Network Segmentation: Micro-Segmentation, Macro-Segmentation, Firewall Zones, SGT และ Zero Trust

Network Segmentation: Micro-Segmentation, Macro-Segmentation, Firewall Zones, SGT และ Zero Trust

Network Segmentation แบ่ง network เป็นส่วนย่อยเพื่อ security, performance และ compliance Micro-Segmentation ควบคุม traffic ระดับ workload/application, Macro-Segmentation แบ่ง network เป็น zones ใหญ่, Firewall Zones กำหนด trust boundaries, SGT (Scalable Group Tags) ใช้ identity-based segmentation และ Zero Trust ใช้หลัก “never trust, always verify” ทุก segment

Flat networks (ไม่มี segmentation) เป็น ฝันร้ายด้าน security: attacker เจาะได้ 1 จุด → lateral movement ไปทุกที่ในเครือข่าย Target breach (2013), NotPetya (2017), SolarWinds (2020) ล้วนใช้ lateral movement Network segmentation ลด blast radius: ถ้า attacker เจาะ HR VLAN → ไปไม่ถึง Finance server เพราะ firewall/ACL กั้น

Macro vs Micro Segmentation

Feature Macro-Segmentation Micro-Segmentation
Scope Network zones (VLANs, subnets, firewall zones) Individual workloads, VMs, containers, applications
Granularity Coarse (zone-to-zone policies) Fine-grained (app-to-app, process-level)
Implementation VLANs, firewalls, ACLs, routing Host-based firewall, NSX, SGT, identity-based
Complexity Low-Medium (traditional networking) High (requires visibility + policy engine)
Lateral Movement Prevents between zones (not within zone) Prevents between individual workloads (even in same zone)
Example HR VLAN ↔ Finance VLAN blocked by firewall Web server → only talk to app server on port 8080

Firewall Zones

Zone Trust Level Contains Policy
Inside (Trust) High Internal users, servers, workstations Allow outbound, restrict inbound
Outside (Untrust) None Internet, external networks Block all inbound except explicit allow
DMZ Medium Public-facing servers (web, email, DNS) Allow specific inbound (HTTP/HTTPS), restrict to inside
Management Highest Network devices, management interfaces Very restrictive — only admin access
Guest None Guest WiFi, visitor devices Internet only — no access to internal
IoT Low Cameras, sensors, printers, building management Isolated — only specific cloud/server access

VLAN-Based Segmentation

VLAN Purpose Inter-VLAN Policy
Data VLAN (10-50) User workstations per department Route through firewall/L3 with ACLs
Voice VLAN (100-150) IP phones — QoS priority Allow to voice gateway/CUCM only
Server VLAN (200-250) Internal servers (AD, file, DB) Allow from specific client VLANs only
Management VLAN (999) Switch/router management interfaces Allow from admin workstations only
Guest VLAN (666) Guest/visitor access Internet only — completely isolated
IoT VLAN (700-750) IoT devices, cameras, sensors Cloud access only — no lateral

SGT (Scalable Group Tags) / TrustSec

Feature รายละเอียด
คืออะไร Cisco TrustSec: tag ทุก packet ด้วย SGT (16-bit) ตาม identity → enforce policy based on tags
How User authenticates (802.1X) → ISE assigns SGT → switch tags all packets → SGT-based ACLs (SGACL)
SGACL Policy matrix: source SGT → destination SGT → permit/deny (e.g., Employee → Server = permit HTTPS)
Advantage Policy follows user/device — ไม่ขึ้นกับ IP/VLAN/location → scalable, flexible
Propagation Inline tagging (hardware) หรือ SXP (SGT Exchange Protocol) สำหรับ devices ที่ไม่รองรับ inline
Scale 65,536 SGTs possible — typically 50-200 groups in enterprise

Micro-Segmentation Tools

Tool Approach Best For
VMware NSX Distributed firewall at vNIC level — per-VM policies VMware environments, data center
Cisco TrustSec/SGT Identity-based tagging — SGACL enforcement Cisco campus/DC environments
Illumio Agent-based — host firewall policies, visibility maps Multi-cloud, hybrid (agent on every workload)
Guardicore (Akamai) Agent-based — process-level segmentation Bare metal, legacy, cloud
Zscaler Cloud-based — ZTNA (zero trust network access) Remote users, cloud-first organizations
Azure NSG/ASG Network Security Groups + Application Security Groups Azure cloud workloads
AWS Security Groups Instance-level firewall rules (stateful) AWS cloud workloads

Zero Trust Segmentation

Principle Implementation
Verify Identity Every user/device authenticated before access — 802.1X, MFA, certificate
Least Privilege Only access what’s needed — micro-segmentation policies per application
Assume Breach Design as if attacker inside — segment everything, monitor lateral movement
Continuous Monitoring NDR (Network Detection & Response), flow analysis, behavioral analytics
Context-Aware Policy based on: who (identity) + what (device posture) + where (location) + when (time)

ทิ้งท้าย: Segmentation = Reduce Blast Radius of Every Attack

Network Segmentation Macro: VLANs, firewall zones, ACLs — coarse (zone-to-zone), traditional, lower complexity Micro: per-workload/app policies — fine-grained, prevents lateral movement within zones Firewall Zones: inside (trust), outside (untrust), DMZ, management, guest, IoT — define trust boundaries SGT/TrustSec: identity-based tags (16-bit) → SGACL policy matrix → policy follows user not IP/VLAN Tools: NSX (VMware), TrustSec (Cisco), Illumio/Guardicore (agent), cloud NSG/SG Zero Trust: verify identity + least privilege + assume breach + continuous monitoring + context-aware Key: macro-segmentation is minimum (VLANs + firewall) → micro-segmentation is goal (per-workload) → Zero Trust is the journey

อ่านเพิ่มเติมเกี่ยวกับ Network Access Control 802.1X NAC Zero Trust และ Network Security Architecture Defense in Depth ที่ siamlancard.com หรือจาก icafeforex.com และ siam2r.com

จัดส่งรวดเร็วส่งด่วนทั่วประเทศ
รับประกันสินค้าเคลมง่าย มีใบรับประกัน
ผ่อนชำระได้บัตรเครดิต 0% สูงสุด 10 เดือน
สะสมแต้ม รับส่วนลดส่วนลดและคะแนนสะสม

© 2026 SiamLancard — จำหน่ายการ์ดแลน อุปกรณ์ Server และเครื่องพิมพ์ใบเสร็จ

SiamLancard
Logo
Free Forex EA Download — XM Signal · EA Forex ฟรี
iCafeForex.com - สอนเทรด Forex | SiamCafe.net
Shopping cart