Paessler Blog - All about IT, Monitoring, and PRTG

Network Segmentation: Dividing Your Network to Stop Attackers

Written by Marc Rupprecht | Nov 26, 2025

An attacker has just deployed malware on your network via a compromised employee laptop. In a flat network, they scan your entire internal network, locate your database servers, and exfiltrate customer data in a matter of hours. With network segmentation in place, that same laptop ends up in a guest segment with no route to production systems. The breach gets contained before disaster.

Network segmentation divides your corporate network into smaller subnetworks with their own security controls and network access policies. Instead of one giant flat network where every device can potentially communicate with every other device, you create boundaries that limit lateral movement and your attack surface.

Benefits of Network Segmentation for Cybersecurity

The 2013 Target data breach started with credentials from a compromised HVAC vendor. Those credentials gave attackers network access to Target's infrastructure. From there they moved laterally to point-of-sale systems, exposed 40 million credit and debit card accounts, and impacted 110 million people in total.

The lack of network segmentation turned a low-security vendor connection into a highway to critical payment systems. There are many other use cases like this that show why network administrators need to take segmentation seriously.

Here's how proper network segmentation strengthens your security:

  • Lateral movement: Attackers cannot move from compromised endpoints to reach critical infrastructure systems
  • Blast radius reduction: A breach in one segment doesn't compromise your entire network
  • Compliance requirements: Industry regulations frequently require network segmentation to isolate sensitive data - whether it's payment cards (PCI DSS), health records (HIPAA), or other protected information
  • Unauthorized access: Users and devices only reach network segments they need for their specific functions

Types of Network Segmentation: Physical vs. Logical

You have two approaches to implementing network segmentation, and most environments use both.

Physical segmentation uses separate hardware to create completely isolated network segments. We're talking separate routers, switches, and physical cables with no connection between them. A manufacturing facility for example, might physically separate their operational technology (OT) network from their corporate IT network with no physical connection between them.

This offers maximum security but requires duplicate infrastructure and becomes expensive to scale.

Logical segmentation creates virtual boundaries using VLANs (virtual local area networks), subnets, and firewall rules on your existing network infrastructure. You configure your switches to group devices into VLANs, then use access control lists (ACLs) and firewall policies to control traffic between those VLANs.

This is where most organizations start because it's cost-effective and flexible.

Micro-segmentation takes logical segmentation further by creating granular security policies down to individual workloads or applications.
In a data center, you might segment not just by server function but by specific application tiers, ensuring your web servers can only communicate with application servers on specific ports, and application servers can only reach database servers through defined protocols.

Real-World Segmentation Strategies

By Security Level

Segment Typical Contents Access Rules
Public/DMZ Web servers, public-facing applications Internet-accessible, heavily monitored, no inbound access to internal networks
Internal Employee workstations, internal applications Authenticated users only, limited server access
Restricted Database servers, financial systems, HR data Strict authentication, logging required, minimal access grants
Management Network devices, monitoring systems Admin access only, separate credentials, no internet access

By Function

Different organizations have different functional requirements. A hospital network might segment like this:

  • Medical devices segment: IoT devices, imaging equipment, patient monitors; all isolated from general network traffic
  • Electronic health records: Database servers with patient data, accessible only from authorized workstations
  • Administrative network: Billing, HR, general office functions
  • Guest Wi-Fi: Completely isolated with internet-only access

Especially the medical devices segment is critical. Many IoT devices run outdated operating systems with known vulnerabilities that can't be patched. Network segmentation ensures a vulnerable MRI machine can't become an entry point to patient records, protecting against both external cyberattacks and internal threats.

The same functional approach applies to manufacturing facilities (separating OT from IT systems), financial institutions (isolating trading platforms from back-office networks), educational institutions (segmenting student networks from administrative systems), or any environment where different functions have different security requirements.

Implementing Network Segmentation

Start by mapping what you have. Document your current network architecture, identify critical assets, and understand your traffic flows. You need to know what systems talk to each other before you start blocking communication.

Step 1: Identify Critical Assets

What systems would cause the most damage if compromised? These are typically your highest-risk systems:

  • Domain controllers and authentication systems
  • Customer databases and sensitive data repositories
  • Financial systems and payment processing
  • Backup systems and disaster recovery infrastructure

Step 2: Define Your Segments

Group systems based on security requirements and communication patterns. Common segments include:

  • Production servers
  • Development/testing environments
  • Employee workstations
  • Guest/contractor access
  • IoT and operational technology devices
  • Management and monitoring systems

Step 3: Configure Network Devices

This is where you implement the technical controls:

  1. Create VLANs on your switches to logically group devices
  2. Configure subnets and IP addressing schemes for each segment
  3. Set up firewall rules defining allowed traffic between segments
  4. Implement ACLs on routers to enforce segmentation policies
  5. Configure authentication requirements and user access permissions for each segment

Step 4: Document Everything

Segmentation divides your network, and that creates a visibility problem. You're now monitoring traffic flows, performance, and security across multiple segments instead of one network.

This is manageable only if you document everything. Your segmentation design, security controls, firewall rules, and the reasoning behind them all need to be recorded and kept current.

Monitoring Segmented Networks with PRTG

Here's the reality of running a divided network: you need eyes everywhere. Traffic flows between segments, performance metrics on each zone, security events across the board. PRTG Network Monitor gives you the centralized visibility you need.

Keep Tabs on Your Infrastructure

PRTG's SNMP sensors automatically monitor the routers, switches, and firewalls that enforce your segmentation policies. You can track:

  • Interface status and bandwidth usage on VLANs
  • Firewall performance metrics like CPU and memory utilization
  • Router CPU and memory utilization
  • Switch port status and errors
  • And much more

The hardware enforcing your segments is now part of your security infrastructure. When a router or firewall goes down, it's not just a connectivity issue - it's a potential security gap. PRTG's real-time alerts inform you immediately so you can fix it before anyone notices the opening.

Validate Traffic Flows

PRTG's NetFlow, sFlow, and IPFIX sensors show you exactly what traffic crosses segment boundaries. You can verify that your firewall rules work as intended and detect traffic patterns that shouldn't exist. If you see database queries originating from the guest Wi-Fi segment, something is seriously wrong.

That's the high-level view. For granular analysis, the packet sniffer sensors give you deep visibility into network traffic between segments. You can classify traffic by source and destination, measure bandwidth consumption per segment, and identify unusual communication patterns that might indicate a security issue.

Detect Unusual Activity

PRTG can detect unusual activity between network components and alert you to potential security issues. Configure the detection feature to identify when traffic patterns change unexpectedly. A sudden spike in traffic from your IoT segment to your database servers deserves immediate investigation.

Organize Monitoring by Segment

Structure your PRTG deployment to mirror your network segmentation:

  • Create device groups for each network segment
  • Build custom dashboards showing the status of different security zones
  • Configure notifications that alert the right team members for each segment
  • Use maps to visualize your segmented network architecture

This alignment between your network design and monitoring structure makes it much easier to spot problems and respond quickly.

Once you have network segmentation in place and monitored effectively, you've built the foundation for more advanced security models. If your organization is considering or implementing zero trust security, your segmentation work isn't just helpful—it's essential.

Network Segmentation and Zero Trust

Zero trust security assumes cybersecurity threats exist both outside and inside your network perimeter. Network segmentation is one of the pillars that makes zero trust work in practice.

In a zero trust model, you verify every connection request regardless of where it originates. Network segmentation creates enforcement points where you can implement these verification checks. Every connection between segments requires authentication and authorization based on identity, device posture, and business need—not just network location.

Combine network segmentation with least privilege access controls, and you're implementing zero trust at the network level to strengthen your overall security posture. An HR employee's laptop gets access only to the HR segment and general office resources.
A developer's workstation can reach development environments but has no path to production databases. Even if credentials are compromised, the attacker's movement is constrained to whatever segments those credentials can legitimately access.

Common Implementation Mistakes

You've got the theory down. You understand the benefits. Now let's talk about the implementation problems that catch people off guard. These aren't hypothetical mistakes—these are the issues that create real problems in production networks.

  1. Over-segmenting too quickly: Don't create dozens of micro-segments with complex policies on day one. Start with broader segments and refine over time. I've seen teams make their networks so restrictive that legitimate business functions break, forcing them to punch holes in their security policies.
  2. Segmenting without monitoring: You've created boundaries, but do you know what's happening at those boundaries? Implement monitoring before you start blocking traffic. You need visibility to validate your segmentation works correctly and to detect when something goes wrong.
  3. Ignoring documentation: Your network segmentation design needs to be documented, reviewed, and updated regularly. Network infrastructure changes, new applications get deployed, and security requirements evolve. Your segmentation strategy can't be set-it-and-forget-it.
  4. Forgetting the human element: When you implement policies that prevent teams from accessing systems they're used to reaching, communicate why these changes are happening and provide proper access through approved channels. Security that blocks business operations will get circumvented.

Getting Started

Avoiding those mistakes comes down to one thing: planning first and not rushing the implementation. You now understand how segmentation works, what your implementation options are, how to monitor it effectively, and where the common pitfalls hide. That's more than most teams have when they start.

Network segmentation isn't a weekend project. It's a strategy that evolves with your infrastructure—whether you're running on-premises gear, cloud platforms, or a mix of both. Pick your most critical assets and segment those first. Document what you're doing and why. Set up monitoring before you block traffic. Then expand from there.

The payoff is worth it: contained security incidents, better network performance, easier compliance, and real visibility into what's happening across your infrastructure. When something eventually goes wrong (and it will), the damage stays limited and you'll have the monitoring data to understand exactly what happened.

Ready to monitor your segmented network? Download PRTG's 30-day free trial and start building visibility into your network security infrastructure.