This diagram shows a network architecture with various security devices protecting resources. It includes routers, firewalls, VPNs, intrusion detection sensors, switches, and other network devices connected through ethernet links and VPN tunnels. The devices are managing access to resources like servers, PCs, laptops and web/FTP applications.