Categories

Category cover

Automation
155 posts

Category cover

Learning paths
119 posts

Category cover

CISO
22 posts

Category cover

Security
20 posts

Category cover

Notes
19 posts

Category cover

Personal Security
18 posts

Category cover

Infrastructure
12 posts

Category cover

OT/ICS
5 posts

Category cover

Books
3 posts

Category cover

UNetLab
3 posts

Category cover

Write-up
3 posts

Category cover

OSInt
2 posts

Category cover

My life
1 posts

Industrial network segmentation with VLAN Insertion

Andrea Dainese
April 02, 2025
Post cover

In real-world industrial environments, it is common to have all OT/ICS devices configured with IP addresses belonging to a single large network. This setup allows different production lines or plants to potentially communicate without any filtering.

Additionally, user PCs are often part of the same network for various purposes. Unfortunately, these PCs are more susceptible to malware due to inconsistent adherence to corporate policies. A malware infection within an OT/ICS network can easily spread due to weak security defenses.

Our laboratory implements two different plants: the Bottle Filling Plant and the Oil Refinery Plant. In our setup, these two plants should not communicate with each other, even though they reside on the same IP network.

The goal is to segment the OT/ICS network transparently, minimizing disruptions.

Observations after VLAN insertion implementation:

  • No IP address changes required
  • Minimal downtime
  • Increased network visibility
  • Clear separation between IT and OT resources
  • Ability to apply customized policies to different zones
  • Capability for deep packet inspection on a per-zone basis
  • Faster identification and isolation of potential issues
  • Scalability up or down as needed

Grouping OT/ICS Devices Without Reconfiguration

Our laboratory includes the following devices:

Continue reading the post on Patreon .