12. May 2026
Lesezeit: ca. 7 Minuten
Linda Fritzler

NIS2 and Network Segmentation: A Practical Guide

The NIS2 Directive has been law in Germany since 6 December 2025. Six months later, the issue is really starting to capture the attention of our clients’ senior management – and there is a reason for that.

In recent weeks, we have been asked more and more frequently about an issue that is dealt with only in theoretical terms in the vast majority of NIS2 articles online: network segmentation. What exactly does this requirement entail in practical terms? Which zones do you need? What hardware? Where do medium-sized companies typically go wrong?

Why NIS2 is only now becoming truly significant

The German NIS2 Implementation Act has been in force since 6 December 2025. The fact that it is only now, six months later, beginning to take full effect is down to three factors:

Firstly, the BSI registration portal went live in January 2026. Around 29,500 companies in Germany are directly affected – and must self-assess, register and maintain verifiable cybersecurity measures. There is no transition period, nor is there any notification from the authorities as to whether a company is affected. This obligation rests entirely with the company.

Secondly, the penalties are real: Violations carry fines of up to 10 million euros or 2 per cent of the previous year’s global turnover. Added to this is the personal liability of the management. BSI President Claudia Plattner put it clearly: with NIS2, cybersecurity has become a matter for top management.

Thirdly, the authorities are only just beginning to organise themselves. In mid-March 2026, the BSI published its NIS 2 checklist, with FAQs and sector-specific guidance being released on an ongoing basis. In other words: the tools used for compliance checks have only been specifically available to authorities and companies for a few weeks. Those who act now are ahead of the game – those who wait risk not only fines but also frantic last-minute projects.

What NIS2 really requires in terms of networking

NIS2 requires ten risk management measures. One of these – and the key one for our topic – is network segmentation.

In a nutshell: your network can no longer be a vast open space where every client can access every system. You must divide it into zones based on risk, draw clear boundaries between trusted and less trusted areas, and limit data traffic between these zones to what is strictly necessary.

Among other things, NIS2 requires:

  • A functional, logical and physical analysis of which systems need to communicate with one another – and which do not.
  • Access to zones only following a security assessment.
  • Secure zones for critical systems.
  • A Demilitarised Zone (DMZ) for incoming and outgoing network traffic.
  • Separation of administrative networks from the operational network.
  • Separation of production, test and development systems.
  • Regular review of segmentation at fixed intervals.

This may sound very theoretical at first. In practice, it means: every printer, every IP camera, every server and every switch needs a clearly defined place on the network – and the permissions between these locations must be documented, enforced and verifiable.

The 7 steps to NIS2-compliant network segmentation

The structure of a NIS2 project has been deliberately designed not for large corporations, but for medium-sized businesses with 20 to 250 employees – in other words, precisely the target group that is facing such requirements for the first time as a result of NIS2.

Step 1: Inventory and network map

Nothing works without a complete inventory. Every project starts with the question: what is actually on your network? You’d be surprised how often devices are found that nobody knew existed anymore – old NAS systems, forgotten test servers, IP telephone systems, IoT cameras from the last refurbishment. Each of these devices is a potential point of entry.

Specifically: all end devices, servers, printers, IoT and OT components, switches, access points and firewalls are recorded – along with the software running on them and its version. This list is also a NIS2 requirement. Without it, you cannot carry out a risk assessment.

Step 2: Risk assessment per system

Which system is critical to business operations? What contains data requiring protection? Which is particularly vulnerable (perhaps because it has outdated firmware)? This assessment determines which zone a system belongs to.

In the simplest case, a classification into high / medium / low is sufficient – the important thing is that the assessment is documented in a comprehensible manner. Audits check not only the result, but also the process leading up to it.

Step 3: Develop a zone concept

This is where things get specific. For most SMEs, a five-zone model has proven to be practical:

  1. Office zone: Staff workstations, laptops, printers.
  2. Server/production zone: Domain controllers, ERP, file servers, critical applications.
  3. Management zone: Configuration interfaces for switches, firewalls, access points, servers (BMC/iLO), UPS management.
  4. Guest/Wi-Fi zone: visitor network, BYOD devices, staff smartphones.
  5. IoT/OT zone: IP cameras, door control, printers (if network-critical), production and control technology.

Depending on the industry, specialised zones may be added – such as a DMZ for externally accessible services or an isolated backup zone. In manufacturing facilities, the separation of IT and OT networks is practically always mandatory.

Step 4: VLAN strategy and IP plan

Each zone is assigned its own VLANs and IP ranges. This may sound trivial, but it is often precisely where things go wrong in mature networks: subnets overlap, VLAN IDs are duplicated, and nobody knows what is actually behind VLAN 17 anymore.

We recommend managed switches that can map VLANs cleanly – often from the LANCOM or NETGEAR range, depending on requirements and budget. Unmanaged switches do not process VLAN tags. They are therefore not an option wherever multiple zones are to converge on a single switch. In places where only devices from a single zone are connected – such as a small switch under the desk for two office PCs – they remain a safe choice.

Step 5: Firewall rules between zones

This is where the real security benefit lies. VLANs alone provide only logical separation – without firewall rules between zones, segmentation is virtually worthless. A next-generation firewall, such as one from the SonicWall NSa or TZ series, handles this task as an inspection-enabled inter-VLAN router. We show how organisations can meet the requirements of NIS2 with SonicWall solutions in our blog post “How to achieve compliance with SonicWall”.

Rule of thumb: By default, everything is blocked between zones and only the connections that are truly necessary are enabled. Not the other way round. This is the core of the zero-trust concept and directly aligns with the NIS2 requirement to “restrict access to what is necessary”.

In practice, this means: Office PCs are allowed access to the file server, but not to the management VLAN. Printers are allowed to receive print jobs, but not to access the internet. The guest zone has no access whatsoever to internal systems, only to the internet – via the firewall, not directly.

Step 6: Strictly isolate the management network

This is the point that regularly leads to issues during NIS2 audits, because almost everyone underestimates it. The configuration interfaces of your switches, firewalls, access points, NAS systems and UPSs are the most attractive target of all for attackers – whoever gains access here controls the infrastructure. This is precisely why NIS2 explicitly requires administrative networks to be separated from the operational network.

In practical terms, this means: a separate VLAN, a separate IP range, and access only via a jump host with multi-factor authentication or via a dedicated admin workstation. No switch’s web interface should be accessible directly from an administrator’s office PC.

Step 7: Documentation and regular review

If it isn’t documented, it doesn’t exist for an auditor. You need an up-to-date network diagram, an overview of zones and VLANs, documented firewall rules, and a fixed timeframe within which to review their effectiveness. NIS2 mandates these reviews at fixed intervals – at least once a year is a reasonable benchmark.

The 5 most common mistakes we see in practice

  1. VLANs without a firewall in between. The separation exists on paper, in the switch configuration dialogue – but there is no inspection taking place between the zones. Malware that infects an office laptop can still spread unhindered.
  2. Printers and IoT devices in the office VLAN. Printers, IP cameras and smart door sensors are notoriously insecure – often running old firmware, using fixed default passwords and with a lifespan that extends beyond any security support. They belong in a separate segment, not amongst staff devices.
  3. Backup servers in the production VLAN. If a production system is encrypted by ransomware, the backup is usually affected as well in this setup. The backup system belongs in its own zone with unidirectional data flow – writing from the outside, reading only by admins with dedicated access.
  4. External service providers with Office VPN access. Service partners, IT service providers, maintenance firms – they often only need access to a single server, but end up with access to the entire office network. A dedicated service provider zone with minimal permissions helps here, ideally combined with zero-trust solutions such as SonicWall Cloud Secure Edge.
  5. Management interfaces in the standard zone. See step 6 above. The management networks must be separated from the operational network.

The specific hardware you need

NIS2-compliant segmentation stands or falls on the technology used. Three components are crucial for this:

Managed switches with VLAN functionality – depending on the project size and budget, we typically use LANCOM or NETGEAR models; in production environments, we often also use SonicWall switches, which can be managed directly from the firewall.

  • A next-generation firewall that acts as a router between zones and actively inspects traffic. We have had extensive experience with SonicWall in this area for many years – as a certified SonicWall Mastery Gold Partner, we have gained in-depth knowledge of the product range and configuration practices through countless hours of project work.
  • Access points with multi-SSID and VLAN tagging capabilities, ensuring that different Wi-Fi networks (staff, guests, IoT) are neatly assigned to their respective zones.

For those wishing to explore SonicWall’s capabilities in the NIS2 context in greater depth, we recommend our in-house guide, ‘Navigating NIS2: SonicWall’s Guide to Compliance’ – a free document that concisely summarises the key requirements and suitable solutions.

What you need to document for an audit

Organisations that successfully pass a NIS2 audit generally have the following documentation available in a complete and traceable form:

  • An up-to-date network diagram showing all zones, subnets and firewall locations.
  • A zoning concept explaining why specific systems are classified where they are.
  • A list of all firewall rules between zones, ideally with a risk assessment for each rule.
  • The process for changes to the segmentation – who is authorised to do what, and with what approval.
  • Test reports from regular checks.
  • A recovery plan in case the segmentation needs to be rebuilt, for example following a hardware failure.

The BSI provides a range of checklists and one-page guides at bsi.bund.de, which we highly recommend for your preparation.

Conclusion: It’s cheaper to start now than to catch up later

The directive is already enshrined in law and the authorities are preparing to implement it. At the same time, the effort required to achieve proper network segmentation increases if inventories are missing and complex structures are not streamlined.

If you are unsure where your company stands with regard to NIS2 or how to achieve your network segmentation goals in a practical way: get in touch with us. We offer a free initial consultation on NIS2 network segmentation, during which we will jointly assess the current situation so that you know where you stand.

Get in touch now with no obligation

Service Hotline
+49 (0)391 8358-419549
Mon-Thu, 9:00 a.m. - 4:30 p.m. and Fri, 9:00 a.m. - 3:00 p.m.
(at standard landline rates; mobile phone rates depend on the respective mobile phone provider)
eyeusercalendar-fullmagnifiercrosslistchevron-leftchevron-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram