Diagram Legend

Zone Indicators

Edge & Perimeter No Trust
Core Network & Security High Trust
Administration Building Low Trust
Teaching Spaces Low Trust
Data Centre / DMZ High Trust
No Trust

Internet-facing or guest segments assumed untrusted until filtered by edge security.

Low Trust

User access networks with limited privileges and monitoring to contain compromise.

High Trust

Core infrastructure and data centre workloads with strict controls and least privilege.

Yellow border marks representative or repeated spaces (e.g. typical classroom or office).

Device Types

Infrastructure
Router Router
Switch Switch
Firewall Firewall
Controller Controller
Endpoints
PC / Laptop PC / Laptop
Printer Printer
Phone Phone
Access Point Access Point
Special
Server Stack Server Stack
Database Database
CCTV CCTV

Network Context

Wired uplink
Wireless association
10.x.x.x172.16.x.x
Private IPv4 ranges indicating internal networks.
Security boundary enforced by the Perimeter Firewall

Network Flowchart

Edge & Perimeter No Trust
Core Network & Security High Trust
Data Centre / DMZ High Trust
Administration Building Low Trust
Offices Low Trust
Teaching Spaces Low Trust
Classrooms Low Trust
ISP
ISP
Edge Modem
Edge Modem
Perimeter Firewall
Perimeter Firewall
Core Router
Core Router
Core Switch Stack
Core Switch Stack
WLC
WLC
Data Centre Firewall
Data Centre Firewall
Data Centre Main Switch
Data Centre Main Switch
Server DMZ Switch
Server DMZ Switch
Web Frontends
Web Frontends
Application Servers
Application Servers
SIS Database
SIS Database
Backup Storage
Backup Storage
Admin Console
Admin Console
CCTV System
CCTV System
PoE Switch
PoE Switch
Admin Distribution
Admin Distribution
Admin Access Switch
Admin Access Switch
Admin AP
Admin AP
Office Telephones
Office Telephones
Staff PC
Staff PC
Office Printer
Office Printer
Classroom Distribution
Classroom Distribution
Classroom Access Switch
Classroom Access Switch
Classroom AP
Classroom AP
Teacher Laptop
Teacher Laptop
Teacher PC
Teacher PC
Student Devices
Student Devices