Segmentation, VLANs, DMZ, and Microsegmentation

Key Takeaways

  • Segmentation limits which systems can communicate and reduces blast radius after compromise.
  • VLANs separate Layer 2 broadcast domains, but routing and ACLs are still needed to enforce security between VLANs.
  • A DMZ hosts services that must face less trusted networks while limiting access to internal systems.
  • Microsegmentation applies granular policy between workloads, often using software-defined controls.
  • Exam questions often test allowed flows, default deny logic, and avoiding direct public access to sensitive systems.
Last updated: April 2026

Segmentation, VLANs, DMZ, and Microsegmentation

Segmentation divides a network into security zones. The reason is simple: if one device is compromised, the attacker should not automatically reach everything else.

Segmentation Terms

TermMeaningExam clue
VLANLogical Layer 2 segmentSeparate user, server, voice, or guest networks
SubnetLayer 3 IP networkRouting and ACLs decide inter-subnet access
DMZSemi-trusted zone for public-facing servicesPublic web server separated from internal database
East-west trafficTraffic between internal systemsLateral movement concern
North-south trafficTraffic entering or leaving the networkInternet edge control concern
MicrosegmentationFine-grained workload-to-workload policyLimit app server to one database service

Important: a VLAN alone is not a complete security control. If routing between VLANs is open, users in one VLAN may still reach systems in another. Use router ACLs, firewall rules, or software-defined policy to enforce boundaries.

Common Zone Model

ZoneTypical systemsAllowed access
InternetExternal users and attackersOnly published services
DMZReverse proxy, public web, mail gatewayLimited paths to internal app services
Application zoneInternal app servers and APIsRequired database and service calls
Data zoneDatabases and storageOnly approved app or admin paths
User zoneEmployee workstationsBusiness apps, not direct database admin
Management zoneJump hosts, monitoring, admin toolsAdmin protocols to approved targets
Guest zoneVisitors and unmanaged devicesInternet only, no internal access

ACL Mini Example

Scenario: Guest Wi-Fi, employee workstations, application servers, and a database are separated into VLANs.

RuleSourceDestinationServiceActionReason
1Guest VLANInternetHTTP/HTTPS/DNSAllowGuest internet use
2Guest VLANInternal RFC1918 rangesAnyDenyPrevent internal access
3User VLANApp VLANHTTPSAllowUsers access business app
4User VLANDatabase VLANAnyDenyNo direct database access
5App VLANDatabase VLANTCP 5432AllowRequired app data flow
6AnyAnyAnyDeny/logDefault deny

Security+ PBQs often ask for the missing deny rule. If a database should only receive traffic from the app tier, do not allow the whole user subnet.

DMZ Design Example

Public users need to reach a website. The website needs data from an internal application API. The database contains confidential customer data.

Safer placement:

  • Reverse proxy or web front end in the DMZ.
  • Application API in an internal application zone.
  • Database in a data zone.
  • Firewall rule: internet to DMZ HTTPS only.
  • Firewall rule: DMZ web to app API only.
  • Firewall rule: app API to database port only.
  • Deny internet to app and database zones.

Trap: putting the database in the DMZ because the website needs it. The website needs controlled application access to data, not direct public reachability to the database.

Microsegmentation

Microsegmentation narrows access between workloads. Instead of allowing every server in a subnet to talk to every other server, policy can say:

  • Payment API may connect to payment database on TCP 5432.
  • Inventory API may connect to inventory database on TCP 3306.
  • No API may initiate admin connections to another API.
  • Monitoring collector may receive telemetry from all workloads.

This is useful in virtualized, containerized, and cloud environments where workloads move frequently and subnet-level controls are too broad.

PBQ-Style Walkthrough

Task: Fix lateral movement risk after a workstation compromise.

Facts:

  • Workstations can reach server admin ports.
  • Guest Wi-Fi can reach printer and file server VLANs.
  • All servers share one flat subnet.
  • Domain controllers and databases are in the same segment as test servers.

Best changes:

  1. Block workstation access to server admin ports except from management jump hosts.
  2. Restrict guest Wi-Fi to internet-only services.
  3. Separate critical servers into protected zones.
  4. Permit only required application flows.
  5. Log denied east-west traffic to detect scanning.

The exam pattern is usually "least access that still supports the business flow."

Test Your Knowledge

A guest wireless VLAN should allow internet browsing but no internal access. Which rule is most appropriate?

A
B
C
D
Test Your KnowledgeMulti-Select

Which statements about VLANs and segmentation are correct? Choose two.

Select all that apply

VLANs can separate broadcast domains
Routing or firewall policy is needed to control traffic between VLANs
A VLAN automatically encrypts all traffic
A DMZ is the best place for the confidential database behind a public website
Test Your Knowledge

A workload policy allows the payment API to connect only to the payment database on the required port. What concept does this best illustrate?

A
B
C
D