As others have indicated, VLANs are the way to go. Here's an example topology to get you started:
Network 1: PCs, Servers, etc
Network: 192.168.1.0/24
Gateway: 192.168.1.1
VLAN: 1
Network 2: IP cameras, NVR, etc
Network: 192.168.100.0/24
Gateway: 192.168.100.1
VLAN: 100
Following conventional topology, if PC1 (192.168.1.100) needs to connect to CAM1 (192.168.100.100), it would need to follow this path:
PC1 ----- Switch1----- Router1 ----- Router2----- Switch2 ----- CAM1
Using VLANs we can collapse this into one switch and one router:
Router
| |
| |
Switch -- PC1 (VLAN1)
|
|
CAM1 (VLAN100)
Devices on VLAN1 do not see devices on VLAN100. This is Layer 2 segmentation. Devices on separate VLANs need a router (Layer 3) to talk. If PC1 attempts to access CAM1, it will need to send the traffic to the gateway (192.168.1.1) which must have a route to the gateway for VLAN 100 (192.168.100.1). Those gateways can be on the same router, different VLANs.
In practice, then: PC1 sends the packet to the switch, which sends it to the router (VLAN1). VLAN1 sends it to VLAN100, which then sends it back to the switch, which forwards it on to CAM1. Functionally it is the same topology in the first diagram, with a lot less equipment.
To setup a network with VLANs, you need managed switches and advanced routers. Some switches are Layer 3 capable and can perform both Layer 2 (VLAN, switching) and Layer 3 (routing) functions.
Helpful topics include:
Trunk Port (can carry multiple VLANs)
Access Port (only 1 VLAN)
802.1Q (VLAN encapsulation)
Layer 2
Layer 3
Here's a more in-depth explanation:
[Link: 9tut.com]If you have questions on something specific, I can probably point you in the right direction.