This site uses cookies. By continuing to browse the ConceptDraw site you are agreeing to our Use of Site Cookies.

Cisco Security. Cisco icons, shapes, stencils and symbols

The ConceptDraw vector stencils library "Cisco Security" contains 16 symbols of security devices and equipment for drawing the computer network diagrams using the ConceptDraw DIAGRAM diagramming and vector drawing software.

Cisco Network Design. Cisco icons, shapes, stencils, symbols and design elements

Cisco Network Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park provides 14 libraries with 450 ready-to-use predesigned vector objects that can be used for quickly and easily drawing the professional Cisco Network Diagrams.
The vector stencils library "Cisco security" contains 16 symbols of security devices and equipment.
Use it to create the Cisco computer network diagrams using the ConceptDraw PRO diagramming and vector drawing software.
"Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password." [Network security. Wikipedia]
The example "Design elements - Cisco routers" is included in the Cisco Network Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
Cisco security symbols
Cisco security symbols, security management, secure switch, secure server, secure router, secure endpoint, laptop, secure endpoint, PC, secure Catalyst switch, SSC, NAC appliance , Cisco ASA 5500, CS-MARS, ACS,
The vector stencils library Alarm and access control contains 80 symbols of digital proximity equipment, locking hardware, and access control equipment.
"An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition. Alarm devices are often outfitted with a siren." [Alarm device. Wikipedia]
"An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list. To monitor the door position a magnetic door switch can be used. In concept, the door switch is not unlike those on refrigerators or car doors. Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the door." [Access control. Wikipedia]
Use the design elements library Alarm and access control for drawing layout floor plans, blueprints, and wiring diagrams of intrusion systems, time and attendance systems, card and code access control security systems, internal and external security control systems using the ConceptDraw PRO diagramming and vector drawing software.
The shapes library Alarm and access control is included in the Security and Access Plans solution from the Building Plans area of ConceptDraw Solution Park.
Alarm and access control symbols
Alarm and access control symbols, window contact sensor, weatherproof, horn, siren, wall motion sensor, motion sensor, volumetric capacity detector, vibration sensor, shock sensor, vehicle loop detector, user control keyswitch, user control digital keypad, ultrasonic transceiver, turnstile, transformer, traffic arm, strobe, space detection device, smoke detector, slave tape dialer, slave digital communicator, siren, security window screen, security keypad, security door contact, security control unit, security control panel, security card reader, screen alarm, revolving door, remote zone annunciator, receiver, pushbutton, passive infrared, panic button, overhead door contact sensor, door contact sensor, motion detector, microwave transceiver, master intercom, mains supply power source, magnetic lock, security door alarm, line cut monitor, keypad device, keypad, intercom unit, infrasonic, infrared detector, horn, strobe, horn, siren, heat detector, glass break detector, gas detector, foil on glass detector, foil, floor motion sensor, motion sensor, floor mat, flood sensor, exit device, emergency power, emergency battery, electronic lock, electric door strike, electric door opener, dual technology device, driveway sensor, doorbell, door contact sensor, door chime, door buzzer, dial-up remote equipment, control unit, contact switch surface, contact switch flush, card reader, time, attendance, card reader, keypad, card access reader, card access, carbon monoxide detector, CO detector, camera, keypad, camera, intercom, camera, card reader, camera, biometric access reader, biometric access, beam fence disturbance, PIR field of view,
This sample was created on the base of the floor plan with security system device symbols from the website of the California State University, Sacramento. [imet.csus.edu/ imet1/ denyer/ mhs_ denyer/ drafting/ arch_ ch_ 31/ 31-28.jpg]
Legend for the security system hardware includes distribution panel, window-door contact, sonic detector, key pads, heat detectors, smoke detectors.
The example "Security system floor plan" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Security and Access Plans solution from the Building Plans area of ConceptDraw Solution Park.
Security system floor plan
Security system floor plan, window, casement, window contact sensor, water heater, toilet, smoke detector, sink, security control panel, refrigerator, upright freezer, potted plant, pilaster, pedestal sink, overhead door, keypad device, infrasonic, heat detector, glider window, double bi-fold door, door contact sensor, door, countertop, corner counter, cooker, stretchable, built-in, dishwasher, built-in, bath, bi-fold door, bent counter,

Physical Security Plan

ConceptDraw DIAGRAM diagramming and vector drawing software extended with Security and Access Plans Solution from the Building Plans Area of ConceptDraw Solution Park is a powerful software for fast and easy drawing professional looking Physical Security Plan.
The vector stencils library "Cisco security" contains 16 symbols of security devices and equipment for drawing Cisco computer network diagrams.
"Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password." [Network security. Wikipedia]
The symbols example "Cisco security - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Cisco Network Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
www.conceptdraw.com/ solution-park/ computer-networks-cisco
Secure switch
Secure switch, secure switch,
Secure switch, subdued
Secure switch, subdued, secure switch,
Secure router
Secure router, secure router,
Secure router, subdued
Secure router, subdued, secure router,
Secure Catalyst switch
Secure Catalyst switch, secure Catalyst switch,
Secure Catalyst switch, subdued
Secure Catalyst switch, subdued, secure Catalyst switch,
Security management
Security management, security management,
Security management
Security management, security management,
Cisco ASA 5500
Cisco ASA 5500, Cisco ASA 5500,
NAC appliance
NAC appliance, NAC appliance ,
Secure server
Secure server, secure server,
CS-MARS
CS-MARS, CS-MARS,
Secure endpoint (PC)
Secure endpoint (PC), secure endpoint, PC,
Secure endpoint (laptop)
Secure endpoint (laptop), secure endpoint, laptop,
SSC
SSC, SSC,
ACS
ACS, ACS,
HelpDesk

How to Draw a Security and Access Floor Plan

When you are dealing with floor plans for your office or home, it's good to have a security and access plan as well. Any equipment that is responsible for certain aspects of security can be incorporated into a security and access floor plan. Any equipment that is responsible for certain aspects of security can be incorporated into a security and access floor plan. Ability to create a security and access plan in ConceptDraw DIAGRAM is contained in the Security and Access Plans solution. You can use ConceptDraw DIAGRAM to make the security and access plans for your office simple, accurate and easy-to-read.

Cisco Switches and Hubs. Cisco icons, shapes, stencils and symbols

Cisco switches and hubs deliver the best performance, and often used as network solutions for small businesses, enterprises, data centers. Cisco switches are the core interconnect devices of each computer network. The numerous Cisco switches specifically designed for various applications. Network switches are separated for two types: fixed configuration and modular switches. The fixed configuration switches deprecate swapping or adding another module, and vice versa for modular switch.
The vector stencils library "Logical symbols" contains 49 logical symbols for drawing logical network topology diagrams.
"Logical topology, or signal topology, is the arrangement of devices on a computer network and how they communicate with one another. How devices are connected to the network through the actual cables that transmit data, or the physical structure of the network, is called the physical topology. Physical topology defines how the systems are physically connected. It represents the physical layout of the devices on the network. The logical topology defines how the systems communicate across the physical topologies.
Logical topologies are bound to network protocols and describe how data is moved across the network. ... EXAMPLE : twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's token ring is a logical ring topology, it is physically set up in star topology." [Logical topology. Wikipedia]
The icons example "Logical symbols - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Computer and Networks solution from the Computer and Networks area of ConceptDraw Solution Park.
www.conceptdraw.com/ solution-park/ computer-and-networks
Coaxial Line Tag
Coaxial  Line Tag, coaxial line tag,
Fiber Optic Line Tag
Fiber Optic Line Tag, fiber optic line tag,
Twisted Pair Line Tag
Twisted Pair Line Tag, twisted pair line tag,
SC2200 Signaling Controller
SC2200 Signaling Controller, SC2200 Signaling Controller,
Bridge
Bridge, bridge,
Network Management Appliance
Network Management Appliance, network management appliance,
Access Server (Communications Server)
Access Server (Communications Server), access server, communications server,
Terminal Server
Terminal Server, terminal server,
Web Browser
Web Browser , Web browser ,
Security Management, Cisco
Security Management, Cisco, security management, Cisco,
Lock and Key
Lock and Key, lock and key,
Lock
Lock, lock,
Key
Key, key,
Relational Database
Relational Database, relational database,
Host
Host, host,
CSU/DSU
CSU/DSU , CSU, DSU ,
WAN
WAN, WAN,
University
University , university ,
Government building
Government building , government building ,
Home Office
Home Office, home office,
Telecommuter House PC
Telecommuter House PC, telecommuter house PC,
Medium Building, Regular
Medium Building, Regular, building,
Headquarters, Subdued
Headquarters, Subdued, headquarters,
House, Regular
House, Regular, house,
Small Business
Small Business , small business ,
Network Connector
Network Connector,
Dynamic Connector
Dynamic Connector,
Line Connector
Line Connector,
Line-curve Connector
Line-curve Connector,
Bus
Bus, bus,
FDDI Ring
FDDI Ring, FDDI ring,
Peer-to-peer
Peer-to-peer, peer-to-peer,
Token-ring
Token-ring, Token-ring,
Star
Star, star,
Comm-link
Comm-link, Comm-Link,
Curved Bus
Curved Bus, curved bus,
Ethernet
Ethernet, Ethernet,
Cloud
Cloud,
Speaker
Speaker, speaker,
Microphone
Microphone , microphone ,
Router
Router, router,
ATM Router
ATM Router, ATM router,
ISDN Switch
ISDN Switch , ISDN switch ,
ATM Switch
ATM Switch , ATM switch ,
ATM/FastGB Etherswitch
ATM/FastGB Etherswitch, ATM GB Etherswitch, Fast GB Etherswitch,
Workgroup Switch
Workgroup Switch, workgroup switch,
Small Hub
Small Hub, small hub,
100BaseT Hub
100BaseT Hub , 100BaseT hub,
CDDI-FDDI
CDDI-FDDI , CDDI-FDDI ,

physical security plan, security chart, access chart, security plans, access schemes, access plans , CCTV Security and Access Plans

physical security plan, security chart, access chart, security plans, access schemes, access plans , CCTV
The Security and Access Plans solution may be utilized in order to develop detailed equipment and cabling layout plans, blueprints, and wiring diagrams on internal and external security and access control systems, video surveillance and closed-circuit television (CCTV) systems. IT specialists, security managers, and other guards may use it to quickly design security plans and access plans, security chart, physical security plan, access chart, or access scheme on desire.
The vector stencils library "Shipping and receiving" contains 18 symbols of industrial shipping and receiving equipment.
Use the design elements library "Shipping and receiving" to draw factory warehouse equipment layout plans, floor plans of shipping and receiving centers with equipment for hauling, transporting, and distributing manufactured goods, freight, cargo, and stock from plants and industrial facilities using the ConceptDraw PRO diagramming and vector drawing software.
"Freight transport, or shipping, is a key in the value chain in manufacturing.
While all modes of transport are used for cargo transport, there is high differentiation between the nature of the cargo transport, in which mode is chosen.
Logistics refers to the entire process of transferring products from producer to consumer, including storage, transport, transshipment, warehousing, material-handling and packaging, with associated exchange of information.
Containerization, with the standardization of ISO containers on all vehicles and at all ports, has revolutionized international and domestic trade, offering huge reduction in transshipment costs. Traditionally, all cargo had to be manually loaded and unloaded into the haul of any ship or car; containerization allows for automated handling and transfer between modes, and the standardized sizes allow for gains in economy of scale in vehicle operation." [Transport. Freight.
Wikipedia]
This shapes library "Shipping and receiving" is included in the Plant Layout Plans solution from the Building Plans area of ConceptDraw Solution Park.
Shipping and receiving symbols
Shipping and receiving symbols, swing door, shipping container, security office, security barrier, roll-up door, oil tank, loading dock, loading bay, insulated door, gate, gas cage, dumpster, dock-side crane, dock leveller, container ramp, container crane, compactor,

Cisco Network Topology. Cisco icons, shapes, stencils and symbols

The Cisco Network Diagrams solution uses Cisco network symbols and Cisco icons to visualize computer networks. Cisco Network Topology is the arrangement of the Cisco symbols that display scheme of computer network.
Any Cisco equipment on the network are named like node. Network diagram topology commonly designed within connected nodes. Cisco icons are worldwide acknowledged and mainly established as standard icons for network diagrams. You may use them loosely, but you may not rework them.
The Cisco Network Diagram shows how signals act on the networked devices, or how data routes on the network from one device to the other. There are number of physical network typologies that engineers use while constructing computer networks.

Interior Design. Site Plan — Design Elements

Use ConceptDraw DIAGRAM to develop residential and commercial landscape design, parks planning, yard layouts, plant maps, outdoor recreational facilities, and irrigation systems.
Once you try ConceptDraw DIAGRAM product, you will recommend it to lots of other people you know and you care for, such as your friends, acquaintances, colleagues and business partners as this application is truly incredible and useful in drawing so many things which can be helpful for your use.
The vector stencils library "AWS Security, Identity and Compliance" contains 23 Amazon Web Services icons: AWS Directory Service, AWS Config, AWS CloudTrail, AWS Trusted Advisor, Amazon CloudWatch, Alarm. Use it to draw AWS architecture diagrams of your cloud infrastructure services.
"The AWS infrastructure puts strong safeguards in place to help protect customer privacy. All data is stored in highly secure AWS data centers. ...
AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed. ...
Cut costs by using AWS data centers. Maintain the highest standard of security without having to manage your own facility. ...
Security scales with your AWS cloud usage. No matter the size of your business the AWS infrastructure is designed to keep data safe." [aws.amazon.com/ security/ ]
The symbols example "AWS Security, Identity and Compliance - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the AWS Architecture Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
Amazon Inspector
Amazon Inspector, Amazon Inspector,
Agent
Agent, agent,
AWS Artifact
AWS Artifact, AWS Artifact,
AWS Certificate Manager
AWS Certificate Manager, AWS Certificate Manager,
Certificate manager
Certificate manager, certificate manager,
AWS CloudHSM
AWS CloudHSM, AWS CloudHSM,
AWS Directory Service
AWS Directory Service, AWS Directory Service,
AWS IAM
AWS IAM, IAM, AWS Identity and Access Management,
Add-on
Add-on, add-on,
AWS STS
AWS STS, AWS STS,
AWS STS (alternate)
AWS STS (alternate), AWS STS, alternate,
Data encryption key
Data encryption key, data encryption key,
Encrypted data
Encrypted data, encrypted data,
Long-term security credential
Long-term security credential, long-term security credential,
MFA token
MFA token, MFA token,
Permissions
Permissions, permissions,
Role
Role, role,
Temporary security credential
Temporary security credential, temporary security credential,
AWS KMS
AWS KMS, AWS KMS,
AWS Organizations
AWS Organizations, AWS Organizations,
AWS Shield
AWS Shield, AWS Shield,
AWS WAF
AWS WAF, AWS WAF,
Filtering rule
Filtering rule, filtering rule,
The vector stencils library "Active Directory" contains 20 symbols of Active Directory objects for drawing AD network diagrams. It helps network and system administrators to visualize Microsoft Windows Active Directory structures for network design, installation and maintainance.
"Objects.
An Active Directory structure is an arrangement of information about objects. The objects fall into two broad categories: resources (e.g., printers) and security principals (user or computer accounts and groups). Security principals are assigned unique security identifiers (SIDs).
Each object represents a single entity - whether a user, a computer, a printer, or a group - and its attributes. Certain objects can contain other objects. An object is uniquely identified by its name and has a set of attributes - the characteristics and information that the object represents - defined by a schema, which also determines the kinds of objects that can be stored in Active Directory.
The schema object lets administrators extend or modify the schema when necessary. However, because each schema object is integral to the definition of Active Directory objects, deactivating or changing these objects can fundamentally change or disrupt a deployment. Schema changes automatically propagate throughout the system. Once created, an object can only be deactivated - not deleted. Changing the schema usually requires planning. Sites are implemented as a set of well-connected subnets." [Active Directory. Wikipedia]
The shapes example "Design elements - Active Directory" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Active Directory Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
Active Directory symbols
Active Directory symbols, volume, user, site link bridge, site link, site, server, print queue, policy, organizational unit, group, generic object, domain, container, contact, connection, computer, certificate template, NTDS site settings, Licensing site, IP subnet,
The design elements library Site accessories contains 18 symbols of vehicle access control equipment (tollbooth, tollgate, parking fees payment box), a handicapped sign, outdoor lighting, and garbage receptacles.
"A site plan is an architectural plan, landscape architecture document, and a detailed engineering drawing of proposed improvements to a given lot. A site plan usually shows a building footprint, travelways, parking, drainage facilities, sanitary sewer lines, water lines, trails, lighting, and landscaping and garden elements." [Site plan. Wikipedia]
Use the Site accessories library to design plans, equipment layouts and maps of sites, parking lots, residential and commercial landscapes, parks, yards, plats, outdoor recreational facilities, and irrigation systems using ConceptDraw PRO diagramming and vector drawing software.
The design elements library Site accessories is contained in the Site Plans solution from the Building Plans area of ConceptDraw Solution Park.
 , trash can, site light, security gate, security booth, manhole, lamp post, handicapped sign, fire hydrant, dumpster, drain, collection box, bollard line, bollard, bike rack, bench,
The vector stencils library Initiation and annunciation contains 9 symbols of Fire Alarm Control Panel (FACP) or Fire Alarm Control Unit (FACU) elements, triggering devices, audible alarm systems, timers, security control equipment, and recording devices.
"A Fire Alarm Control Panel (FACP), or Fire Alarm Control Unit (FACU), is the controlling component of a Fire Alarm System. The panel receives information from environmental sensors designed to detect changes associated with fire, monitors their operational integrity and provides for automatic control of equipment, and transmission of information necessary to prepare the facility for fire based on a predetermined sequence. The panel may also supply electrical energy to operate any associated sensor, control, transmitter, or relay. There are four basic types of panels: coded panels, conventional panels, addressable panels, and multiplex systems." [Fire alarm control panel. Wikipedia]
Use the shapes library Initiation and annunciation to draw layout floor plans, communications schematics and wiring diagrams of security systems using the ConceptDraw PRO diagramming and vector drawing software.
The design elements library Initiation and annunciation is included in the Security and Access Plans solution from the Building Plans area of ConceptDraw Solution Park.
Initiation and annunciation symbols
Initiation and annunciation symbols, two way radio, printer, multiplex panel, keyboard, intercom, document destroyer, control panel, audio device, CPU, central processing unit,
The vector stencils library "Shipping and receiving" contains 18 symbols of industrial shipping and receiving equipment.
Use the design elements library "Shipping and receiving" to draw factory warehouse equipment layout plans, floor plans of shipping and receiving centers with equipment for hauling, transporting, and distributing manufactured goods, freight, cargo, and stock from plants and industrial facilities using the ConceptDraw PRO diagramming and vector drawing software.
"Freight transport, or shipping, is a key in the value chain in manufacturing.
While all modes of transport are used for cargo transport, there is high differentiation between the nature of the cargo transport, in which mode is chosen.
Logistics refers to the entire process of transferring products from producer to consumer, including storage, transport, transshipment, warehousing, material-handling and packaging, with associated exchange of information.
Containerization, with the standardization of ISO containers on all vehicles and at all ports, has revolutionized international and domestic trade, offering huge reduction in transshipment costs. Traditionally, all cargo had to be manually loaded and unloaded into the haul of any ship or car; containerization allows for automated handling and transfer between modes, and the standardized sizes allow for gains in economy of scale in vehicle operation." [Transport. Freight.
Wikipedia]
This shapes library "Shipping and receiving" is included in the Plant Layout Plans solution from the Building Plans area of ConceptDraw Solution Park.
Shipping and receiving symbols
Shipping and receiving symbols, swing door, shipping container, security office, security barrier, roll-up door, oil tank, loading dock, loading bay, insulated door, gate, gas cage, dumpster, dock-side crane, dock leveller, container ramp, container crane, compactor,
The vector stencils library "Cisco network topology" contains 89 symbols of Cisco network devices and design elements for drawing computer network topology diagrams.
"There are two basic categories of network topologies:
(1) Physical topologies,
(2) Logical topologies.
The shape of the cabling layout used to link devices is called the physical topology of the network. This refers to the layout of cabling, the locations of nodes, and the interconnections between the nodes and the cabling. The physical topology of a network is determined by the capabilities of the network access devices and media, the level of control or fault tolerance desired, and the cost associated with cabling or telecommunications circuits.
The logical topology in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices." [Network topology. Wikipedia]
The symbols example "Cisco network topology - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Cisco Network Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
www.conceptdraw.com/ solution-park/ computer-networks-cisco
Router
Router, router,
Broadband router
Broadband router , broadband router,
Router firewall
Router firewall, router with firewall ,
Wireless router
Wireless router, wireless router,
Workgroup switch
Workgroup switch, workgroup switch,
ATM switch
ATM switch, ATM switch ,
ISDN switch
ISDN switch, ISDN switch,
Multilayer switch
Multilayer switch, multilayer switch ,
Protocol translator
Protocol translator, protocol translator,
Communications server
Communications server, communications server, access server,
Transpath
Transpath, transpath,
Bridge
Bridge, bridge,
Terminal server
Terminal server, terminal server,
Route switch processor
Route switch processor, route switch processor,
Content engine (cache director)
Content engine (cache director), content engine, cache director,
Management engine (ME 1100)
Management engine (ME 1100), Management Engine, ME 1100,
Switch processor
Switch processor, switch processor,
ITP
ITP, ITP,
Voice gateway
Voice gateway, voice gateway,
BBSM
BBSM, BBSM,
ATA
ATA, ATA,
SIP Proxy server
SIP Proxy server, SIP Proxy server,
NetRanger
NetRanger, netranger,
Cisco 1000
Cisco 1000, Cisco 1000,
IP
IP, IP,
System controller
System controller, system controller,
ACE
ACE, ACE,
Directory server
Directory server, directory server,
ADM
ADM, ADM,
Cisco Unity Express
Cisco Unity Express, Cisco Unity Express,
Unity server
Unity server, unity server,
Cisco security
Cisco security, Cisco security,
CallManager
CallManager, callmanager, call manager,
DSLAM
DSLAM, DSLAM,
H.323
H.323, H.323 ,
CDM (Content Distribution Manager)
CDM (Content Distribution Manager), CDM, content distribution manager,
ICM
ICM, ICM,
Access point
Access point, access point,
Wireless bridge
Wireless bridge, wireless bridge,
Wireless connectivity
Wireless connectivity, wireless connectivity,
Guard
Guard, guard,
Mobile access router
Mobile access router, mobile access router,
Carrier Routing System (CRS)
Carrier Routing System (CRS), Carrier Routing System, CRS,
Vault
Vault, vault,
Workstation
Workstation, workstation,
PC
PC, PC,
Macintosh
Macintosh, Macintosh,
Cloud, gold
Cloud, gold, network cloud,
Cloud, white
Cloud, white, cloud,
Cloud, standard color
Cloud, standard color, cloud,
Cisco security management
Cisco security management, security management,
PBX
PBX, PBX,
DPT
DPT, DPT,
Government building
Government building, government building ,
Headquarters, blue
Headquarters, blue, headquarters, generic building,
Router in building
Router in building, router in building,
Man
Man, man,
Woman
Woman, woman,
Workgroup switch, subdued
Workgroup switch, subdued, workgroup switch,
Router, subdued
Router, subdued, router,
File server
File server, file server,
Firewall, horizontal
Firewall, horizontal, firewall,
Firewall, vertical
Firewall, vertical, firewall,
Firewall, vertical, subdued
Firewall, vertical, subdued, firewall,
Lock
Lock, lock,
Key
Key, key,
Lock and key
Lock and key, lock, key, lock and key,
Car
Car, car,
Truck
Truck, truck,
File cabinet
File cabinet, file cabinet,
Breakout box
Breakout box, breakout box,
Breakout box, blue
Breakout box, blue, breakout box,
Host
Host, host,
Relational database
Relational database, relational database,  database,
Modem
Modem, modem,
BBS (Bulletin Board System)
BBS (Bulletin Board System), BBS, bulletin board system,
Satellite
Satellite, satellite,
Satellite dish
Satellite dish, satellite dish,
UPS
UPS, UPS,
RPS
RPS, RPS,
MAU
MAU, MAU,
PAD
PAD, PAD,
PAD X.28
PAD X.28, PAD X.28,
Diskette
Diskette, diskette,
Contact center
Contact center, contact center,
Page icon
Page icon, page icon,
Antenna
Antenna, antenna,
Antenna, blue
Antenna, blue, antenna,
Radio tower
Radio tower, radio tower,