Network Segmentation Protocols

Network segmentation Protocols technologies logically divide networks to enhance security, performance, and administrative control across enterprise and cloud infrastructures.

Technology

Description

Use Case

VLAN (Virtual Local Area Network)

Logical segmentation of a Layer 2 network into separate broadcast domains. Enhances security and isolates traffic between devices.

Isolating departments (e.g., HR, Finance), reducing broadcast traffic.

PVLAN (Private VLAN)

Subdivision of a VLAN into isolated, community, and promiscuous ports. Allows more granular control within the same VLAN.

Isolating hosts in a shared network (e.g., shared hosting environments).

MPLS (Multiprotocol Label Switching)

Labels packets for fast Layer 2/3 forwarding through a label-switched path. Efficient traffic engineering and segmentation.

WAN segmentation, VPNs, and QoS across enterprise backbones.

IEEE Standard: IEEE 802.1Q

Main Features:

  • Segments a physical network into multiple logical networks

  • Reduces broadcast domain size

  • Each VLAN acts like a separate Layer 2 network

  • Traffic tagging allows VLANs across trunk links

  • VLANs help enforce policy and isolate traffic

Use Cases:

  • Isolating sensitive traffic (e.g., finance vs. guest Wi-Fi)

  • Improving network performance and organization

  • Simplifying security enforcement and policy application

Alternative Technologies:

  • VXLAN – Extends VLANs over Layer 3 networks

  • PVLAN – Private VLANs for micro-segmentation

  • SDN – Virtual segmentation using software-defined networking

IEEE / Vendor Spec: Cisco/Industry Practice (not part of IEEE 802.1Q)

Main Features:

  • Subdivides VLAN into three port types: Promiscuous, Isolated, Community

  • Provides intra-VLAN segmentation

  • Improves security in shared VLAN environments

  • Commonly implemented in data centers and ISP setups

Use Cases:

  • Hosting providers isolating customer servers

  • Hotels or guest networks with shared upstream access

  • Virtualized environments needing intra-VLAN isolation

Alternative Technologies:

  • VLAN – Standard segmentation without internal isolation

  • VXLAN – Virtual overlay for multi-tenant segmentation

  • SDN-based microsegmentation – Dynamic segmentation via policies

RFCs: RFC 3031 (Architecture), RFC 3032 (Label Stack), RFC 4364 (VPNs)

Main Features:

  • Labels packets for path-based forwarding rather than IP lookup

  • Works at OSI Layer 2.5 (between Layer 2 and Layer 3)

  • Enables VPNs, traffic engineering, QoS, and redundancy

  • Provider edge routers manage segmentation and path control

Use Cases:

  • WAN segmentation and inter-site connectivity

  • Carrier-provided VPN services

  • Performance-aware routing in large enterprises and service providers

Alternative Technologies:

  • VLANs – Local LAN segmentation

  • VXLAN – Overlay networks over IP for cloud/data centers

  • Segment Routing – Modern replacement using similar concepts