Your design has conflicts that will be present in the export.
Executive BriefingAI Β· CISO/PM
Generating executive briefing…
Network Operations RunbookNDC Β· NetOps
Generating runbook…
Board Ready Check
⬑ Create Security Boundary
Simulation
Click a device first, then Run to simulate compromise
Simulation
Policy
Link Capture
📡 Packet Capture
Size: β
SHA256:
Expires: β
ID:
⏳ Capturing packetsβ¦ 0s
Link Capture History
No captures yet.
Load Template
⊞ Enclave-in-a-Box Snippets
Pre-built compliance-validated sub-topologies. All STIG baselines, FIPS mode, and
NIST controls are pre-populated. Click Insert onto Canvas to place
at the current canvas center.
Describe a network topology and I'll generate it on the canvas.
Try: "3-tier campus with DMZ" or "MPLS L3VPN with dual PE routers"
π Attach a device config or diagram file for richer context.
π
Rack Elevation
No rack selected
Used: 0UFree: 42UDevices: 0
{% endblock %}
{% block scripts %}
ATO Package Auto-Generator
Generate partial ATO package: system boundary diagram (RMF Step 1), data flow diagram, ports/protocols/services matrix, and pre-populated STIG checklist.
🗄 IP Address Planning Assistant
Enter a supernet and strategy β the AI will propose CIDR allocations for each segment and device in the topology.
◌ Planning IP allocations…
Segment / Device
Type
CIDR
Gateway
VLAN
🛡 STIG XCCDF/CKL Import
Upload a DISA STIG Viewer .ckl file or SCAP XCCDF results XML. Hostnames are matched to canvas devices and colored by compliance status.
Upload File
No file selected
Color Legend
● Red — CAT I open findings● Yellow — CAT II/III open findings● Green — all checks passed