Home/Blog/How-To

How to Configure VLANs for Building Automation Networks

A BAS-specific guide to VLAN design, protocol-port mappings, and maintaining remote access after segmentation.

April 30, 2026|11 min read|How-To

Your building has HVAC controllers, lighting panels, energy meters, and access control systems all sitting on the same network as corporate email and accounting software. One compromised BACnet controller — and the attacker has a path to your finance database. This is not a theoretical risk. It is the documented reality in a majority of commercial buildings.

VLAN segmentation fixes this by isolating building automation systems from corporate IT traffic. But doing it wrong — breaking BACnet discovery, cutting off vendor remote access, or over-segmenting into a management nightmare — is almost as common as not segmenting at all. This guide covers how to design VLANs specifically for BAS environments, with protocol-port mappings, firewall rules, and remote access considerations.

Why VLANs matter for building automation

VLAN segmentation serves three purposes in a BAS environment:

VLAN design for BAS: which systems get their own VLAN

The level of segmentation depends on the building size and risk tolerance. Here are three approaches, from minimum to maximum segmentation:

Minimum: one BAS VLAN

All building automation devices — HVAC, lighting, metering, fire alarm, access control — on a single VLAN, separate from corporate IT. This is the simplest approach and addresses the primary risk (IT/OT separation). It is appropriate for smaller buildings with a single integrator.

Recommended: segmented by system type

This structure isolates systems by function while keeping the number of VLANs manageable. The BAS management VLAN communicates with all other BAS VLANs through controlled firewall rules.

Maximum: per-vendor or per-floor segmentation

Large campuses with multiple buildings and multiple integrators may segment further — per vendor, per floor, or per building. This provides the finest-grained access control but increases management complexity. Only pursue this level if you have the staff and tools to maintain the firewall rules.

Protocol-port reference table

When writing firewall rules between BAS VLANs, these are the protocols and ports you need to allow:

Inter-VLAN firewall rules

The default rule for all inter-VLAN traffic should be deny. Then add specific allow rules:

BAS management VLAN to HVAC VLAN

BAS management VLAN to metering VLAN

Corporate IT VLAN to any BAS VLAN

BACnet broadcast handling

BACnet/IP uses broadcast for device discovery. After segmenting BACnet devices across VLANs, broadcast packets do not cross VLAN boundaries. You have two options:

For most buildings, keeping all BACnet/IP devices on a single VLAN (separate from IT) is the practical choice. It avoids BBMD complexity while achieving the primary goal of IT/OT separation.

The remote access question

Network segmentation creates an immediate problem: how do your BAS integrators access the building remotely?

Before segmentation, the integrator connected through a VPN to the corporate network and reached BAS devices because everything was on the same flat network. After segmentation, the BAS VLAN is isolated. The corporate VPN no longer reaches it — which is exactly the point.

There are two approaches to restoring remote access:

Option 1: Firewall rules for VPN access to BAS VLAN

Add firewall rules allowing VPN users to reach the BAS VLAN. This technically works but reintroduces the same problems that segmentation was supposed to solve: full network access through the VPN, no protocol filtering, no session limits, no audit trail. The integrator is back to having unrestricted access to the BAS network.

Option 2: Purpose-built remote access on the BAS VLAN

Place a managed remote access device on the BAS VLAN. The integrator connects through that device, not through the corporate network. Sessions are time-limited, protocol-restricted, and fully audited. The corporate network is never involved.

Option 2 is the approach that compliance frameworks expect. NIST 800-82 and IEC 62443 both require that remote access to OT networks be controlled separately from IT remote access, with OT-specific session management.

Common mistakes

Flat OT networks

Creating a single BAS VLAN but not applying any firewall rules between the BAS VLAN and IT VLANs. A VLAN without firewall rules is a cosmetic change — Layer 3 traffic still flows freely. Every VLAN needs explicit firewall rules to be effective.

Over-segmentation

Creating 20 VLANs for a single building with 50 BACnet devices. The management overhead (firewall rules, BBMD configuration, routing) exceeds the security benefit. Start with 3-5 VLANs and add more only when a specific risk justifies it.

Forgetting about BACnet broadcast

Putting BACnet/IP devices on two VLANs without configuring BBMDs or IP-directed broadcast forwarding. The BAS supervisor loses visibility to half the controllers. Test device discovery from every subnet after segmentation.

Blocking NTP

BAS controllers need accurate time for scheduling (HVAC start/stop times, lighting scenes) and audit logging. Blocking NTP between the BAS VLAN and a time server causes clock drift that breaks scheduled operations and makes audit logs unreliable.

Verification checklist

After implementing VLAN segmentation, verify the following:


SiteConduit provides the remote access layer for segmented BAS networks. When you move your building automation to its own VLAN, SiteConduit gives your integrators protocol-restricted, time-limited, fully audited access — without routing through the corporate network.

Join the waitlist for early access, or visit our FAQ to learn more.

HB

Hayden Barker

Founder, SiteConduit — Idea Networks Inc.

Hayden has spent over a decade designing and deploying network infrastructure for building automation environments. He built SiteConduit after seeing firsthand how traditional VPNs and remote access tools fail to meet the security and operational needs of BAS integrators and building owners.

Remote Access That Works After Segmentation

Protocol-restricted, time-limited sessions on your BAS VLAN. No corporate VPN required.

No spam. We'll only email you about SiteConduit access.