top of page

Developing Logical IP and VLAN Infrastructure for OT Networks

  • Writer: Scott McNeil
    Scott McNeil
  • Dec 18
  • 3 min read

Operational Technology (OT) networks require a highly disciplined approach to IP addressing and VLAN design to ensure robustness, security, and manageability. Unlike traditional IT networks, OT environments have unique operational, safety, and uptime requirements. This guide presents best practices for developing a logical IP and VLAN infrastructure—favoring approaches that minimize common vulnerabilities and operational risks.


Logical IP Addressing in OT Networks


Best Practices for IP Address Planning

Diagram showing multiple consumer smart home devices connected on a single flat network using the 192.168.1.0 subnet with a 255.255.255.0 subnet mask.

  • Avoid Common IP Ranges: Refrain from using the globally popular 192.168.1.x subnet, as this range is frequently used in IT and consumer devices. Utilizing less-common private IP blocks (e.g., 172.16.x.x – 172.31.x.x or non-default 10.x.x.x ranges) decreases the risk of conflicts and unintended overlaps.

  • Hierarchical and Predictable Addressing: Structure subnets based on physical areas, process zones, or functional groups. This structure eases troubleshooting and supports efficient security segmentation.

  • Static Assignments for Critical Assets: Assign static IPs to essential assets such as PLCs, HMIs, historians, and OT servers, ensuring consistency and reliability in communication.

  • Document Addressing Schemes: Maintain clear documentation of all assignments and reserved blocks to simplify management and audits.

  • Coordinate with IT: Regularly consult with IT personnel to prevent accidental overlaps between OT and enterprise networking spaces.


Recommended Private IP Range Usage

Private Range

OT Network Use (Recommendation)

10.0.0.0/8

Preferred for enterprise-wide OT zones

172.16.0.0/12

Good for plant or site-level subnetting

192.168.0.0/16

Avoid 192.168.1.x—use uncommon subnets

Avoiding DHCP in OT Networks

Red prohibition symbol over the letters “DHCP,” indicating that DHCP is disabled or not permitted.

Dynamic Host Configuration Protocol (DHCP) is commonly used in IT networks to automatically assign IP addresses and manage network configurations for large numbers of devices. However, in Operational Technology (OT) environments, avoiding DHCP is considered a best practice due to the unique requirements of reliability, security, and deterministic behavior.


Reasons to Avoid DHCP in OT Environments

  • Predictability and Determinism: OT networks often support critical processes that depend on highly predictable communication. Static IP addressing ensures that devices always use the same IP, supporting reliable logging, monitoring, and troubleshooting.

  • Security Risks: DHCP introduces risk vectors such as unauthorized or rogue devices receiving IP addresses, which can enable unauthorized access, denial-of-service (DoS) attempts, or network scans within the OT environment. DHCP-based attacks (e.g., DHCP starvation, rogue DHCP servers) are well-documented concerns.

  • Troubleshooting and Asset Management: With static addressing, each device’s role and location are clearly associated with a specific IP. This simplifies maintenance and rapid fault isolation, facilitating faster response during incidents or plant changes.

  • Change Control: OT environments demand rigorous change management. Automated IP assignments via DHCP can lead to unexpected address changes, which complicates device whitelisting, firewall rules, and asset inventories.

  • Uptime and Stability: DHCP servers create single points of failure. Loss of DHCP service may leave new or rebooting devices unable to communicate, potentially disrupting operations.


VLAN Segmentation Guidelines for OT


Principles of VLAN Design

  • Extended VLAN Ranges: Leverage extended VLAN IDs (1006–4094) for OT infrastructure rather than standard IT VLAN ranges (1–1005). This avoids collisions with typical IT VLAN deployments and improves segmentation.

  • Unique VLAN Assignment: Designate separate VLANs for key functional groups—such as control systems, management interfaces, and engineering workstations—to contain faults and improve access control.

  • Zone-Based Segregation: Implement network zones according to process safety boundaries, security levels, or compliance requirements, aligning with frameworks like ISA/IEC 62443.


    Terminal screenshot listing VLAN IDs and names, showing active OT VLANs for management, servers, PLCs, drives, sensors, wireless, and primary and secondary DCS networks.
    OT-focused VLAN segmentation using extended VLAN IDs to separate control systems, servers, PLCs, and DCS zones

Implementation Best Practices

VLAN ID Range

Use in OT Networks

1

Avoid—universal default VLAN

2–1005

Use only if no overlap with IT

1006–4094

Preferred—extended range


Key Recommendations

  • Favor extended VLAN ranges (1006–4094) over standard ranges to isolate OT from common IT VLANs.

  • Avoid using 192.168.1.x and VLAN 1 to reduce the risk of accidental overlap and exposure to universal attacks.

  • Avoid using DHCP as it can disrupt predictability, introduce additional points of failure, and become a security risk.

  • Build IP schemes and VLAN assignments based on operational zones, with clear documentation.

  • Conduct regular audits to maintain infrastructure integrity.


The goal is to provide a structured approach to designing OT networks that are secure, robust, and adaptable minimizing the risks associated with default address spaces and universal VLAN assignments. This methodology supports both operational efficiency and long-term security for industrial environments.

Electronic Circuit Board

READY TO EMBRACE THE FUTURE?

At GPA, we help you embrace the future of manufacturing with expert guidance and innovative solutions. Whether optimizing processes or exploring growth, we’re here to keep you ahead in an evolving industry.

bottom of page