Network Architecture Guide

VLAN Design & Network
Segmentation Guide

A properly segmented network limits breach blast radius, improves performance, and makes compliance audits straightforward. This guide covers VLAN planning, trunk configuration, inter-VLAN routing, and firewall enforcement end-to-end.

📅 March 2026
⏱️ 18 min read
🏷️ VLAN · Segmentation · Switching · Network Security
✍️ EnterWeb IT Firm

📋 In This Guide

A flat network — where every device sits on the same Layer 2 broadcast domain — was acceptable when offices had 20 devices and security threats were rare. Today, with hundreds of endpoints, IoT devices, guest users, and sophisticated attackers actively targeting internal networks, a flat network is an unacceptable risk.

VLANs (Virtual Local Area Networks) divide a single physical network into multiple logical segments. Each segment is isolated at Layer 2 — devices in different VLANs cannot communicate without explicitly routing through a firewall or Layer 3 switch. This segmentation is the foundation of modern network security architecture.

1 Why Segmentation Matters

Understanding the business and security drivers for segmentation helps make the right design decisions and justify the investment to stakeholders.

Security: Blast Radius Limitation

When an attacker compromises a device on a flat network, they can immediately see and attempt to reach every other device — workstations, servers, printers, IP cameras, and network devices all on the same broadcast domain. VLAN segmentation means a compromised device in the Users VLAN cannot directly reach the Servers VLAN — it must traverse a firewall where access control policies can detect and block lateral movement.

Performance: Broadcast Domain Reduction

Every ARP request, DHCP broadcast, and network discovery packet is sent to every device in a broadcast domain. A flat network with 500 devices generates enormous broadcast traffic that consumes bandwidth and CPU on every device. Splitting into VLANs of 50–100 devices each reduces broadcast traffic by 80–90% and improves overall network performance.

Compliance: Mandatory for PCI-DSS, ISO 27001

✅ Pro Tip: Even if your organization is not currently subject to compliance requirements, design your network as if it will be within 2 years. Retrofitting segmentation onto a flat production network is one of the most disruptive and expensive network projects possible — doing it right from the start is dramatically easier.

2 VLAN Planning & IP Addressing

Good VLAN design starts on paper — not in the switch CLI. A well-structured VLAN plan with a logical IP addressing scheme makes the network intuitive to operate and scale.

Standard Enterprise VLAN Scheme

VLAN ID Name Subnet Purpose Internet
10Users10.10.0.0/24Employee workstations and laptops✅ Yes
20Servers10.20.0.0/24Internal application and file servers❌ No
30DMZ10.30.0.0/24Public-facing web and mail servers✅ Controlled
40IoT10.40.0.0/24IP cameras, smart devices, printers✅ Limited
50Voice10.50.0.0/24VoIP phones and call manager✅ SIP only
60Guest10.60.0.0/24Visitor WiFi — internet only✅ Yes
70PCI10.70.0.0/24Payment card data environment❌ Isolated
99Management10.99.0.0/28Network device management interfaces❌ No

✅ Pro Tip: Assign VLAN IDs in multiples of 10 — VLAN 10 = Users, VLAN 20 = Servers, VLAN 30 = IoT, and so on. This scheme leaves room to grow within each category (VLAN 11, 12, 13 could be floor-specific user VLANs) and makes the VLAN scheme immediately intuitive to any engineer reading the configuration for the first time.

IP Addressing Principles

3 Trunk & Access Port Configuration

Access ports carry traffic for a single VLAN — untagged. Trunk ports carry traffic for multiple VLANs simultaneously using 802.1Q tags. Getting this configuration right is fundamental to VLAN operation.

Cisco IOS — Access Port

! Configure access port for VLAN 10 (user workstation) interface GigabitEthernet0/1 description USER-WORKSTATION-PORT switchport mode access switchport access vlan 10 spanning-tree portfast spanning-tree bpduguard enable no shutdown

Cisco IOS — Trunk Port

! Configure trunk port to firewall/router (carries all VLANs) interface GigabitEthernet0/24 description TRUNK-TO-FIREWALL switchport mode trunk switchport trunk encapsulation dot1q switchport trunk native vlan 999 switchport trunk allowed vlan 10,20,30,40,50,60,70,99 no shutdown

⚠️ Warning: Always explicitly set the native VLAN to an unused VLAN ID (e.g., VLAN 999) on every trunk port — never leave it as the default VLAN 1. VLAN hopping attacks exploit the native VLAN to cross VLAN boundaries. Remove VLAN 1 from all trunk allowed VLAN lists and never use VLAN 1 for any production traffic.

HP/Aruba ProCurve — Trunk & Access

! Create VLANs vlan 10 name "Users" untagged 1-20 vlan 20 name "Servers" untagged 21-24 vlan 99 name "Management" tagged 25-26 ip address 10.99.0.2/28 ! Trunk uplink — tagged all VLANs vlan 10,20,30,40,50,60,70,99 tagged 25

PortFast and BPDU Guard

4 Inter-VLAN Routing

VLANs are isolated at Layer 2 — devices in different VLANs cannot communicate by default. Inter-VLAN routing provides controlled connectivity between VLANs through either a Layer 3 switch or a dedicated firewall.

Option A — Router-on-a-Stick

A single physical link from a router carries trunk traffic for all VLANs using 802.1Q subinterfaces. Simple and cost-effective for small deployments:

! Cisco Router — Subinterface per VLAN interface GigabitEthernet0/0.10 encapsulation dot1Q 10 ip address 10.10.0.1 255.255.255.0 description Gateway-VLAN10-Users interface GigabitEthernet0/0.20 encapsulation dot1Q 20 ip address 10.20.0.1 255.255.255.0 description Gateway-VLAN20-Servers

Option B — Layer 3 Switch SVIs (Recommended)

Switched Virtual Interfaces (SVIs) on a Layer 3 switch perform inter-VLAN routing in hardware — much higher throughput than router-on-a-stick, suitable for enterprise deployments:

! Cisco Layer 3 Switch — SVI per VLAN ip routing interface Vlan10 description Gateway-Users ip address 10.10.0.1 255.255.255.0 no shutdown interface Vlan20 description Gateway-Servers ip address 10.20.0.1 255.255.255.0 no shutdown ! Default route to firewall ip route 0.0.0.0 0.0.0.0 10.99.0.1

⚠️ Critical Warning: If you use a Layer 3 switch for inter-VLAN routing, ALL inter-VLAN traffic must still traverse a stateful firewall for security inspection. A common mistake is enabling full inter-VLAN routing on the L3 switch and bypassing the firewall entirely — this defeats the entire purpose of segmentation. Route all inter-VLAN traffic through the firewall using policy-based routing or a dedicated firewall segment.

5 Firewall ACLs Between VLANs

The firewall is the enforcement point for inter-VLAN security policy. Every packet crossing a VLAN boundary must be inspected and explicitly permitted — implicit deny is the default.

Inter-VLAN Policy Matrix

Source VLANDestination VLANAccessNotes
Users (10)Servers (20)✅ LimitedSpecific ports only — SMB, RDP, HTTP/S
Users (10)Internet (WAN)✅ YesHTTP/HTTPS with UTM inspection
Users (10)IoT (40)❌ DenyUsers must not reach IoT management
IoT (40)Users (10)❌ DenyComplete isolation — IoT never initiates to users
IoT (40)Internet (WAN)✅ LimitedOnly manufacturer update servers
Guest (60)Any internal❌ DenyGuests get internet only — no internal access
Management (99)All VLANs✅ YesAdmin access for monitoring tools only
PCI (70)Any non-PCI❌ DenyPCI systems must not initiate outbound to non-PCI

✅ Pro Tip: Build your inter-VLAN firewall policy matrix as a table like the one above before writing a single firewall rule. This forces you to explicitly define the intended security posture for every VLAN pair — gaps in the matrix become obvious and can be addressed in design, not discovered during a security incident.

FortiGate Inter-VLAN Policy Example

config firewall policy edit 100 set name "USERS_SERVERS_SMB_ALLOW" set srcintf "vlan10-users" set dstintf "vlan20-servers" set srcaddr "VLAN10-Users-Range" set dstaddr "FileServer-01" set service "SMB" "RDP" set action accept set logtraffic all set utm-status enable set av-profile "default" set ips-sensor "default" next edit 101 set name "IOT_ANY_DENY" set srcintf "vlan40-iot" set dstintf "vlan10-users" "vlan20-servers" "vlan99-mgmt" set srcaddr "all" set dstaddr "all" set action deny set logtraffic all next end

6 IoT & Guest Network Isolation

IoT devices — IP cameras, smart TVs, printers, building management systems — are among the most vulnerable devices on any network. They rarely receive security updates, often have hardcoded credentials, and run outdated firmware. They must be completely isolated.

IoT VLAN Design Rules

Guest Network Isolation

! FortiGate — Guest VLAN policy (internet only) config firewall policy edit 200 set name "GUEST_INTERNET_ONLY" set srcintf "vlan60-guest" set dstintf "wan1" set srcaddr "VLAN60-Guest-Range" set dstaddr "all" set service "HTTP" "HTTPS" "DNS" set action accept set logtraffic all set utm-status enable set webfilter-profile "guest-web-filter" next edit 201 set name "GUEST_INTERNAL_DENY" set srcintf "vlan60-guest" set dstintf "any" set srcaddr "VLAN60-Guest-Range" set dstaddr "RFC1918-Internal" set action deny set logtraffic all next end

⚠️ Warning: Client isolation on the guest WiFi SSID prevents guest devices from communicating with each other at Layer 2 — but it does NOT prevent them from accessing your internal network at Layer 3. You still need the explicit firewall deny rule blocking guest VLAN from all internal RFC 1918 subnets. Both controls are required.

7 Voice VLAN & VoIP QoS

VoIP phones require low latency (<150ms), low jitter (<30ms), and near-zero packet loss to deliver acceptable call quality. A dedicated Voice VLAN combined with QoS policies ensures VoIP traffic is prioritized over bulk data traffic.

Voice VLAN Configuration (Cisco)

! Configure port for IP phone + PC daisy-chain interface GigabitEthernet0/5 description IP-PHONE-PORT switchport mode access switchport access vlan 10 switchport voice vlan 50 mls qos trust cos spanning-tree portfast no shutdown

DSCP Marking for QoS

! Mark VoIP RTP traffic with DSCP EF (Expedited Forwarding) ip access-list extended VOIP-TRAFFIC permit udp 10.50.0.0 0.0.0.255 any range 16384 32767 class-map match-any VOIP match access-group name VOIP-TRAFFIC match dscp ef policy-map QOS-POLICY class VOIP set dscp ef priority percent 30 class class-default fair-queue

✅ Pro Tip: Use DSCP EF (Expedited Forwarding — DSCP 46) for VoIP RTP media and DSCP CS3 for SIP signaling. These are the industry standard markings — all modern switches, routers, and firewalls recognize them and apply appropriate queuing automatically when QoS is enabled. Using non-standard markings means you will need to manually configure every device in the path.

8 VLAN Audit & Documentation

A VLAN design is only as good as its documentation and ongoing governance. Networks without documentation drift — VLANs get created for temporary purposes and never removed, firewall rules accumulate, and within 2 years nobody knows what anything does.

VLAN Documentation Requirements

Quarterly VLAN Audit Checklist

  1. Export current VLAN database from all switches — compare against VLAN register
  2. Identify VLANs present on switches but not in the register — investigate and document or remove
  3. Check for unused VLANs (no active MAC addresses learned for 90+ days) — decommission candidates
  4. Verify trunk port allowed VLAN lists — remove VLANs that should not traverse each trunk
  5. Review inter-VLAN firewall rules — remove rules with zero hit counts after 90 days
  6. Update topology diagrams to reflect any infrastructure changes made in the quarter
  7. Verify DHCP scope utilization per VLAN — resize subnets approaching 80% capacity

✅ Pro Tip: Use NetBox (free, open-source) as your IPAM and VLAN documentation platform. It tracks VLANs, IP prefixes, device port assignments, and rack layouts in a single database with a REST API — enabling automation of VLAN provisioning and generating accurate topology documentation automatically as you make changes.

Need Help Designing Your Network Segmentation?

EnterWeb IT Firm designs and implements enterprise VLAN architectures — from initial planning and IP addressing to switch configuration, firewall policy design, and ongoing audit programs. We work with Cisco, HP, Juniper, and all major switching vendors.

Related Guides