
{"id":3402,"date":"2025-03-25T16:09:52","date_gmt":"2025-03-25T12:09:52","guid":{"rendered":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?p=3402"},"modified":"2025-04-13T15:25:24","modified_gmt":"2025-04-13T11:25:24","slug":"segmentation-of-networks","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/","title":{"rendered":"Segmentation of networks"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>More performance and IT security in production<\/strong><\/h2>\n\n\n\n<p>In modern production environments, a high-performance network connection provides a crucial competitive advantage. Moreover, <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/products\/industrial-communication\" target=\"_blank\" rel=\"noreferrer noopener\">networked production systems<\/a> dynamically receive production orders to ensure optimal utilization. For process analysis, production data is essential to understand and optimize subprocesses or entire processes. Additionally, it is important to securely archive quality-related information, such as calibration protocols.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"565\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\" alt=\"Segmentation of networks\" class=\"wp-image-3411\" style=\"width:666px;height:auto\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png 811w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1-300x209.png 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1-768x535.png 768w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1-624x435.png 624w\" sizes=\"auto, (max-width: 811px) 100vw, 811px\" \/><\/a><\/figure><\/div>\n\n\n<!--more-->\n\n\n\n<p>The network should be clearly structured or segmented to perform various tasks effectively. Network segmentation enhances performance and IT security by preventing unnecessary data traffic and reducing potential attack vectors. Important production systems can be redundantly coupled for seamless communication during failures. Segmentation simplifies administration and monitoring, making it easier to identify affected areas during problems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Production network as a connection network between IT and OT<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"501\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/00189432_full_b1000-1.jpg\" alt=\"certified under IEC 62443-2-4, Production network as a connection network between IT and OT\" class=\"wp-image-3417 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/00189432_full_b1000-1.jpg 500w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/00189432_full_b1000-1-300x300.jpg 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/00189432_full_b1000-1-150x150.jpg 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>For effective production network segmentation, IT and OT must collaborate closely to create a holistic security concept. Phoenix Contact, certified under <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/iec-62443-the-industrial-cybersecurity-standardFor effective production network segmentation, IT and OT must collaborate closely to create a holistic security concept. Phoenix Contact, certified under IEC 62443-2-4, offers expert support. Comprehensive solutions are essential, as individual measures can be bypassed, compromising security. Phoenix Contact also faced challenges in segmenting its own large subnetworks, requiring clear responsibility agreements between IT and OT.\">IEC <\/a><a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/iec-62443-the-industrial-cybersecurity-standardFor effective production network segmentation, IT and OT must collaborate closely to create a holistic security concept. Phoenix Contact, certified under IEC 62443-2-4, offers expert support. Comprehensive solutions are essential, as individual measures can be bypassed, compromising security. Phoenix Contact also faced challenges in segmenting its own large subnetworks, requiring clear responsibility agreements between IT and OT.\" target=\"_blank\" rel=\"noreferrer noopener\">62443<\/a><a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/iec-62443-the-industrial-cybersecurity-standardFor effective production network segmentation, IT and OT must collaborate closely to create a holistic security concept. Phoenix Contact, certified under IEC 62443-2-4, offers expert support. Comprehensive solutions are essential, as individual measures can be bypassed, compromising security. Phoenix Contact also faced challenges in segmenting its own large subnetworks, requiring clear responsibility agreements between IT and OT.\">-2-4<\/a>, offers expert support. Comprehensive solutions are essential, as individual measures can be bypassed, compromising security. Phoenix Contact also faced challenges in segmenting its own large subnetworks, requiring clear responsibility agreements between IT and OT.<\/p>\n<\/div><\/div>\n\n\n\n<p>To optimize the network connection between IT and OT, IT established a production network linking both areas. Individual production segments were connected to this network. Machine communication was analyzed to ensure optimal operation, identifying the data exchange protocols used. For instance, Layer 2 protocols, like Profinet, must operate within the same segment.<\/p>\n\n\n\n<p>The segments are protected by an mGuard firewall in Router mode, using communication relationships to create firewall rules. The segment firewall allows necessary connections with external devices. The mGuard firewall&#8217;s 1:1 NAT function translates IP addresses outside the segment, eliminating the need for IP changes or special configuration tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>VPN and local notebook access can be enabled and disabled on site<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"736\" height=\"507\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/2-3.png\" alt=\"Ethernet switches and security routers\" class=\"wp-image-3418 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/2-3.png 736w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/2-3-300x207.png 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/2-3-624x430.png 624w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>To integrate additional network components into brownfield systems, a scalable control cabinet solution was developed. This allowed easy system conversion. The expert team included additional functions in the control cabinet concept. Besides firewall functions, the mGuard Secure Cloud platform provided VPN access to segments, controllable on-site by OT personnel. A light on the control cabinet indicates the connection status to production employees.<\/p>\n<\/div><\/div>\n\n\n\n<p>The DMZ port of the mGuard firewall is configured for local service, allowing a service notebook to communicate only within the segment. This access can be toggled on-site. An integrated redundant, uninterruptible power supply boosts availability. A built-in door switch indicates when the control cabinet door is open. Diagnostic information and alarms are sent via SNMP traps by the mGuard firewall and managed switch to signal voltage failures, additional component connections, or door openings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Central management software simplifies device management<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>Production systems were gradually connected to the new OT production network using the in-house developed control cabinet solution, in cooperation with IT. Firewall rule sets were adapted based on mGuard firewall protocol files to allow only necessary connections. Unrequired connections are discarded but listed in the firewall protocol, identifying necessary and unnecessary connections if component documentation is incomplete.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"807\" height=\"565\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/3-2.png\" alt=\"Production network as a connection network between IT and OT\" class=\"wp-image-3414 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/3-2.png 807w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/3-2-300x210.png 300w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/3-2-768x538.png 768w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/3-2-624x437.png 624w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/figure><\/div>\n\n\n\n<p>After initial commissioning, individual firewalls were integrated into the mGuard Device Manager for simplified management. Consequently,\u00a0all mGuard devices can be centrally configured and administered via templates. Firewall rules and NAT settings are uploaded with a click. Furthermore, the FL NETWORK MANAGER software supports initial commissioning and management of FL 2000 series switches, handling IP address assignment, firmware updates, and VLAN configuration. Configurations can be changed, archived, or restored on selected switches via menus or SNMP scripting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>New features in accordance with the EU\u00a0Directive NIS\u00a02.0<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:39% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"568\" src=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/4-2.png\" alt=\"Data Security Box \" class=\"wp-image-3413 size-full\" srcset=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/4-2.png 498w, https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/4-2-263x300.png 263w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Previously, people often thought, &#8220;IT security doesn&#8217;t concern me; nothing will happen.&#8221; However, reality shows that any company can be targeted, as evidenced by the daily flood of phishing emails designed to steal information or infect systems with harmful attachments.<\/p>\n<\/div><\/div>\n\n\n\n<p>The EU Directive for Network and Information Security (NIS 2.0), presented in December 2020, sets increased requirements for eight critical sectors, including medical devices, computers, electrical systems, machine building, automobiles, and transportation. Supply chain suppliers are also affected. Operators must implement minimum standards to protect IT systems and networks. Published in the Official Journal of the European Union on December 27, 2022, member states must transpose the Directive into national law by October 2024. Operators should be aware of the growing threat of attacks and develop a multilayered strategy to mitigate this danger.<\/p>\n\n\n\n<p>Learn more about <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/industries\/digital-factory\" target=\"_blank\" rel=\"noreferrer noopener\">digital factory<\/a> and <a href=\"https:\/\/www.phoenixcontact.com\/en-ae\/products\/industrial-communication\" target=\"_blank\" rel=\"noreferrer noopener\">industrial communication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More performance and IT security in production In modern production environments, a high-performance network connection provides a crucial competitive advantage. Moreover, networked production systems dynamically receive production orders to ensure optimal utilization. For process analysis, production data is essential to understand and optimize subprocesses or entire processes. Additionally, it is important to securely archive quality-related [&hellip;]<\/p>\n","protected":false},"author":357,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3402","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Segmentation of networks | Middle East<\/title>\n<meta name=\"description\" content=\"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Segmentation of networks | Middle East\" \/>\n<meta property=\"og:description\" content=\"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Middle East\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T12:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-13T11:25:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"811\" \/>\n\t<meta property=\"og:image:height\" content=\"565\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rehab Saleh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rehab Saleh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/\",\"name\":\"Segmentation of networks | Middle East\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\",\"datePublished\":\"2025-03-25T12:09:52+00:00\",\"dateModified\":\"2025-04-13T11:25:24+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281\"},\"description\":\"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\",\"contentUrl\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Segmentation of networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/\",\"name\":\"Middle East\",\"description\":\"PHOENIX CONTACT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281\",\"name\":\"Rehab Saleh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g\",\"caption\":\"Rehab Saleh\"},\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/vml9bt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Segmentation of networks | Middle East","description":"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/","og_locale":"en_US","og_type":"article","og_title":"Segmentation of networks | Middle East","og_description":"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus","og_url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/","og_site_name":"Middle East","article_published_time":"2025-03-25T12:09:52+00:00","article_modified_time":"2025-04-13T11:25:24+00:00","og_image":[{"width":811,"height":565,"url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png","type":"image\/png"}],"author":"Rehab Saleh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rehab Saleh","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/","name":"Segmentation of networks | Middle East","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png","datePublished":"2025-03-25T12:09:52+00:00","dateModified":"2025-04-13T11:25:24+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281"},"description":"Data transmission from the field to the control level with industrial communication: \u2713 Industrial Ethernet \u2713 Wireless \u2713 Cybersecurity \u2713 Fieldbus","breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#primaryimage","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png","contentUrl":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-content\/uploads\/sites\/9\/2025\/03\/1-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/segmentation-of-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/"},{"@type":"ListItem","position":2,"name":"Segmentation of networks"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#website","url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/","name":"Middle East","description":"PHOENIX CONTACT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/f082d19c085d32a2ba4d429127104281","name":"Rehab Saleh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50c529c9e01c93ce87ad2a7073c25b0fe60586e0be6673ecb4fafb48b3acc8ca?s=96&d=mm&r=g","caption":"Rehab Saleh"},"url":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/author\/vml9bt\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/users\/357"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/comments?post=3402"}],"version-history":[{"count":1,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3402\/revisions"}],"predecessor-version":[{"id":3419,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/posts\/3402\/revisions\/3419"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/media?parent=3402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/categories?post=3402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-ae\/wp-json\/wp\/v2\/tags?post=3402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}