If you have ever looked at the back of your office network switch and seen a tangle of identical-looking Ethernet cables, you might assume that every device on your network shares the same space — that your finance team's computers, the guest Wi-Fi, the CCTV system, and the VoIP phones are all sitting on one big network. In many small businesses, that is exactly the case. And it is a significant security and performance risk.
VLANs — Virtual Local Area Networks — are the solution. They allow you to divide a single physical network into multiple separate, isolated networks without needing additional hardware. VLANs are one of the most fundamental tools in network design, yet many UK SMEs either do not use them or do not understand why they should.
This guide explains what VLANs are, how they work, why they matter for your business, and how to implement them properly.
What Is a VLAN?
A VLAN is a logical grouping of devices on a network that behave as if they are on the same physical network segment, even though they may be spread across different switches and different parts of the building. Devices within the same VLAN can communicate freely with each other, but traffic between different VLANs is controlled and requires routing — typically through a firewall or Layer 3 switch.
To put it simply, VLANs let you create separate networks within your existing network hardware. Your finance team can be on one VLAN, your guest Wi-Fi on another, your VoIP phones on a third, and your CCTV system on a fourth. Each VLAN is isolated from the others, meaning a device on the guest Wi-Fi cannot see or access anything on the finance VLAN, and a compromised CCTV camera cannot be used to attack your main business network.
VLANs are configured on managed network switches and are identified by a VLAN ID — a number between 1 and 4094. When a switch port is assigned to a particular VLAN, the device connected to that port can only communicate with other devices on the same VLAN unless a router explicitly allows traffic to cross between VLANs.
The concept of VLANs has been part of networking standards since the mid-1990s, when the IEEE 802.1Q specification was ratified. Despite being a mature technology, VLANs remain the primary method of network segmentation in modern enterprise environments because they are reliable, well-understood, and supported by virtually every managed switch on the market. The fundamentals have not changed, even as the threats they protect against have grown dramatically more sophisticated.
It is worth noting that VLANs are not a complete security solution on their own. They provide network-level isolation, which is essential, but they must be combined with properly configured firewall rules, access control policies, and monitoring to deliver genuine security. A VLAN without corresponding firewall rules is like a locked door without walls — the barrier exists, but it can be easily circumvented. The strength of VLANs lies in their role as one layer within a defence-in-depth strategy that includes firewalls, endpoint protection, and ongoing monitoring.
Think of your network as a building. Without VLANs, everyone is on the same open-plan floor — the accountants, the visitors, the cleaners, and the security cameras all share the same space. Anyone can walk up to anyone. With VLANs, you create separate floors with locked doors between them. People on each floor can move freely within their space, but crossing between floors requires passing through a security checkpoint (the router or firewall) that controls who can go where.
Why Your Business Network Needs VLANs
There are four primary reasons why every business network should use VLANs: security, performance, compliance, and manageability.
Security: Limiting Lateral Movement
The single most compelling reason for VLANs is security. In a flat network without VLANs, if an attacker compromises any device — a laptop, a printer, a smart TV, an IoT sensor — they can potentially access every other device on the network. This is known as lateral movement, and it is the technique used in the vast majority of serious cyber attacks.
The NCSC specifically recommends network segmentation as a key defence against ransomware and other threats. By placing different types of devices and different departments on separate VLANs, you contain the blast radius of any compromise. If a guest connects an infected laptop to your guest Wi-Fi VLAN, the infection cannot spread to your corporate network because the two VLANs are isolated.
The importance of this containment cannot be overstated. Analysis of major cyber incidents consistently shows that the time between initial compromise and full network penetration is measured in hours, not days. In a flat network, a single compromised device can lead to complete network domination before your IT team even becomes aware of the breach. VLANs buy you critical time by confining the attacker to a single segment, making the intrusion detectable through inter-VLAN traffic anomalies and limiting the damage that can be inflicted before containment measures are activated.
VLANs are also essential for protecting operational technology (OT) devices that are increasingly connected to business networks. CCTV cameras, building management systems, access control panels, and environmental sensors often run embedded operating systems with known vulnerabilities that are rarely or never patched. Placing these devices on isolated VLANs ensures that even if an attacker compromises a camera or sensor, they cannot use it as a stepping stone to reach your business-critical systems. This principle of isolation is central to the NCSC's guidance on securing IoT deployments in business environments.
Performance: Reducing Broadcast Traffic
Every network device periodically sends broadcast traffic — ARP requests, DHCP discoveries, NetBIOS announcements, and similar protocol messages that are sent to every device on the same network segment. In a small network with 20 devices, this broadcast traffic is negligible. In a flat network with 100, 200, or 500 devices, broadcast traffic can consume a meaningful percentage of bandwidth and reduce overall performance.
VLANs contain broadcast traffic within each VLAN. A broadcast sent by a device on VLAN 10 is only received by other devices on VLAN 10, not by devices on VLAN 20 or VLAN 30. This reduces unnecessary traffic and improves performance for everyone.
The performance benefits become even more pronounced in environments with voice and video traffic. VoIP phone calls are extremely sensitive to network latency and jitter — even small delays cause audible distortion and dropped words. By placing VoIP phones on a dedicated voice VLAN with appropriate Quality of Service (QoS) policies, you ensure that voice traffic is prioritised over less time-sensitive data such as file downloads and web browsing. Without this separation, a large file transfer on the same network segment can cause phone calls to break up or drop entirely.
Similarly, video conferencing traffic benefits significantly from VLAN segmentation. As hybrid and remote working have become standard practice in UK businesses, the volume of video traffic on corporate networks has increased substantially. Isolating video conferencing endpoints on a media VLAN with guaranteed bandwidth allocation prevents other network activity from degrading call quality during important client meetings or team collaborations.
Compliance: Meeting Regulatory Requirements
Several regulatory frameworks either require or strongly recommend network segmentation. PCI DSS, the standard for businesses handling payment card data, explicitly requires that cardholder data environments be segmented from the rest of the network. The UK GDPR's requirement for "appropriate technical measures" is widely interpreted to include network segmentation where personal data is stored or processed.
Cyber Essentials Plus, the UK Government-backed security certification, assesses network architecture as part of its evaluation. While not mandating VLANs specifically, the assessment looks at how effectively the network limits access to sensitive resources — and VLAN segmentation is the standard method of achieving this.
Manageability: Simplifying Network Administration
VLANs make networks easier to manage. Need to apply a specific firewall policy to all devices in the accounts department? If they are on their own VLAN, you apply the policy once to that VLAN. Need to set up quality of service (QoS) rules to prioritise VoIP traffic? Assign all phones to a voice VLAN and apply QoS to that VLAN. Need to troubleshoot a performance issue? VLANs help you isolate the problem quickly.
Common VLAN Design for UK SMEs
While every business network is different, there is a standard VLAN design that works well for most UK SMEs. Here is a typical configuration that balances security with simplicity.
| VLAN ID | Name | Purpose | Typical Devices |
|---|---|---|---|
| 10 | Corporate | Main business network | Staff workstations, laptops |
| 20 | Servers | Server infrastructure | File servers, application servers, domain controllers |
| 30 | Voice | VoIP phone system | IP phones, call servers |
| 40 | Guest | Visitor internet access | Guest Wi-Fi devices |
| 50 | IoT/CCTV | Internet of Things and surveillance | CCTV cameras, sensors, smart devices |
| 99 | Management | Network device management | Switch management interfaces, access point management |
In this design, corporate workstations can access servers (with appropriate firewall rules), but the guest VLAN has internet access only — no access to any internal resource. The voice VLAN is isolated to ensure call quality is not affected by data traffic, and the IoT/CCTV VLAN is completely separated from the corporate network to prevent compromised cameras or smart devices from accessing business data.
Subnet Planning for VLANs
Each VLAN requires its own IP subnet — a distinct range of IP addresses that devices on that VLAN will use. Proper subnet planning is essential for a clean, manageable network. A common approach is to align the third octet of the IP address with the VLAN ID: VLAN 10 uses 192.168.10.0/24, VLAN 20 uses 192.168.20.0/24, and so on. This makes it immediately obvious which VLAN a device belongs to simply by looking at its IP address, which greatly simplifies troubleshooting and log analysis.
When sizing your subnets, allow room for growth. A /24 subnet provides 254 usable addresses, which is sufficient for most VLAN segments in an SME environment. However, if you anticipate significant growth in a particular segment — for example, an IoT VLAN that may accommodate dozens of new sensors — consider allocating a larger subnet from the outset. Renumbering subnets after deployment is disruptive and best avoided through careful upfront planning.
Inter-VLAN Routing and Firewall Policy
Simply creating VLANs is not sufficient — you must also define explicit policies governing which VLANs can communicate with each other and under what conditions. This is achieved through inter-VLAN routing rules configured on your firewall or Layer 3 switch. The default policy should deny all inter-VLAN traffic, with specific rules added only where communication is genuinely required. For example, you might permit the corporate VLAN to access the server VLAN on specific ports (HTTP, HTTPS, SMB for file sharing, RDP for remote desktop), whilst blocking all traffic from the guest VLAN to every internal VLAN without exception.
How VLANs Work Technically
For business owners who want a slightly deeper understanding, here is how VLANs function at a technical level.
There are two types of switch ports in a VLAN configuration: access ports and trunk ports. An access port is assigned to a single VLAN and connects to an end device such as a computer or printer. The device does not need to know anything about VLANs — the switch handles the VLAN assignment. A trunk port carries traffic for multiple VLANs simultaneously and is used to connect switches to each other and to routers. Trunk ports use a protocol called 802.1Q to tag each frame with its VLAN ID as it crosses the link.
When a computer on VLAN 10 sends a packet to another computer on VLAN 10, the switch forwards the packet directly — no routing needed. When a computer on VLAN 10 wants to communicate with a device on VLAN 20, the traffic must pass through a router or Layer 3 switch that examines the traffic and applies firewall rules before forwarding it. This is called inter-VLAN routing, and it is where your security policies are enforced.
Native VLANs and Security Implications
An important technical detail that has significant security implications is the concept of the native VLAN. On a trunk port, one VLAN is designated as the native VLAN — traffic on this VLAN is sent untagged across the trunk link. By default, the native VLAN is VLAN 1. This creates a potential security vulnerability known as VLAN hopping, where an attacker crafts specially tagged frames to jump from the native VLAN to another VLAN. To mitigate this risk, best practice dictates that you should change the native VLAN to an unused VLAN ID, ensure the native VLAN is not used for any production traffic, and explicitly tag all VLANs on trunk ports.
Another technical consideration is the Maximum Transmission Unit (MTU) on trunk links. Because 802.1Q tagging adds four bytes to each Ethernet frame, trunk ports may need their MTU increased slightly to accommodate the additional overhead. Most modern switches handle this automatically, but it is worth verifying during implementation to avoid subtle performance issues caused by frame fragmentation on trunk links.
Managed Switches (VLAN Capable)
- Full VLAN support with 802.1Q trunking
- Per-port VLAN assignment
- Quality of Service (QoS) controls
- Port security and monitoring
- SNMP management and reporting
- Typical cost: £200 – £800 for 24/48 port
Unmanaged Switches (No VLAN Support)
- No VLAN capability whatsoever
- All ports on single flat network
- No traffic prioritisation
- No security features
- No monitoring or management
- Typical cost: £30 – £100 for 24/48 port
Implementing VLANs: A Practical Guide
Implementing VLANs on an existing network requires careful planning and execution. Here is the process we recommend for UK SMEs.
Step 1: Audit your current network. Document every device on your network, its purpose, and its current IP address. Group devices logically based on function and security requirements. This inventory forms the foundation of your VLAN design.
Step 2: Design your VLAN scheme. Decide how many VLANs you need, assign VLAN IDs, and define the IP address ranges (subnets) for each VLAN. Keep the design as simple as possible — more VLANs means more complexity, so only create as many as you genuinely need.
Step 3: Check your hardware. Ensure all your network switches support VLANs and 802.1Q trunking. Unmanaged switches cannot support VLANs and will need to be replaced with managed models. Check that your firewall or router can handle inter-VLAN routing at the required throughput.
Step 4: Configure and test. Configure VLANs on your switches, set up inter-VLAN routing on your firewall, update DHCP scopes to serve the correct IP ranges for each VLAN, and test thoroughly before rolling out to the wider business. We strongly recommend implementing VLANs outside business hours, with a rollback plan in case of issues.
Step 5: Document everything. Create a network diagram showing all VLANs, their subnets, and the firewall rules between them. This documentation is essential for ongoing management and troubleshooting.
Common VLAN Mistakes and How to Avoid Them
VLANs are powerful, but they can be misconfigured in ways that create more problems than they solve. Here are the most common mistakes we see in UK business networks.
Using VLAN 1 for production traffic. VLAN 1 is the default VLAN on most switches and carries control-plane traffic. It should not be used for regular business traffic. Always assign your production devices to a numbered VLAN (10, 20, 30, etc.) and leave VLAN 1 unused.
Allowing all VLANs on all trunk ports. By default, trunk ports carry traffic for every VLAN. Best practice is to explicitly define which VLANs are permitted on each trunk link, reducing the risk of accidental traffic leakage between switches.
Forgetting to secure the management VLAN. The management VLAN provides access to your switch and router administration interfaces. If this VLAN is accessible from the guest or IoT network, an attacker could reconfigure your entire network. Restrict management VLAN access to specific admin workstations only.
Over-complicating the design. Some businesses create a VLAN for every department — sales, marketing, HR, finance, operations, IT. Unless there is a genuine security or compliance reason for this level of segregation, it creates unnecessary complexity. Group users by security requirement, not by department.
Neglecting to monitor inter-VLAN traffic. Once VLANs are configured, many businesses assume the job is done and never look at their VLAN configuration again. However, network configurations drift over time as changes are made for troubleshooting, new devices are added, or temporary rules become permanent. Regularly reviewing your inter-VLAN routing rules and monitoring traffic patterns between VLANs is essential to ensure your segmentation remains effective. Unexpected traffic crossing VLAN boundaries is often the first indicator of a misconfiguration or a security incident in progress.
Not updating DHCP and DNS for new VLANs. Each VLAN needs its own DHCP scope to assign IP addresses to devices that connect to it, and DNS settings must be configured appropriately for each segment. Failing to create a DHCP scope for a new VLAN means devices on that VLAN will not receive IP addresses automatically, leading to connectivity failures that are often difficult to diagnose. Similarly, guest VLANs should use external DNS servers rather than your internal DNS, preventing guests from resolving internal hostnames and discovering your network's internal structure.
Ignoring wireless VLAN assignments during access point upgrades. When replacing or upgrading wireless access points, it is easy to overlook the VLAN mappings for each SSID. If a new access point is deployed with default settings, guest traffic may inadvertently land on your corporate VLAN, completely bypassing your segmentation. Always verify SSID-to-VLAN mappings after any wireless infrastructure change, and include this verification step in your change management procedures.
VLANs and Wi-Fi: SSIDs Mapped to VLANs
Modern enterprise wireless access points support multiple SSIDs (wireless network names), each mapped to a different VLAN. This is how you can offer separate wireless networks for staff, guests, and IoT devices using the same physical access points.
For example, your access points might broadcast three SSIDs: "CompanyName-Staff" mapped to VLAN 10, "CompanyName-Guest" mapped to VLAN 40, and "CompanyName-IoT" mapped to VLAN 50. A guest connecting to the guest SSID is automatically placed on the guest VLAN with internet-only access, while staff connecting to the corporate SSID land on the corporate VLAN with full access to business resources.
This is particularly important for UK GDPR compliance. If you offer guest Wi-Fi, you have a legal obligation to ensure that guests cannot access your business data. VLAN-backed guest Wi-Fi is the standard method of achieving this separation.
When to Call in the Professionals
While VLANs are a standard networking feature, implementing them correctly on a live business network is not a task for amateurs. Misconfigurations can cause network outages, break applications, disrupt phone systems, and create security holes. If your business depends on its network — and in 2026, what business does not — professional implementation is strongly recommended.
A qualified network engineer will design the optimal VLAN scheme for your business, implement it with minimal disruption, configure appropriate firewall rules between VLANs, test thoroughly before going live, and provide full documentation for ongoing management.
Need Help With Network Segmentation?
Cloudswitched designs and implements VLAN configurations for UK businesses of all sizes. Whether you need a simple three-VLAN setup or a complex multi-site segmentation strategy, our network engineers will ensure your infrastructure is secure, performant, and properly documented. Get in touch for a network review.
Explore Network Admin Services