VLAN Design for Building Automation Networks

Network & SecurityVLANnetwork designbroadcastBAS network
April 17, 2026|10 min read

Separate building automation traffic into dedicated VLANs by system function—one VLAN per major subsystem (HVAC controllers, lighting, metering, fire/life safety) with static IP addressing and a /24 subnet per VLAN. Place a BBMD on each BACnet/IP VLAN to handle cross-subnet broadcast forwarding, apply ACLs at inter-VLAN boundaries to restrict traffic to known protocol ports (UDP 47808 for BACnet/IP, TCP 502 for Modbus TCP), and keep the BAS network completely isolated from the corporate IT VLAN. This structure contains broadcast storms, limits the blast radius of compromised devices, and gives IT teams granular control over which systems can communicate.

The Problem: Flat Networks and Uncontrolled Broadcasts

Many building automation systems (BAS) are deployed on flat Layer 2 networks—every controller, sensor gateway, and supervisory workstation sharing a single broadcast domain. This design was common when BAS networks were physically separate from IT infrastructure, but it creates serious issues as facilities converge OT and IT onto shared Ethernet backbones.

On a flat network, every BACnet WHO-IS broadcast reaches every device. In a 500-device campus, that means hundreds of broadcast packets flooding every port on every switch, consuming bandwidth and CPU cycles on embedded controllers that have limited processing power. Worse, a single misbehaving device—a controller stuck in a broadcast loop or a technician's laptop running a misconfigured discovery tool—can saturate the entire network and bring down building systems across multiple floors or buildings.

Without VLAN segmentation, there is also no security boundary between the BAS and corporate IT systems. A compromised BAS controller on a flat network has direct Layer 2 adjacency to every other device, including IT workstations and servers. Network segmentation through VLANs is the foundational step in addressing both the performance and security problems inherent to flat BAS deployments.

VLAN Design for Building Automation Systems

The goal of VLAN segmentation in a BAS context is to create logical broadcast domains that align with how building systems actually communicate. Unlike IT networks where VLANs often follow organizational boundaries (departments, floors), BAS VLANs should follow system function and trust level.

Subnet and VLAN Sizing

A /24 subnet (254 usable addresses) is the standard starting point for most BAS VLANs. It provides enough addresses for a full floor or building wing of controllers while keeping the broadcast domain small. For very large campuses, a /23 (510 addresses) can accommodate a bigger segment, but going beyond that reintroduces the broadcast problems you are trying to eliminate.

Use static IP addressing for all BAS devices. DHCP introduces unpredictability—address changes break firewall rules, BBMD tables, COV subscriptions, and alarm routing configurations. Reserve a DHCP range only for technician laptops on a dedicated service VLAN.

Recommended VLAN Structure

The following structure separates systems by function and trust level. Each VLAN gets its own /24 subnet, keeping broadcast domains tight and ACL rules straightforward:

VLAN IDNameSubnetPurpose
110BAS-HVAC10.10.10.0/24HVAC controllers, VAV boxes, AHU controllers
120BAS-LIGHTING10.10.20.0/24Lighting controllers, occupancy sensors, DALI gateways
130BAS-METER10.10.30.0/24Power meters, water meters, Modbus TCP gateways
140BAS-FIRE10.10.40.0/24Fire alarm panels, smoke control integration (often read-only)
150BAS-ACCESS10.10.50.0/24Access control panels, card readers, elevator integration
160BAS-SERVER10.10.60.0/24BAS head-end servers, supervisory workstations, BBMD hub
199BAS-SERVICE10.10.99.0/24Technician laptops, commissioning tools (DHCP allowed)

Use VLAN IDs in the extended range (above 1005) if your OT infrastructure needs to avoid collisions with existing IT VLAN assignments. Many IT departments reserve VLAN IDs 1–999 for corporate use, so starting BAS VLANs at 1100 or higher prevents conflicts during network convergence projects.

Protocol and Port Mappings for BAS Traffic

Understanding which ports and protocols each BAS subsystem uses is essential for writing accurate ACLs and firewall rules. The following table covers the most common building automation protocols encountered in a segmented network:

ProtocolTransportPort(s)Traffic TypeVLAN Considerations
BACnet/IPUDP47808 (0xBAC0)Discovery (broadcast), reads/writes (unicast)Requires BBMD for cross-VLAN broadcast forwarding
BACnet/SCTCP (TLS/WSS)443All BACnet traffic over encrypted WebSocketHub-and-spoke model; no BBMD needed
Modbus TCPTCP502Register reads/writes (unicast only)No broadcast; simple ACL between meter VLAN and server VLAN
LonWorks/IP (EN-14908)UDP1628, 1629LonTalk over IP encapsulationChannel-based; configure IP multicast or unicast per channel
KNXnet/IPUDP3671Tunneling and routing for KNX devicesUses multicast (224.0.23.12); enable IGMP snooping on the VLAN
MQTTTCP1883 / 8883 (TLS)Publish-subscribe telemetryUnicast to broker; permit traffic to broker IP only
HTTPS (BAS Web UI)TCP443Supervisory dashboard, configuration interfacesRestrict source to server VLAN and service VLAN
NTPUDP123Time synchronization for all BAS devicesAllow from all BAS VLANs to designated NTP server

Inter-VLAN Routing Considerations

Once BAS traffic is segmented into VLANs, a Layer 3 device—typically a managed switch with routing capability or a dedicated firewall—handles inter-VLAN routing. This is where you enforce access control.

Routing Architecture

The recommended approach is to route all inter-VLAN BAS traffic through a firewall or Layer 3 switch with ACL support. Avoid using "router-on-a-stick" configurations with a single uplink for large BAS deployments; the single link becomes a bottleneck and a single point of failure. Instead, use a dedicated Layer 3 switch stack or a firewall with multiple VLAN interfaces.

ACL Rules by Principle of Least Privilege

Each BAS VLAN should only be able to reach the specific VLANs and ports it needs. For example:

Block all traffic between peer BAS VLANs by default. HVAC controllers have no reason to talk directly to lighting controllers or access control panels. All communication should flow through the BAS server VLAN, where the head-end system aggregates and coordinates data.

BACnet Broadcast Handling Across VLANs

BACnet/IP relies on UDP broadcast for device discovery (WHO-IS/I-AM services). When you segment BACnet devices into separate VLANs, broadcasts are contained within each VLAN by design—which is exactly what you want for traffic management, but it breaks cross-subnet device discovery. This is where BACnet Broadcast Management Devices (BBMDs) become essential.

How BBMDs Work

A BBMD listens for BACnet broadcast traffic on its local subnet and forwards it as unicast UDP to BBMDs on other subnets. The receiving BBMD then re-broadcasts the message on its local subnet. This "two-hop" process preserves BACnet discovery across VLAN boundaries without requiring a flat network.

BBMD Placement Rules

Foreign Device Registration

When a technician connects a laptop to the BAS-SERVICE VLAN and needs to discover BACnet devices on other VLANs, the laptop must register as a Foreign Device with the target VLAN's BBMD. This is configured in the BACnet tool (such as YABE or a vendor's commissioning application) by pointing it at the BBMD's IP address. The firewall ACL for the service VLAN must permit UDP 47808 from the service subnet to the BBMD address on the target VLAN.

BACnet/SC as an Alternative

BACnet Secure Connect (BACnet/SC) eliminates the need for BBMDs entirely. It uses a hub-and-spoke topology over TLS-encrypted WebSocket connections (TCP 443), where a central hub distributes messages to all connected nodes. For new deployments or major retrofits, BACnet/SC simplifies the VLAN design because you no longer need to manage BDTs or worry about broadcast forwarding. The trade-off is that all devices must support the BACnet/SC standard (ASHRAE 135-2020, Addendum BJ), which limits compatibility with legacy controllers.

Sample VLAN Plan: Mid-Size Office Building

The following is a complete VLAN plan for a 10-story office building with approximately 300 BAS devices. It demonstrates how the principles above translate into a real deployment.

# ============================================
# VLAN Plan: 10-Story Office Building BAS
# Approx. 300 devices, single BAS head-end
# ============================================

# --- BAS VLANs ---
VLAN 110  BAS-HVAC        10.10.10.0/24   # 85 VAV controllers, 12 AHUs, 6 plant controllers
VLAN 120  BAS-LIGHTING    10.10.20.0/24   # 40 DALI gateways, 20 occupancy sensors
VLAN 130  BAS-METER       10.10.30.0/24   # 30 power meters (Modbus TCP), 8 water meters
VLAN 140  BAS-FIRE        10.10.40.0/24   # 4 fire alarm panels (read-only BACnet integration)
VLAN 150  BAS-ACCESS      10.10.50.0/24   # 15 access control panels, 2 elevator controllers
VLAN 160  BAS-SERVER      10.10.60.0/24   # 2 BAS head-end servers, 1 BBMD appliance
VLAN 199  BAS-SERVICE     10.10.99.0/24   # Technician laptops (DHCP: .100-.200)

# --- BBMD Configuration ---
# VLAN 110 BBMD: 10.10.10.1  (AHU controller with BBMD capability)
# VLAN 120 BBMD: 10.10.20.1  (Lighting gateway with BBMD capability)
# VLAN 140 BBMD: 10.10.40.1  (Fire panel BACnet gateway)
# VLAN 160 BBMD: 10.10.60.5  (Dedicated BBMD appliance - hub)
#
# BDT on each BBMD includes: 10.10.10.1, 10.10.20.1, 10.10.40.1, 10.10.60.5
# VLAN 130 (meters) uses Modbus TCP - no BBMD needed
# VLAN 150 (access) uses proprietary protocol - no BBMD needed

# --- Inter-VLAN ACL Summary ---
# VLAN 110 -> VLAN 160: PERMIT UDP 47808 (BACnet), PERMIT UDP 123 (NTP)
# VLAN 120 -> VLAN 160: PERMIT UDP 47808 (BACnet), PERMIT UDP 123 (NTP)
# VLAN 130 -> VLAN 160: PERMIT TCP 502 (Modbus), PERMIT UDP 123 (NTP)
# VLAN 140 -> VLAN 160: PERMIT UDP 47808 (BACnet, read-only), PERMIT UDP 123 (NTP)
# VLAN 150 -> VLAN 160: PERMIT TCP 443 (HTTPS management), PERMIT UDP 123 (NTP)
# VLAN 199 -> ALL BAS:  PERMIT UDP 47808, TCP 502, TCP 443 (controlled access)
# ALL BAS  -> VLAN 160: PERMIT ICMP echo (for diagnostics)
# DEFAULT: DENY all other inter-VLAN traffic

Common Mistakes

Platform Compatibility

VLAN segmentation is infrastructure-level and works with any BAS platform that uses standard IP networking. The design principles in this guide apply regardless of the BAS vendor or controller platform:

BAS PlatformProtocol(s)VLAN Notes
Johnson Controls MetasysBACnet/IP, BACnet/SCSupports BBMD on NAE/SNE controllers. Metasys 12.0+ supports BACnet/SC.
Siemens Desigo CCBACnet/IP, BACnet/SCPXC controllers support BBMD. Desigo CC 6.0+ supports BACnet/SC hub.
Tridium Niagara (JACE / Niagara Supervisor)BACnet/IP, Modbus TCP, LonWorks/IPJACE 8000 supports BBMD and Foreign Device registration. Niagara 4.13+ adds BACnet/SC.
Honeywell EBI / Niagara-basedBACnet/IP, LonWorks/IPSpyder controllers support BACnet/IP. BBMD via Honeywell IP router or third-party.
Schneider Electric EcoStruxureBACnet/IP, Modbus TCPSmartX controllers support BBMD. Separate Modbus TCP VLAN for PowerLogic meters.
Distech Controls EC-BOS / ECLYPSEBACnet/IP, BACnet/SCECLYPSE controllers support BBMD and BACnet/SC. EC-BOS acts as BACnet router.

For the network switching hardware, any managed switch that supports IEEE 802.1Q VLAN tagging and Layer 3 routing or ACLs will work. Cisco Catalyst, HPE Aruba, and Juniper EX series are commonly deployed in BAS network environments. Ensure the switch supports IGMP snooping if you run KNXnet/IP or LonWorks/IP, as these protocols use multicast.

Source Attribution

This guide draws on technical documentation and community discussion from the following sources:

VLANnetwork designbroadcastBAS networkIT/OT

Was this article helpful?

Related Articles

Need to do this remotely? SiteConduit connects remote technicians directly to the BAS VLAN without exposing corporate IT networks. Join the waitlist.

SC

SiteConduit Technical Team

Idea Networks Inc.

SiteConduit builds managed remote access for building automation. Our knowledge base is maintained by BAS professionals with hands-on experience deploying and troubleshooting BACnet, Niagara, Modbus, and Facility Explorer systems.