Alright, perhaps more info is in order. As stated, we run a CAN/WAN that covers about 300+ square miles of terrain and 300+ buildings each with their own class C subnet. Each switch connects back via fiber to 12 core routers, each of which acts as the gatway to the class C network in each physical building. Each of these routers are interconnected also and connect to two main routers that provide redundant paths for the entire network.
Based on what you're saying, establishing a VLAN for every single building would not make sense and is not necessary, did I interpret that correctly?
I guess my main concern is, I want the ability to segment certain hosts into a "quarantine VLAN" no matter which building (LAN segment) that they are in. Does this mean that I create a single VLAN (ie. vlan 100) in all 300+ switches and route that VLAN at every single router interface on the network?
Scenario: the IDS says that a certain host is part of a botnet. Currently we reserve the IP in DHCP and then create an ACL on the uplink port for that switch that stops all outbound connectivity. Problem is, that's a real bitch to manage and gets unwieldy with 4000+ hosts and 300+ switches. Plus, it limits our ability to connect back to them to investigate, etc. Will a "quarantine VLAN" do what I think it will and permit me to simply throw these offending hosts into it, effectively removing it from connectivity with all but a few specified IP addresses (helpdesk, security, etc)?