VLANs and ACL – 3-Zone Model

vla acl network segregation

🚢 Implementing the 3-Zone Network Segmentation Model

The 3-Zone Network Segmentation Model is a robust architecture designed to protect a vessel’s most critical systems by establishing clear, firewalled boundaries between different levels of trust. This model is ideal for retrofitting existing ships, using a central firewall as the gatekeeper.

The three zones are:

  1. Operational Technology (OT) Zone: Critical systems (Engine Control, Navigation, Safety). Highest Security.
  2. Corporate/IT Zone: Business-related systems (Administrative PCs, Servers, ECDIS updates). Medium Security.
  3. Untrusted Zone: Unsecured/Public systems (Crew/Guest Wi-Fi, Internet access devices). Lowest Security.

Step 1: Define and Isolate Zones using VLANs

The first step is to logically separate the network into the three zones using VLANs (Virtual Local Area Networks) on your existing Layer 2 or Layer 3 switches.

Zone NameExample VLAN IDIP Subnet RangeSecurity Posture
1. OT Zone10192.168.10.0/24Default Deny. No internet access.
2. IT Zone20192.168.20.0/24Controlled Access. Limited internet access.
3. Untrusted Zone30192.168.30.0/24Open. Heavily monitored.

Configuration Tasks:

  1. VLAN Creation: Create the three VLANs on your core switch(es).
  2. Port Assignment: Set all physical switch ports connected to OT equipment to access port VLAN 10. Do the same for IT devices (VLAN 20) and Wi-Fi access points (VLAN 30).
  3. Router-on-a-Stick (for Switches): The interfaces on the Layer 3 switch that connect to the Central Firewall must be configured as Trunk Ports. These ports carry traffic for all three VLANs, directing it to the Firewall, which will handle all routing and security policies.

Step 2: Configure the Firewall as the Zone Enforcer

The central security device (the Firewall) must be configured with a separate physical interface for each of the three zones. The firewall becomes the single point of control for all traffic moving between the zones.

Firewall InterfaceVLAN TagSubnet Gateway AddressConnected Zone
Port 1 (OT)10192.168.10.1OT Zone
Port 2 (IT)20192.168.20.1IT Zone
Port 3 (Untrusted)30192.168.30.1Untrusted Zone
Port 4 (WAN/Uplink)N/A(Public IP)Satellite/Shore Link

Firewall Configuration Steps (Conceptual):

  1. Interface Configuration: Assign the appropriate IP addresses (the subnet gateways) and VLAN tags to the corresponding firewall interfaces.
  2. Default Gateway: Ensure all devices within VLAN 10, 20, and 30 are configured to use the Firewall’s interface IP (e.g., 192.168.10.1) as their default gateway.
  3. Disable Direct Routing: Crucially, disable or remove any existing inter-VLAN routing (SVIs/ACLs) on your Layer 3 switch that would bypass the firewall. The firewall must be the only device that can route traffic between zones.

Step 3: Establish Firewall Policies (ACLs)

Once the firewall is the sole router between segments, you use its policy engine (equivalent to advanced ACLs) to enforce a “Deny All” posture and only allow explicitly required traffic.

The policy set is built on the principle that the most trusted zone (OT) should never be exposed to the least trusted zone (Untrusted), and communication should only flow from a higher-trust zone to a lower-trust zone if necessary, but never vice versa.

Policy Rule (ACL)Source ZoneDestination ZoneService/PortActionRationale
Rule 1: OT IsolationIT, UntrustedOTANYDENYPrevents lateral movement from admin or guest networks to critical systems. (Highest Priority Rule)
Rule 2: Admin AccessITOTSSH/RDP (Specific IPs)PERMITAllows authorized maintenance access, but only to specific ports and management jump-hosts.
Rule 3: Internet AccessOTWAN/UplinkANYDENYOT systems must be air-gapped from the internet.
Rule 4: Web/EmailITWAN/UplinkHTTP/S, SMTP/POP3PERMITAllows crew internet access for business/administrative purposes.
Rule 5: Guest TrafficUntrustedWAN/UplinkANYPERMITAllows crew/guest internet access, but is heavily rate-limited and monitored.
Rule 6: Default BlockANYANYANYDENYThe final, explicit rule to block all un-defined traffic.

The Air Gap Concept

In this 3-Zone model, the firewall creates a logical air gap between the OT Zone and the rest of the ship. Any communication between the IT Zone and the OT Zone must be meticulously planned and only allowed for specific, documented purposes (Rule 2). The Untrusted Zone (30) has absolutely no path to the OT Zone (10), ensuring guest devices or compromised crew phones cannot reach the vessel’s vital controls.

The implementation of these ACLs is crucial, especially when factoring in secure remote access for OT systems, which we cover in detail in another post.

Scroll to Top