The image sigcc_.3v_005.png shows two paired Audit Vault Servers and two paired Database Firewalls. The sequence is as follows:
At top left: two icons represent users and applications
At top middle: there is a network switch connected to each Database Firewall and each Audit Vault Server
At top right: there is an icon representing a secured target with an Audit Vault Agent deployed on its host.
In the middle of the diagram, two Database Firewalls are grouped in a resilient pair. Each is connected to the network switch at the top.
At the bottom of the diagram, two Audit Vault Servers are grouped in a resilient pair. Each is connected to the network switch at the top.