4.1 Reference Architecture Overview

The OT/IT network segmentation reference architecture is structured around the Purdue Enterprise Reference Architecture (PERA) model, extended with modern security zone concepts from IEC 62443 and NIST SP 800-82. The architecture defines six functional zones arranged in a hierarchical topology, with controlled communication paths between adjacent zones and strictly prohibited direct connections between non-adjacent zones. The Industrial DMZ is the central enforcement point, hosting all services that mediate communication between the OT domain and the IT domain.

The reference architecture is designed to be modular and scalable. Smaller deployments may combine the O&M Access Zone with the Industrial DMZ, while larger deployments may further subdivide the Control Zone into separate zones for different process areas or safety integrity levels. The core principle — that no direct path exists between the IT domain and the OT Core or Control Zone — must be maintained regardless of the deployment scale.

OT-IT Network Segmentation Typical System Topology

Figure 4.1: Typical OT/IT Network Segmentation Topology — Six-zone hierarchical architecture showing IT Domain, Industrial DMZ, O&M Access Zone, OT Core Zone, Control Zone, and Field Zone with all inter-zone communication paths and key devices.

Zone Purdue Level Key Systems Inbound from Outbound to Protocol Inspection
IT DomainLevel 4–5SIEM, CMDB, ERP, ReportingInternet (via IT FW)Industrial DMZ onlyStandard IT FW/IPS
Industrial DMZLevel 3.5IT-FW, OT-FW, Bastion, Historian Relay, File GW, NTP RelayIT Domain, O&M ZoneIT Domain, OT CoreDPI + OT Protocol Inspection
O&M Access ZoneLevel 3.5VPN Concentrator, MFA Server, Session RecorderInternet (vendors/staff)Industrial DMZ (Bastion)VPN + MFA enforcement
OT Core ZoneLevel 3SCADA Server, Historian, Patch StagingIndustrial DMZ onlyControl Zone, Industrial DMZOT Protocol Whitelist
Control ZoneLevel 2HMI Workstations, Engineering WSOT Core Zone onlyField Zone, OT Core ZoneIndustrial Protocol DPI
Field ZoneLevel 0–1PLCs, RTUs, IEDs, Sensors, ActuatorsControl Zone onlyControl Zone onlyPhysical/L2 isolation

4.2 Zone-to-Zone Communication Rules

The fundamental rule of the reference architecture is that communication between zones must be explicitly permitted — all traffic is denied by default. Each inter-zone boundary is enforced by a dedicated security control (firewall, data diode, or application gateway), and the permitted communication flows are defined by a zone communication matrix. The matrix specifies the permitted source zone, destination zone, protocol, port, and directionality for each allowed flow.

Source Zone Destination Zone Permitted Protocols Direction Enforcement Device Notes
IT DomainIndustrial DMZHTTPS (443), Syslog (514/TCP), NTP (123/UDP)Bidirectional (restricted)IT FirewallIT FW rules enforced; no OT protocols
Industrial DMZOT Core ZoneOPC UA (4840), Syslog, NTP, RDP (via Bastion)Bidirectional (restricted)OT FirewallDPI on OPC UA; no raw Modbus/DNP3
O&M Access ZoneIndustrial DMZ (Bastion)RDP (3389), SSH (22)Inbound to Bastion onlyVPN + OT FirewallMFA required; session recorded
OT Core ZoneControl ZoneOPC DA/UA, Modbus TCP, PROFINETBidirectional (restricted)OT Managed Switch + ACLVLAN separation; L3 ACL enforcement
Control ZoneField ZonePROFINET, EtherNet/IP, Modbus RTU, IEC 61850BidirectionalIndustrial Switch + VLANL2 isolation; no routing to OT Core
Any ZoneNon-adjacent ZoneNoneProhibitedFirewall deny-allViolation triggers alert

4.3 Industrial DMZ Detailed Design

The Industrial DMZ is the most complex zone in the architecture, hosting multiple security services that each serve a specific mediation function. The DMZ is bounded by two separate firewalls: the IT Firewall (facing the IT domain) and the OT Firewall (facing the OT Core Zone). These two firewalls must be from different vendors or product lines to prevent a single vulnerability from compromising both boundaries simultaneously — this is the dual-vendor firewall principle recommended by IEC 62443-3-3.

Within the DMZ, the following services are deployed on dedicated, hardened servers or appliances. Each service has a defined and limited communication scope — no DMZ service should have broader network access than required for its specific function. The principle of least privilege applies to all DMZ service accounts, firewall rules, and network access controls.

DMZ Service Function IT-Side Ports OT-Side Ports Hardening Requirements
Bastion / PAM ServerPrivileged access mediation for all remote O&M sessionsRDP/SSH from O&M ZoneRDP/SSH to OT Core/ControlMFA, session recording, JIT access, credential vault
Historian RelayOne-way data export of process data to IT historian/ERPOPC UA / REST API to ITOPC UA / OPC DA from OT HistorianRead-only OT connection; no write-back path
File Transfer GatewayControlled file transfer with content scanningSFTP/HTTPS from ITSFTP to OT Patch StagingAV scan, file type whitelist, size limit, audit log
NTP RelayTime synchronization relay from IT NTP to OT devicesNTP client from IT NTPNTP server to OT devicesStratum 1/2 source; no other traffic
Syslog CollectorAggregate OT security logs for forwarding to SIEMSyslog/CEF to IT SIEMSyslog from OT devicesLog integrity; no command path to OT
DNS RelayControlled DNS resolution for OT devicesDNS queries to IT DNSDNS server to OT devicesWhitelist-only resolution; no recursive queries to internet

4.4 Physical Wiring and Cabinet Design

The physical implementation of the zone architecture requires careful attention to cable management, port labeling, and physical access controls. Color-coded cabling is strongly recommended to visually distinguish between network zones and reduce the risk of incorrect connections during installation or maintenance. The standard color coding used in this guide assigns blue cables to the IT network, orange cables to the OT network, yellow cables to the management network, and green cables to fiber optic connections.

Industrial DMZ Cabinet Wiring and Device Connections

Figure 4.2: Industrial DMZ Cabinet Wiring — Rack-mount cabinet showing IT-FW, OT-FW, DMZ Switch, OT Switch, patch panels, and Bastion Server with color-coded cables: blue (IT), orange (OT), yellow (management), green (fiber). DIN rail section shows field-side industrial equipment.

Cable Color Network Zone Typical Connections Connector Type
BlueIT NetworkIT FW to IT Switch, IT Switch to IT serversRJ45 Cat6/6A
OrangeOT NetworkOT FW to OT Switch, OT Switch to SCADA/HMIRJ45 Cat6/6A
YellowManagement NetworkOOB management ports, console serversRJ45 Cat5e/6
GreenFiber (Backbone)Inter-cabinet fiber, long-distance OT linksLC/SC Duplex
GraySerial / ConsoleConsole cables, RS-232/485 serial linksDB9, RJ45 rollover

4.4.1 Cabinet Layout Recommendations

The DMZ cabinet should be organized from top to bottom in the following order: patch panels (top), IT Firewall, DMZ Switch, OT Firewall, OT Switch, Bastion Server, and power distribution units (bottom). This arrangement minimizes cable crossing between zones and makes the zone boundary visually clear. The IT-side and OT-side patch panels should be physically separated — either in different sections of the same cabinet or in separate cabinets — to prevent accidental cross-connections.

  • Cabinet must be lockable with access logging (electronic lock preferred)
  • Separate cable management trays for IT-side and OT-side cables
  • All ports not in use must be physically blanked with port blockers
  • Console access to all devices must be available via an out-of-band console server
  • Power feeds for IT-side and OT-side equipment should be from separate UPS circuits
  • Temperature and humidity monitoring sensors must be installed in the cabinet

4.5 High Availability and Redundancy Design

Critical OT environments require that the network segmentation infrastructure itself does not become a single point of failure. The reference architecture supports active-passive or active-active high availability configurations for the firewall pairs and key DMZ services. The HA design must be carefully validated to ensure that the failover process does not create a temporary security gap — specifically, the HA synchronization channel between firewall peers must be on a dedicated, isolated management network and must not carry production traffic.

Component HA Mode Failover Time State Sync Notes
IT FirewallActive-Passive<30 secondsSession state, rulesDedicated HA sync link required
OT FirewallActive-Passive<30 secondsSession state, rulesDedicated HA sync link required
DMZ SwitchStacked or LACP<1 second (LACP)VLAN, STP stateSpanning Tree must be configured
Bastion ServerActive-Passive (cluster)<60 secondsSession databaseActive sessions may be interrupted on failover
Historian RelayActive-Passive<60 secondsBuffer queueBuffered data replayed after failover
NTP RelayDual independent serversImmediate (DNS round-robin)N/AOT devices should have two NTP servers configured