Categories

Category cover

Automation
155 posts

Category cover

Learning paths
119 posts

Category cover

CISO
22 posts

Category cover

Security
20 posts

Category cover

Notes
19 posts

Category cover

Personal Security
18 posts

Category cover

Infrastructure
12 posts

Category cover

OT/ICS
5 posts

Category cover

Books
3 posts

Category cover

UNetLab
3 posts

Category cover

Write-up
3 posts

Category cover

OSInt
2 posts

Category cover

My life
1 posts

Industrial network segmentation with Private VLANs

Andrea Dainese
April 30, 2025
Post cover

We have explored how to transparently segment an OT/ICS network into groups using VLAN Insertion from Palo Alto Networks. The flexibility of this feature has allowed us to divide our lab environments into groups without the need to reconfigure IP addresses. Additionally, this solution enables us to define policies to allow specific communications between groups when necessary.

Since the early 2000s, a standard feature has been available to achieve a similar outcome: Private VLAN, also known as port isolation, which allows devices to be segmented into port groups.

Private VLAN

Private VLANs are defined in RFC5517  as VLAN-based “forced forwarding.” In other words, frame forwarding is determined at the VLAN level.

Two types of VLANs are defined:

  • Primary VLAN: This VLAN handles traffic common to all groups.
  • Secondary VLAN: This VLAN is associated with port groups and can be either Isolated or Community. In an Isolated VLAN, each port can communicate only with the primary VLAN. In a Community VLAN, each port can communicate with the primary VLAN and all ports within the same Community VLAN.

There are three types of ports:

  • Promiscuous Access Port (P-Port): This port can communicate with any other port, regardless of VLAN assignment.
  • Host Isolated Access Port (I-Port): This port is associated with an Isolated VLAN and can only communicate with P-Ports.
  • Host Community Access Port (C-Port): This port is associated with a Community VLAN and can communicate with P-Ports and all other C-Ports within the same VLAN.

In a real-world environment, multiple interconnected switches would likely be present. Additionally, the network gateway is often a firewall that may not be VLAN-aware.

From an operational standpoint, it is highly recommended to use switches of the same model and automate the PVLAN configuration to minimize human error.

Continue reading the post on Patreon .