application
Control (AVC) Virtual Appliance
Customer
making purchase Shareholder
Emails
Hosted
Firewall Load vSwitch Secure Server E-Commerce
Virtual Appliance Balancer
Technician
submitting task
Services Business
Use Cases
Guest browsing
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Design Diagrams
3
the desired security capabilities of a particular
network.
The following design diagrams are best-
practice references for selected Places in the
Network (PINs).
Area
Represents an area
Design Icon within the network
CRITICAL
for
Device Name &
Network Flow Line Model
• Breach Defense IP Address
Device Port
• Troubleshooting
• Compliance HA Annotation
Network Border
Border is used to group
a complete network or a
collection of areas within
a network.
Area Title
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
The following design diagrams
are best-practice references for
each Place in the Network
(PIN).
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Medium Branch Design
TRUNK
MGMT VLAN
SJC GD7 WDATA VLAN G0/1 - Gateway Trunk
Guest Device VOICE VLAN
DHCP: 172.16.1.5/24 GUEST VLAN
MANAGEMENT VLAN
IP: 10.2.1.3/24
Guest Wireless UMBRELLA-SUB DATA VLAN
SJC FP1 SJC UCS1
Wireless SSID: Guest IP: 10.2.2.3/24
L-FPR4351-TAMC UCS-E160S-M3
IP: 10.2.10.5/24/24 IP: 10.2.11.5/24 WDATA VLAN
IP: 10.2.3.3/24
PCI VLAN
SJC PoS2 SJC WS1 IP: 10.2.4.3/24
UCS-E 2/0/0 UCS-E 1/0/0
Branch Point of Sale WS-C3650-48PQ-S VOICE VLAN
G1/11
STATIC: 10.2.4.5/24 IP: 10.2.1.11/24 IP: 10.2.5.3/24
FP-AMP-LC VENDOR VLAN
Secure Applications UMBRELLA-SUB P0 G1/5 G1/48 G0/1 G3/0/1
Host Firewall PCI VLAN TRUNK IP: 10.2.6.3/24
WAN
IP: 198.51.100.91/24 GUEST VLAN
G1/2 SJC ISR1 IP: 172.16.1.3/16
ISR4351-K9
HSRP (.1)
IP: 10.2.255.7/32
TRUNK
MGMT VLAN
SJC GD7 WDATA VLAN G0/1 - Gateway Trunk
Guest Device VOICE VLAN
DHCP: 172.16.1.5/16 GUEST VLAN
MANAGEMENT VLAN
IP: 192.168.1.3/24
Guest Wireless UMBRELLA-SUB DATA VLAN
Wireless SSID: Guest IP: 192.168.2.3/24
WDATA VLAN
IP: 192.168.3.3/24
SJC FP1 PCI VLAN
L-FPR4451-TAMC IP: 192.168.4.3/24
SJC PoS2 SJC WS5 SJC WS1 IP: 10.3.1.41/24
Branch Point of Sale WS-C3650-48PQ-S WS-C3650-48PQ-S VOICE VLAN
G1/11 G3/41 E1/7
STATIC: 10.3.4.5/24 IP: 10.3.1.21/24 IP: 10.3.1.11/24 IP: 192.168.5.3/24
FP-AMP-LC VENDOR VLAN
Secure Applications UMBRELLA-SUB P0 E1/2 G1/1 G1/5 G1/48 E1/2 E1/1 G0/1 G3/0/1
Host Firewall PCI VLAN TRUNK IP: 192.168.6.3/24
WAN
TRUNK
IP: 198.51.100.91/24
GUEST VLAN
T1/1-4 T1/5-7 E1/8 SJC ISR1 IP: 172.16.1.3/16
ISR4351-K9
HSRP (.1)
IP: 192.168.255.11/32
SJC FP2
L-FPR4451-TAMC
SJC DT4 SJC PH2 SJC WS4 SJC WS2 SJC ISR2
WS-C3650-48PQ-S
IP: 10.3.1.42/24
ISR4351-K9 G0/1 - Gateway Trunk
Corporate Computer CP-9951-C-K9 WS-C3650-48PQ-S T1/1-4 E1/8
DHCP: 10.3.2.5/24 DHCP: IP: 10.3.5.5/24 IP: 10.3.1.22/24 IP: 10.3.1.12/24 IP: 192.168.255.12/32 MANAGEMENT VLAN
FP-AMP-LC IP: 192.168.1.2/24
Secure Communications UMBRELLA-SUB P1 P0 E1/2 G1/1 G1/6 G1/48 E1/2 E1/1 G0/1 G3/0/2 DATA VLAN
Host Firewall TRUNK TRUNK TRUNK WAN IP: 192.168.2.2/24
Data VLAN
G3/41 E1/7 IP: 198.51.100.92/24
Voice VLAN G1/10 T1/5-7 WDATA VLAN
AIR-CTVM-K9 Web Security
E1/1
IP: 10.3.1.51/24 IP: 10.3.1.61/24 IP: 192.168.3.2/24
PCI VLAN
E1/0 IP: 192.168.4.2/24
SJC CTRL8 SJC WS3 VOICE VLAN
Building Controls WS-C3650-48PQ-S SJC UCS: 1-3 Unified
IP: 192.168.5.2/24
STATIC: 10.3.6.5/24 IP: 10.3.1.23/24 UCS-E160S-M3 Communications
IP: 10.3.11.5/24 Manager VENDOR VLAN
Secure Third Parties E1/2 G1/1 IP: 10.3.11.6/24 IP: 10.3.5.51/24 IP: 192.168.6.2/24
IP: 10.3.11.7/24
Vendor VLAN GUEST VLAN
IP: 172.16.1.2/16
SJC SW1
C9404R T1/5 E1/1 E1/2 G3/0/1 G3/0/1
SJC PoS2 IP: 10.10.1.11/24
Branch Point of Sale WAN
STATIC: 10.10.2.5/24 E0 G0/1 T1/1-4 E1/3 SJC ISR1 IP: 198.51.100.91/24
SJC
Secure FP-AMP-LC
UMBRELLA-SUB P0 FPR3 E1/8
G1/4 G1/1 ISR4431-K9
IP: 10.10.255.21/32
Web Host Firewall DATA VLAN SJC WC3 FP2130-X
IP: 10.10.1.43/24
AIR-CT5520-K9 E1/8
IP: 10.10.1.53/24 E1 G0/2 SJC ISR2
G2/4 G2/1 ISR4431-K9
T1/1-4 E1/4
IP: 10.10.255.22/32
SJC SW2 SJC SSW1
C9404R T1/5 E1/1 E1/2 C9300-24U-A G3/0/1 G3/0/2
SJC DT4 SJC PH2 SJC SW6 IP: 10.10.1.12/24 IP: 10.10.1.8/24
Corporate Computer CP-9951-C-K9 C9300-24UX-A G0/1 G2/1 SJC WAN
IP: 10.10.1.24/24 G2/11 T1/1-4 E1/3 IP: 198.51.100.92/24
DHCP: 10.10.2.6/24 DHCP: 10.10.5.5/24 T1/7
FP2
Secure FP-AMP-LC
UMBRELLA-SUB P1 P0 G0/21-24 G0/2 G2/12 G2/3
FP4150-X
IP: 10.10.1.42/24
Communication Host Firewall
TRUNK
E1/6 E1/6
Building 1
Bottom
Floor
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public *Diagrams available on LucidCharts
Campus Design: Additional Floor and Building
SJC LT3 SJC AP3-5
C9120AXE-A WSA-S390-K9 AIR-CT5520-K9
Corporate Laptop
DHCP: 10.11.3.5/24 IP: 10.11.1.203-205/24 IP: 10.10.1.61/24 || 10.10.1.62/24 IP: 10.10.1.51/24 || 10.10.1.52/24
SJC WSec1 SJC WSec2 SJC WC2 SJC WC3
Secure FP-AMP-LC
UMBRELLA-SUB
Wireless SSID: Employee
SJC SW1
C9407R T1/5 E1/1 E1/2 G3/0/1 G3/0/1
SJC DT3 IP: 10.10.1.11/24
Corporate Computer WAN
STATIC: 10.11.2.5/24 E0 G0/1 E1/3 IP: 198.51.100.91/24
SJC
T1/1-4 T1/8 SJC ISR1
Secure FP-AMP-LC
UMBRELLA-SUB P0 FPR3 E1/8 G1/4 G1/1 ISR4431-K9
L0 IP: 10.10.255.21/32
Web Host Firewall DATA VLAN FP2130-X
IP: 10.11.1.41/24
SJC WC3 E1/8
AIR-CT5520-K9 E1 G0/2 SJC ISR2
G2/4 G2/1 ISR4431-K9
IP: 10.11.1.51/24 T1/1-4 E1/4
L0 IP: 10.10.255.22/32
SJC SW2 SJC SSW1
C9407R T1/5 E1/1 E1/2 C9300-24UX-A G3/0/1 G3/0/2
SJC DT4 SJC PH2 SJC SW6 IP: 10.10.1.12/24 IP: 10.10.1.8/24
Corporate Computer CP-9951-C-K9 C9300-24UX-A SJC WAN
G0/1 G2/11 T1/1-4 G2/1 IP: 198.51.100.92/24
DHCP: 10.11.2.6/24 DHCP: 10.11.5.5/24 IP: 10.11.1.24/24 T1/7 T1/8 E1/3
FP2
Secure FP-AMP-LC
UMBRELLA-SUB P1 P0 G0/21-24 G0/2 G2/12 G2/3
FP4110-X
IP: 10.10.1.42/24
Communication Host Firewall
TRUNK
E1/6 E1/6
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
To Additional Floor: Next Slide To Additional Building: Next Slide
Campus Design: Additional Campus Design: Additional From Additional Building
From Additional Floor
Floor Building
SJC LT13 SJC AP6-8
Corporate Laptop C9120AXE-A SJC AP25-28
DHCP: 10.11.3.13/24 IP: 10.11.1.206-208/24
SJC LT23
Corporate Laptop C9120AXE-A
Secure FP-AMP-LC Wireless SSID: Employee DHCP: 10.12.3.23/24 IP: 10.12.1.225-8/24
UMBRELLA-SUB
Email Host Firewall
Secure FP-AMP-LC Wireless SSID: Employee
UMBRELLA-SUB
Wireless SSID: Guest
G0
Email Host Firewall
Wireless SSID: Guest
G0
E1 G0/2
SJC FPR21
FP2130-X
SJC DT14 IP: 10.12.1.51/24
Corporate Computer SJC DT24 SJC PH2 SJC SW24
DHCP: 10.11.2.14/24
Corporate Computer CP-9951-C-K9 C9300-24UX-A
Secure FP-AMP-LC DHCP: 10.12.2.24/24 DHCP: 10.12.5.12/24 IP: 10.12.1.24/24
G0/1 G2/11 T1/1-4 G2/1
UMBRELLA-SUB P1
Communication Host Firewall TRUNK Secure FP-AMP-LC
UMBRELLA-SUB P1 P0 G0/21-24 G0/2 G2/12 G2/3
Data VLAN Communication Host Firewall
Voice VLAN TRUNK
Data VLAN G0/3 G2/10 SJC T1/5
Voice VLAN SW22
C9407R
IP: 10.12.1.22/24
SJC CTRL18
Building Controls SJC CTRL28
STATIC: 10.11.6.18/24 Building Controls
Secure STATIC: 10.12.6.28/24
Third Parties Vendor VLAN
Secure
Third Parties Vendor VLAN
WAN-S-3 SFO-FS-23
Virtual Switch Stack E1/7 E0 ST-FS4210-K9
C9300-24-A/2 IP: 10.16.200.41/24 IP: 10.16.99.23/24
TO THE TO THE
ENTERPRISE ENTERPRISE
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
CORE
Services CORE
Data Center Design
SFO SIEM-
SFO NF-EP-1 SFO NF-UDP-1
L-SW-EL-XY-S8 L-ST-UDP-VE-K9 1 SFO FTD-C1a-m
IP: 10.16.41.23/24 IP: 10.16.41.24/24 L-SIEM
IP: 10.16.41.91/24 FPR9K-SM48-FTD-BUN
SFO A-SW-5
SFO A-SW-3 IP: 10.16.67.11-22/24 N9K-C93240YC-FX2
N9K-C93240YC-FX2 IP: 10.16.68.25/24 E1/1-4
IP: 10.16.68.23/24 E1/20-21 E1-2 SFO LB-1 E1-2 E1/20-21 E1/5-8
10.16.11.10/3 RW-NG6420 E1/9-12 E1/1-4 SFO B-SRV-1a-h
E1/22-23 E3-4 E3-4 E1/22-23
0
IP: 10.16.69.11/24 E1/13-16 UCSB-5108-AC2
SFO C-SRV-9 SFO C-SRV-11 E1/45-46 E1/24-25 E1/24-25 E2/1-4 IP: 10.16.61.111-118/24
UCSC-C240-M5 UCSC-C240-M5 E1/47-48 E1/26-27 E1/26-27 E1/20-21
IP: 10.16.42.109/24 IP: 10.16.42.111/24 10.16.12.10/3 E1-2 SFO LB-2 E1-2 E1/31-34
E0 E1 E0 E1
0 E1/41-42
E3-4 RW-NG6420 E3-4
E1/41-42 E1/1-4 SFO B-SRV-2a-h
E1/43-44 E1/43-44 E1/35-37
IP: 10.16.69.12/24 E2/1-4 UCSB-5108-AC2
IP: 10.16.61.121-128/24
SFO WLC-G1 SFO NS-1 E1-2 SFO TLS-1 E1-2 SFO B-SRV-3a-h
UCSC-C240-M5 UV-APP4000 E1/1-4 E1/1-4
U9800-80-K9 E3-4 E3-4 UCSB-5108-AC2
IP: 10.16.41.81/24 IP: 10.16.1.1/24 E1/20-21 IP: 10.16.69.21/24 E1/20-21 E1/5-8 E2/1-4
10.16.11.14/3
E1/22-23 E1/9-12 SFO A-SW-6 IP: 10.16.61.131-138/24
E1/22-23
SFO LOG-1 E0 E0 SFO NF-CON-1 SFO FS-3
0
E1/45-46 E1/24-25 E1-2 SFO TLS-2 E1-2 E1/13-16
UCSC-C240-M5 ST-SMC2210-K9 ST-FS4210-K9 UV-APP4000
E1/24-25 N9K-C93240YC-FX2
E1/1-4 SFO B-SRV-4a-h
E1/47-48 E1/26-27 E3-4 E3-4 E1/26-27 E1/20-21 IP: 10.16.68.26/24
IP: 10.16.41.51/24 IP: 10.16.41.31/24 IP: 10.16.99.113/24 10.16.12.14/3 IP: 10.16.69.22/24 E2/1-4 UCSB-5108-AC2
SFO NF-FC- E0 E0
0 E1/41-42 E1/41-42 E1/31-34 IP: 10.16.61.141-148/24
1 SFO ISE-1 SFO A-SW-4 E1/43-44 E1/43-44 E1/35-37
SNS-3655-K9 N9K-C93240YC-FX2 SFO C-SRV-13
ST-FC5210-K9
IP: 10.16.41.21/24 IP: 10.16.41.61/24 E1-2
IP: 10.16.68.24/24 UCSC-C240-M5
E0 E0 E1 E1/41-42 E1/41-42 E3-4
IP: 10.16.61.213/24
E1/43-44 E1/43-44 E0 E1
SFO CORE-1 SFO A-SW-2 SFO SAN-1
SFO DSW-1 E1/45-46 E1/45-46 E1-4
E2/11
E2/12
E2/10
E2/13
E2/14
E2/15
E2/16
E2/9
E4/3-4 010.16.12.13/3 ed
E3/4-5 E4/4-5
E1/5-6 E2/3-4 010.16.12.17/3
E2/2-3 E3/2-3
10.16.12.6/3 10.16.12.5/3
SFO DSW-2 0 0
E3/1
E2/1-2 010.16.12.21/3 SFO LB-3 SFO FSW-1 SFO FTD-C-2a-c
SFO CORE-2 E4/1-2 0
E2/11
E2/12
E2/10
E2/13
E2/14
E2/15
E2/16
RW-NG6420 FPR9K-SM48-FTD-BUN
E2/9
N9K-C9504-10GE N9K-C93240YC-FX2
IP: 10.16.99.22/24 N9K-C9504-10GE IP: 10.16.89.11/24 IP: 10.16.88.11/24 IP: 10.16.87.11-13/24
IP: 10.0.0.1/32 SFO B-SRV-5a-h
E1-2 E1-2 E1/1-4
E3-4 E3-4 E2/1-4 UCSB-5108-AC2
E0 E0 E1 SFO FSW-3 IP: 10.16.81.151-158/24
SFO NF-FC- SFO ISE-2 APP1 VLAN UCS-FI-6332-16UP
IP: 10.16.2.1/24 IP: 10.16.88.13/24 E1/1-4
E1/1-4
SFO B-SRV-6a-h
2 E0 E0
SNS-3655-K9 10.16.11.18/3 E1/1-2 E1/5-6 APP2 VLAN E1/5-8 UCSB-5108-AC2
ST-FC5210-K9 IP: 10.16.41.61/24 E2/1-4
IP: 10.16.41.22/24 0 E1/45-46 E1/41-42 IP: 10.16.3.1/24 E1/41-42 E1/9-12 IP: 10.16.81.161-168/24
SFO FS-4 10.16.12.18/3
0 E1/47-48 E1/43-44 PCI VLAN E1/43-44 E1/13-16
SFO LOG-2 SFO NF-CON-2 ST-FS4210-K9 E1/7-8
IP: 10.16.4.1/24
E1/20-21 SFO B-SRV-7a-h
IP: 10.16.99.114/24 E1/3-4 HIPAA VLAN E1/1-4
UCSC-C240-M5 E0 E0 ST-SMC2210-K9 T1/1-4 UCSB-5108-AC2
IP: 10.16.41.52/24 IP: 10.16.5.1/24 FC1-4 E2/1-4
IP: 10.16.41.32/24 L1-L2 IP: 10.16.81.171-178/24
VM2 VLAN
SFO WLC-G2 SFO NS-2 IP: 10.16.81.1/24
SFO B-SRV-8a-h
U9800-80-K9 UCSC-C240-M5 SAN2 VLAN
L1-L2 E1/1-4
IP: 10.16.41.82/24 IP: 10.16.1.2/24 IP: 10.16.82.1/24 E2/1-4 UCSB-5108-AC2
T1/1-4 E1/1-4
LB2 VLAN IP: 10.16.81.181-188/24
10.16.11.22/3 E1/1-2 E1/5-6 IP: 10.16.89.1/24 E1/5-8
E0 E1 E0 E1 0 E1/45-46 E1/43-44 E1/43-44 E1/9-12
SFO C-SRV-10 SFO C-SRV-12 10.16.12.22/3
0 E1/47-48 E1/41-42
FP2 VLAN
IP: 10.16.87.1/24 E1/41-42 E1/13-16
SFO C-SRV-14
UCSC-C240-M5 UCSC-C240-M5 E1/1-4 UCSC-C240-M5
E1/3-4 E1/7-8 MGMT VLAN E1/20-21
IP: 10.16.42.110/24 IP: 10.16.42.112/24 IP: 10.16.81.214/24
IP: 10.16.88.1/24
SFO FSW-4 FC1-4
UCS-FI-6332-16UP
E1-2 E1-2 IP: 10.16.88.14/24 FC1-4 SFO SAN-2
E3-4 E3-4 FC5-8 NAP-FAS8020
SFO SIEM- IP: 10.16.82.102/24
SFO FMC-1 SFO MSO-1a-c SFO LB-4 SFO FSW-2
FS-VMW-SW-K9 ACI-MSITE-VAPPL=
2 SFO FTD-C-2d-f
L-SIEM RW-NG6420 N9K-C93240YC-FX2 FPR9K-SM48-FTD-BUN
IP: 10.16.41.9/24 IP: 10.16.41.11-13/24 IP: 10.16.41.92/24
IP: 10.16.89.12/24 IP: 10.16.88.12/24 IP: 10.16.87.14-16/24
Distri
Servi All rights reserved. Cisco Public
© 2021 Cisco and/or its affiliates. Acce Endp
Core butio
ces ss oints
DMZ ESA-1
IP:
ESA-C690
DMZ ESA-2
IP:
ESA-C690
DMZ WSA-1
IP:
WSA-C690
DMZ WSA-2
WSA-C690
IP:
DMZ WC-1
AIR-CT5520
IP:
DMZ WC-2
AIR-CT5520
IP:
Edge Design
192.168.99.151/24 192.168.99.152/24 192.168.99.161/24 192.168.99.162/24 192.168.99.171/24 192.168.99.172/24
E1 E0 E1 E0 E0 E0 E1 E0 E1 E0
VLAN 103 VLAN 101 VLAN 104
VLAN 102 VLAN 105
E1/10 E1/9 E1/8 E1/7 E1/6 E1/10 E1/9 E1/8 E1/7 E1/6 DMZ UCSB-1 DMZ UCSB-2
5108 w/UCS-FI-M-6324 5108 w/UCS-FI-M-6324
IP: IP:
192.168.99.81/24 192.168.99.82/24
DMZ SW-8 Peer Link DMZ SW-7
N3K-C3172PQ-10GE
IP:
N3K-C3172PQ-10GE
IP:
192.168.99.108/24 E1/5 E1/1-4 E1/1-4 E1/5 192.168.99.107/24
Peri
mete TRUNK
HA 192.168.101.1/24|.102.1/24|.103.1/24|.104.1/24|.105.1/24
r E1/2 E1/2
SJC FPR- SFO FS-1
Servi 1 E1/8 E1/8
DMZ FPR-2
FP-9300-24
Web Server-1 Web Server-2 Web Server-2
ST-FS4210-K9
ces FP-9300-24
M0: 192.168.99.21/24 M0: 192.168.99.22/24
IP:
10.16.99.111/24
E1/1 E1/3 E1/1 E1/3 E0
HA IP 192.168.200.51/24
VLAN 21
IP 203.0.113.1/24
TO THE
HSRP
TO THE
ENTERPRISE
HSRP
N3K-C3172PQ-10GE
N3K-C3172PQ-10GE
4 E1/5
192.168.99.103/24
IP:
192.168.99.104/24
IP:
DMZ SW-3
DMZ SW-4
G3/0/1 HA IP 203.0.113.41/24 E1/8
WAN VLAN 21 E1/6
IP: 198.51.100.92/24 VLAN 22 SFO DSW-2
E1/7 N9K-C9504-10GE
IP:
10.16.99.22/24
E0 E1 E0 E1
HA IP 203.0.113.21/24 HA IP 203.0.113.31/24
DMZ-WAN-3 DMZ-WAN-4
HA IP 192.168.200.31/24 E0
DMZ RA-1 DMZ RA-2 IP:
vSDWAN IP:
vSDWAN
FP-4145 E1/1 E1/1 FP-4145 E1/1 E1/3 E1/1 E1/3 192.168.2.11/24 192.168.2.11/24 SFO FS-2
M0: 192.168.99.31/24 M0: 192.168.99.32/24 ST-FS4210-K9
IP:
E1/8 E1/8 E1/8 E1/8 10.16.99.112/24
DMZ FPR-5 DMZ FPR-6
FP-9300-40 FP-9300-40 G1/0/2 G1/0/1 G1/0/2 G1/0/1
E1/2 E1/2 M0: 192.168.99.25/24 E1/2 E1/2 M0: 192.168.99.26/24 SSL-VIP-1 WebAppFW-1 Loadbalancer-1
VLAN 301
HA IP 192.168.30.21/24 HA IP 192.168.30.1/24 | 192.168.32.1/24 HSRP
VLAN 300 TRUNK VLAN 302
HSRP
DMZ RAD-1 DMZ RAD-2
RW-ALT-5412 RW-ALT-5412
IP: IP:
VPN 192.168.99.51/24 192.168.99.52/24 DMZ
DMZ SW-10 E1/8 E1/7 E1/6 DMZ SW-9
E1/9 E1/8 E1/7
N3K-C3172PQ-10GE Peer Link N3K-C3172PQ-10GE
M0: 192.168.99.110/24 M0: 192.168.99.109/24
E1/9 E1/1-4 E1/1-4 E1/6
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cloud Design Diagrams
Cloud Provider Standardized notation is used in combination with SAFE iconography
Cloud Provider
Resource Segment
Domain Address
Network Border
Border is used to group
a complete network or a
collection of areas within
a network.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public Service provider cloud icons can be found in the LucidCharts shapes library, as well as the providers websites (links in footnote).
AWS Cloud AWS
Availability Zone: us-west-2a
Cloud
Virtual Private Cloud
10.20.15.11\24 10.20.17.11\24
10.20.11.11\24 10.20.11.21\2 10.20.11.11\24 Auto Auto
4
Scaling Scaling Read
Left:
Amazon Web Services
Tetration AM
Replica
Web
P
Application
Firewall IaaS Design with 3-Tier Web Application
wp.cisco.com
wp-lb-123456789.us-west-2.elb.amazonaws.com
Application
Load
Balancer Enterprise Enterprise Enterprise
Load Load Load
Balancer Balancer Balancer
Master
AWS Cloud
Availability Zone: us-west-2a
wp.cisco.com
wp-lb-123456789.us-west-2.elb.amazonaws.com
Application
Load
Balancer Enterprise Enterprise Enterprise
Load Load Load
Balancer Balancer Balancer
Master
Gateway
WAF IaaS Design with 3-Tier Web Application
Load Load
Traffic Balancers Balancers
Manager L7 LB
Profiles
Microsoft Azure
Virtual Networks
10.21.12.11\24 10.21.12.21\2 10.21.14.21\24 10.21.14.31\24 10.21.14.11\24 10.21.16.11\24 10.21.18.11\24
4
Tetration AM
P
Application
Load Load Load Load
Balancer Balancers Balancers Balancers
10.21.12.22\24 10.21.14.22\24
10.21.12.12\24
NG 10.21.14.32\24 10.21.14.12\24 10.21.16.12\24 10.21.18.12\24
DDOS SD-WAN Web App FW Web Server App Server RDS DB
RW-vDOS-M5 vEdge or vMX FW Standard_D16s_v3 Standard_D16s_v3 EC2-M5 Instance
FTDv
Tetration AM
Left:
Google Cloud Platform
P
Cloud
Cloud
Router
Armor
IaaS Design with 3-Tier Web Application
Tetration AM
P
Cloud
Router
10.22.12.22\24 10.22.14.22\24
10.22.12.12\24
NG 10.22.14.32\24 10.22.14.12\24 10.22.16.12\24 10.22.18.12\24
DDOS SD-WAN Web App FW Web Server App Server Data Base
RW-vDOS-M5 vEdge or vMX FW n1-standard-16 n1-standard-16 n1-standard-16 Cloud SQL
FTDv
Zone: us-central1b
Cloud
Cloud and/or
© 2021 Cisco InternetAll rights reserved. Cisco Public
its affiliates.
VPN Interconnect Gateway
SAFE Icon Library
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Icon Library
1. Capability
3. Design
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Human Icons
Users: Rogue: Identity: Identity Directory • Cisco Identity Services Engine Appliance
Employees, third parties, Attackers accessing restricted Identity-based access.
customers, and administrators. information resources. • Cisco Identity Services Engine Virtual Appliance
• Cisco Duo
Identity
Identity
Directory
Multi-Factor
Authentication
Rogue: Federation:
Attackers accessing restricted Identity-based on Federated
information resources. Identity.
Federation
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Humans Icons
Identity
Directory
Identity
Directory
Identity
Directory
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Clients: Malware: Client-Based Security: Corporate Device • Cisco Advanced Malware Protection for Endpoints
Devices such as PCs, Viruses, malware, and attacks This capability represents
laptops, that compromise systems. multiple types of security • Cisco Umbrella
smartphones, tablets. software to protect clients. • Cisco AnyConnect
• Built-in OS Firewall or Partner Products
Client-Based
Workstation Corporate Device
Security
Anti-Malware
Anti-Virus
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Clients: Exploit Redirection: Personal Firewall Corporate Device • Built-in OS Firewall
Devices such as PCs, Unauthorized access and
laptops, malformed packets connecting • Partner Products
smartphones, tablets. to client.
Firewall
Workstation Corporate Device
Phish Link: Cloud Security: • Cisco Umbrella - Secure Internet Gateway (SIG)
Redirection of user to malicious Combination icon representing
web site. several security capabilities • Cisco AnyConnect Agent
provided by the cloud. • Cisco Cloudlock
• Cisco Web Security Appliance
• Cisco Meraki MX
Cloud Security
• Cisco Firepower with URL Filtering
• Cisco Viptela SD-WAN
Botnets DDOS: Posture Assessment: • Cisco AnyConnect Agent
Compromised devices Client endpoint
connecting to infrastructure. compliance verification • Cisco Identity Services Engine
and authorization. • Cisco Meraki MDM
Posture
Assessment
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Devices Icons
Voice: Rogue: Phone • Cisco Unified Communications
Phone Attacker accessing private
information. • Cisco IP Phones
phone
Phone
sensor
Environmental
Controls
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Devices Icons
Standardized Infrastructur
System e
Images Redundancy
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Devices Icons
Vehicle Vehicle Vehicle IOT IOT IOT IOT IOT IOT IOT
Commercial Consume Flight Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint Endpoint
r Actuator Engine Gauge Gauge HMI PLC Pump
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Wired Network: Exploit Redirection: Firewall: Firewall • Cisco Adaptive Security Appliance (ASA)
Physical network infrastructure; Unauthorized access and Stateful filtering and protocol
routers, switches, used to malformed packets connecting inspection. • Cisco Firepower Appliance
connect access, distribution, to client. • Cisco Next Generation Firewall
core, and services layers
together • Cisco Next Generation Firewall Virtual
Firewall
Firewall
L2/L3 Router
Network
Exploit Redirection: Intrusion Prevention: Intrusion Prevention • Cisco Adaptive Security Appliance (ASA)
Attacks using worms, viruses, Blocking of attacks by
or other techniques. signatures and anomaly • Cisco Firepower Appliance
analysis. • Cisco Next Generation Intrusion Prevention System
Fabric Distribution
Switch Switch • Cisco Next Generation Intrusion Prevention System Virtual
Intrusion Prevention
Intrusion
Acces Prevention
s
Switch
Unauthorized Network Access: Tagging: Switch • Cisco Adaptive Security • Cisco Aggregation Services
Lateral spread of infiltration. Policy-based, software-defined Appliance (ASA) Routers
segmentation. • Cisco Firepower Appliance • Cisco Nexus Switches
• Cisco Catalyst Switches • Cisco ACI Fabric
• Cisco Wireless Controller and • Cisco DNA Fabric
Access Points
• Cisco Tetration
• Cisco Identity Services Engine
Tagging
Switch
• Cisco Integrated Services
Routers
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Wired Network: Unauthorized Network Access: Microsegmentation Switch • Cisco Adaptive Security • Cisco Aggregation Services
Physical network infrastructure; Lateral spread of infiltration. Appliance (ASA) Routers
routers, switches, used to • Cisco Firepower Appliance • Cisco Nexus Switches
connect access, distribution,
• Cisco Catalyst Switches • Cisco ACI Fabric
core, and services layers
together • Cisco Wireless Controller and • Cisco DNA Fabric
Access Points
• Cisco Tetration
• Cisco Identity Services Engine
Microsegmentation
Switch
• Cisco Integrated Services
L2/L3 Router Routers
Network
• Cisco Adaptive Security • Cisco Aggregation Services
Appliance (ASA) Routers
• Cisco Firepower Appliance • Cisco Nexus Switches
• Cisco Catalyst Switches • Cisco ACI Fabric
Fabric Distribution
Switch Switch • Cisco Wireless Controller and • Cisco DNA Fabric
Access Points
• Cisco Tetration
• Cisco Identity Services Engine
Microsegmentation
Switch
• Cisco Integrated Services
Acces
s Routers
Switch
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Wireless Network: Malware: Mobile Device MDM Appliance • Cisco Identity Services Engine
Physical network infrastructure; Compromised devices Management (MDM):
access points and controllers connecting to infrastructure. Endpoint access control • Cisco Meraki Mobile Device Management
used to connect mobile devices based on policies.
to the access layer.
Mobile Device
Management (MDM) MDM Appliance
Wireless
Rogue: Wireless Rogue Detection: Wireless LAN Controller • Cisco Catalyst Switches with Unified Access
Unauthorized access and Detection and containment of
disruption of wireless network. malicious wireless devices not • Cisco Wireless Controller and Access Points
controlled by the company. • Cisco Mobility Services Engine
Wireless Rogue
Detection Wireless LAN
Controller
Rogue: Wireless Intrusion Prevention Wireless Access Point • Cisco Catalyst Switches with Unified Access
Attacks on the infrastructure (WIPS):
via wireless technology. Blocking of wireless attacks by • Cisco Wireless Controller and Access Points
signatures and anomaly
analysis.
Wireless Intrusion
Prevention (WIPS) Wireless
Access Point
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Analysis: Malware: Anti-Malware for Networks: Firewall • Cisco Advanced Malware Protection for Networks
Telemetry and analysis of Malware distribution across Identify, block, and analyze
traffic across the enterprise. networks or between servers malicious files and • Cisco Next Generation Firewall
and devices. transmissions. • Cisco Next Generation Firewall Virtual
• Cisco Next Generation Intrusion Prevention System
• Cisco Next Generation Intrusion Prevention System Virtual
Network
Anti-Malware Firewall
Analytic
Engine
Advanced Threat: Threat Intelligence: Threat Intelligence • Cisco Collective Security Intelligence
Zero-day malware and attacks. Contextual knowledge is a capability leveraged
of emerging hazards. by many systems and • Cisco Global Threat Analytics and Encrypted Traffic Analytics
not deployed separately; • Cisco Talos Security Intelligence
there is no dedicated
architecture icon. • Cisco Firepower Management Center
• Cisco Umbrella Investigate
Threat
Intelligence • Cisco AMP Console – Telemetry
• Cisco Stealthwatch Management Console
Exfiltration: Flow Analytics: Flow Sensor Flow Sensors and Collectors: • Cisco NetFlow Generation
Traffic, telemetry, and data Network traffic metadata Appliance
• Cisco Integrated Services
exfiltration from successful identifying security Incidents. Router • Cisco Stealthwatch Flow
attacks. Sensor
• Cisco Adaptive Security
Appliance Analysis:
• Cisco Wireless LAN Controller • Cisco Stealthwatch
Management Console
• Cisco Catalyst Switch
Flow Analytics
Flow Sensor • Cisco Stealthwatch Cloud
• Cisco Nexus Switch
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
WAN: Exfiltration: VPN Concentrator: VPN Concentrator • Cisco Adaptive Security Appliance (ASA)
Public and untrusted Wide Area Traffic, telemetry, and data Encrypted remote access.
Networks that connect to the exfiltration from successful • Cisco Firepower Appliance
company, such as the Internet. attacks. • Cisco Next Generation Firewall
• Cisco Next Generation Firewall Virtual
VPN Concentrator
VPN Concentrator
WAN
Man-in-the-Middle: Virtual Private Network (VPN): SD WAN • Cisco Adaptive Security • Cisco Meraki SD-WAN
Connection of information and Encrypted communication Appliance (ASA)
• Cisco IWAN
identities. tunnels. • Cisco Aggregation Services
• Cisco Next Generation
Routers
Firewall
• Cisco Cloud Services Router
• Cisco Next Generation
• Cisco Integrated Services Firewall Virtual
Router
Virtual Private • Cisco Viptela SD-WAN vEdge
Network (VPN) SD WAN • Cisco Firepower Appliance
Botnets DDOS: DDOS Protection: DDOS Protection Appliance • Cisco Aggregation Services Routers with Radware
Massively scaled attacks that Protection against scaled
overwhelm services. attack forms. • Cisco Firepower Appliance with Radware
• Distributed Denial of Service Technology Partner
Distributed Denial
of Service Protection DDOS Protection
Appliance
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Cloud: Phish Link: Cloud Security: VPN Concentrator • Cisco Umbrella - Secure • Cisco Meraki MX
Security services from the Attacks from malware, Combination icon Internet Gateway (SIG)
• Cisco Firepower with URL
cloud. viruses, and malicious URLs. representing several security • Cisco AnyConnect Agent Filtering
capabilities provided by the
cloud. • Cisco Cloudlock • Cisco Viptela SD-WAN
• Cisco Cloud Services Router
• Cisco Web Security
Cloud Security Appliance
Cloud Security
Cloud
Phish Link: DNS Security: Secure DNS • Cisco Umbrella
Redirection of user to Name resolution filtering.
malicious website.
DNS Security
Secure DNS
CASB
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Icons
Cloud: Redirect Link: Web Security: Web Security • Cisco Umbrella - Secure Internet Gateway (SIG)
Security services from the Infiltration and exfiltration via Internet access integrity
cloud. Web protocols. and protections. • Cisco Web Security Virtual Appliance
• Cisco Meraki URL Filtering
Web Security
Web Security
Cloud
Malware C2: Web Reputation/Filtering: Web Reputation Filtering • Cisco Umbrella - Secure Internet Gateway (SIG)
Attacks directing to a Tracking against URL-based
malicious URL. threats. • Cisco Web Security Virtual Appliance
• Cisco Meraki URL Filtering
Web Reputation/
Filtering/DCS Web Filtering
Redirect Link: Cloud-based Firewall: • Cisco Adaptive Security Virtual Appliance (ASAv)
Unauthorized access and Filter and inspect traffic via the
malformed packets connecting cloud. • Cisco Cloud Services Router
to services. • Cisco Next Generation Firewall Virtual (NGFWv)
Firewall
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Network Icons
Firewall Intrusion Router VPN Concentrator DDOS Identity Web Security Web Filtering Tetration
Prevention Protection Directory Appliance
Firewall IPS Route VPN DDOS Identity Web Security Web Filtering Tetration
r Concentrator Protectio Director Appliance
n y
Tetration
Firewall IPS Route VPN DDOS Identity Web Security Web Filtering
Agent
r Concentrator Protectio Director
n y
Adaptive Firepower
Security Appliance
Appliance
MS Active MS Active
Directory Directory
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SD WAN
Distribution Core Fabric Leaf Spine ACI SD WAN Access Mobile Device Wireless
Access Switch Switch Switch Switch Switch Controller Point Management LAN Controller
Switch (MDM)
Switch
Stack
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Network Icons
Flow Sensor Flow Endpoint UDP Management Secure Firepower
Connector Concentrator Director Console DNS Management
Center
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Applications: Redirect Link: Web Application Firewalling: Web Application Firewall • Web Application Firewall Technology Partner
Application-specific security Attacks against poorly- Advanced application
services. developed applications. inspection and monitoring.
Spying: TLS Encryption Offload: TLS Appliance • Cisco Next Generation Firewall
Theft of unencrypted traffic. Accelerated encryption/
decryption of data services. • Transport Layer Security Offload Technology Partner
TLS Offload
TLS Appliance
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Applications: Phishing: Email Security: Email Security • Cisco Email Security Appliance
Application-specific security Infiltration and exfiltration via Messaging integrity
services. email. and protections. • Cisco Cloud Email Security
Email
Application Email Security
Security
Malware
Sandbox Sandbox
Appliance
Database Disk
Encryption
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Applications: Malware: Server-based Security: Secure Server • Cisco Advanced Malware Protection for Endpoint
Application-specific security Viruses, malware and attacks Combination icon representing
services. that compromise systems. several security capabilities to • Cisco Umbrella
secure the server. • Cisco Tetration
• Built-in OS Firewall or Partner Products
Application Server-Based
Security Secure Server
File
Trajectory
Device
Trajectory
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Rogue:
Applications: API Interface: Application Workspace:
Attackers accessing restricted
Application-specific security
information resources.
services.
Rogue:
Attackers accessing restricted
information resources.
Certificate Authority
Rogue:
Attackers accessing restricted
information resources.
Certificate Services
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Rogue:
Applications: Data Integrity:
Attackers accessing restricted
Application-specific security
information resources.
services.
Device Profiling
Secure API
Gateway Application
Workspace
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Icons
Rogue:
Applications: Secure File Share:
Attackers accessing restricted
Application-specific security
information resources.
services.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Additional Applications Icons
Server Secure Blade Storage Load Wide Area TLS Appliance Application
Server Server Balancer Application Engine Workspace
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Analysis/Correlation: SIEM • Cisco Stealthwatch
Infrastructure systems Security event management of
management and orchestration. real-time information. • Cisco Stealthwatch Cloud
• Cisco Visibility
• SIEM Technology Partner Products
Central Analysis/
Correlation SIEM
Management
Anomaly
Detection
Identity/
Authorization Identity
Directory
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Logging/Reporting: Log Collector • Cisco Stealthwatch
Infrastructure systems Centralized event information
management and orchestration. collection. • Logging Technology Partner Products
Central Logging/
Reporting Log Collector
Management
Monitoring
Monitoring
Name
Resolution Secure
DNS
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: Policy/Configuration: Policy • Cisco Firepower • Cisco Advanced Malware
Infrastructure systems Unified infrastructure Management Center Protection Console
management and orchestration. management and compliance • Cisco Identity Services • Cisco Defense Orchestrator
verification. Engine
• Cisco Tetration
• Cisco DNA Center
• Cisco Security Manager
• Cisco ACI APIC
Time
Synchronization NTP
Vulnerability Vulnerability
Management Management
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Management Icons
Management: SecureX: • Cisco SecureX
Infrastructure systems
management and orchestration.
SecureX
Central
Management
SOAR XDR
SOAR XDR
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Threat Response Icons
Enterprise: Quarantine: Policy • Cisco Firepower • Cisco Tetration
Infrastructure systems, devices, Limit device access to only Management Center
• Cisco Security Manager
services including management designated services. • Cisco Identity Services
and orchestration. Engine • Cisco Prime LMS
Block
Remediate
PNG’
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
s
Additional Management Icons
Secure DNS NTP Monitoring Vulnerability Policy Log SIEM Identity SecureX
Management Collector Directory
MS Active MS Active
Directory Directory
Generic
Appliance
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Tools, Rules and Techniques
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture Toolkit
Be sure to review the Dos and Don’ts of Building a Diagram found on page 87 of this document.
Title Example
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Using Selection Pane
The Selection Pane enables you to view and access layers easily
1. Turn on the Selection Pane
2. Each object in the pane is listed in the hierarchical order (depth) that it is on the slide.
3. Click the eye to make them invisible/visible so you can access objects below them without having
to move them from their position
4. By clicking on an object or group name you can select objects that are hard to grab
5. Once selected, you can change their order via the Arrange menu, or move them with cursor keys
1 2 3 4 5
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
How to draw smooth business flows
By editing the points of a freeform shape you can create smooth consistent corners (steps 1-8).
• Make the line with square turns, click and drag to make each segment (hold shift to constrain)
• Select Edit Shape then Edit Points from the Drawing Tools menu
• Using the gridlines from the View menu, add points before and after (Ctrl+click)
• After adding the new points, then select and delete the corner point
• Stretch handles as appropriate (back to where the corner point was, and the next corner)
to create a smooth arching corner
1 2 3 4
5 6 7 8
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Business Flow Color Palette
Yellow Dark Blue
R255, G202, B5 R92, G114, B182
Green Gray
R113, G190, B73 R187, G189, B190
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Colors & Size
• Capability blue is: RGB-38:169:224 .43” .16”
• Non-security capabilities are gray: RGB-153 .43” .16”
• Architecture green
• Pad: RGB-192:223:173 .63”
• Core: RGB-106:189:70
• Dots: RGB-222:238:212
• Design purple is: RGB-161:83:160
• Solid inside is physical appliance or device. .33”x.38”
• White inside/purple outline is: software/VM/virtual .33”x.38”
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Dos and Don’ts
Do Don’t Do Don’t Do Don’t
Show all flow lines butting Don’t allow flow lines to overlap Use the elements from the toolkit Don’t alter the toolkit elements or
up to the icon. icon. as they have been provided. If create additional components. Center mini capability Don’t place the mini capability icons
elements need to be reduced or icons on the guide outside of the Mini Capability Icon
enlarged, apply the same markers per the Band or in a position that is
reduction/ enlargement over the instructions provided in inconsistent with the guidelines
entire diagram unless otherwise the Architecture Toolkit. provided in the toolkit.
noted in the toolkit.
Keep all flow rules at vertical Don’t angle the flow lines.
or horizontal alignments.
Keep space between Don’t overlap elements.
elements.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
SAFE Solution Toolkits have all the parts
Toolkits available on these platforms:
• Reference
Security
Architecture
• Cyber BluePrint
Templates
• Customize to your
environments
cisco.com/go/safe
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Feedback
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Please submit feedback or ideas related to the SAFE Toolkit, or
requesting a SAFE Workshop at the link below:
https://cisco-safe.ideas.aha.io
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Vector based icon resources
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Threat Icons
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Threat Icons (2021)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Capability Icons
Analysis Anomaly Anti-Malware Anti-Spam Anti-Virus Application Visibility CASB Client-Based Cloud
Correlation Detection Control (AVC) Security Security
DNS
Data Loss Disk Distributed DNS Email Email Firewal Flow Analytics Identity
Prevention Encryption Denial of Security Encryption Security l
(DLP) Service Protection
Intrusion Intrusion Load Balancer Logging/ Malware Microsegmentation Mobile Monitoring Network
Detection Preventio Reporting Sandbox Device Anti-Malware
n Management
(MDM)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Capability Icons
Policy/ Posture Server-Based Tagging TLS Threat Time Virtual Private VPN
Configuration Assessment Security Offload Intelligence Synchronization Network (VPN) Concentrator
Vulnerability Web Web Reputation/ Web Security Wireless Wireless Wireless Rogue
Management Application Filtering/DCS Intrusion Intrusion Detection
Firewall Detection Prevention
System System
(WIDS) (WIPS)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Capability Icons – 2021
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Mini Capability Icons
Use these icons with the architectural icons. Labels are for identification purposes only and should not appear within the architectural icon mats.
DNS
Disk Distributed Denial DNS Email Email Security Firewall Flow Analytics
Federation
Encryption of Service Protection Security Encryption
Secure API Server-Based Secure SecureX SOAR Tagging TLS Offload Threat
Gateway Security File XDR Intelligence
Share
Time Virtual Private VPN Vulnerability Web Application Web Reputation/ Web Security Wireless Intrusion
Synchronization Network (VPN) Concentrator Management Firewall Filtering/DCS Detection System
(WIDS)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Mini Capability Icons - Continued
Use these icons with the architectural icons. Labels are for identification purposes only and should not appear within the architectural icon mats.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Standard and Mini Action Icons
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Attack Surface Icons
Application Application Conference Database Fabric Host Context Infrastructure L2 Switching L2/L3
Optimization Bridge Switching Redundancy Network
L3 Switching Load Balancer Path Control Quality of Routin Secure Standardized Storage User
Service g Server System Images
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Attack Surface Icons - 2021
IOT Endpoint IOT Endpoint IOT Endpoint IOT Endpoint IOT Endpoint IOT Endpoint IOT Endpoint
Actuator Engine Gauge Gauge HMI PLC Pump
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Mini Attack Surface Icons
Application Conference Database Host Context Infrastructure IOT Endpoint IOT Endpoint IOT Endpoint
Application Fabric Switching
Optimizatio Bridge Redundancy Actuator Engine Gauge
n
IOT Endpoint IOT Endpoint IOT Endpoint IOT Endpoint L2 Switching L2/L3 Network L3 Switching Load Balancer Path Control Quality of
Gauge HMI PLC Pump Service
Routing Secure Standardized Storage User Vehicle Vehicle Vehicle Video Voice
Server System Images Commercial Consumer Plane
Wireless
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architectural Icons
Cut and paste mini-capabilities icons (without label copy) and center on the white dots within the icon mats. See the “how to” guide for additional
placement instructions. Use Grey background for Architectures
ACI Controller ACI Leaf ACI Spine Adaptive Security Automated Blade Server
Switch Switch Appliance System
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architectural Icons - 2021
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architectural Icons - Examples
Secure Server Secure Server Wireless Unified Access Wireless LAN Router
Access Point Switch Controller
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design Icons
ACI Controller ACI Leaf Switch ACI Spine Switch Adaptive Security Blade Server Catalyst Data Center
Appliance Switch
L3 Switch Load Balancer Nexus 1kv Nexus Data Nexus Fabric Switch Nexus Switch
Center Switch
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design Icons Actors
Examples
Software / Applications / Virtual Services
VLAN201
HSRP G1/6 VLAN201
T1/1-4
E1/8
Peer
Link
T1/1-4 E1/8
Peer
Link
E1/1-4 E1/1-4
Cisco Cisco Cisco Cloud Cisco Virtual Virtual
AMP AMP Web Security AnyConnect Load Balancer Secure Server
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Design Icons - 2021
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
Identity Phon
Directory e Automated
System
MS Active
Directory
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
Firepower
Firewall Intrusion VPN DDOS Web Application Web Security Web Filtering SD-WAN
Management
Preventio Concentrator Protection Firewall
Center
n
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
DNS
DNS
DNS
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
!
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
Access Distribution Core Fabric ACI Leaf Switch ACI Spine Switch ACI Controller Access Point
Switch Switch Switch Switch
Switch Stack
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets
Server Secure Server Blade Server Storage Load Balancer Wide Area TLS Appliance Wireless LAN Radware
Application Engine Controller Appliance
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Architecture and Design Icon Sets - 2021
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Security Iconography
NGIPS NGFW ISE IDS NBA NAC IAM AMP UTM Firewall
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Security Iconography
WWW
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Technology
Wi-Fi
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
Business
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
People, places, things
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public
IoT Things
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public