Authors: P.Jahnavi, M.Hemalatha, Y.Amrutha, Mrs.Sivaselvi.k
Abstract: Current perimeter-based security solutions are no longer sufficient, as organizational networks evolve rapidly due to cloud usage, remote access, and sophisticated cyber attacks. This article describes a secure network architecture that combines authentication, authorization, and accounting (AAA) with device hardening strategies that are consistent with contemporary ZeroTrustconcepts.Theproposed system isolates network traffic via VLAN segmentation, and inter-VLAN routing via a centralized router enforces regulated communication. A RADIUS server is used for centralized authentication, guaranteeing that only confirmed users have accesstonetworkresources,whileauthorizationpoliciesand accounting systems limit access and monitor activities. The report also emphasizes the efficacy of layered security, which combines AAA with device hardening techniques including secure remote access, service limits, and tight password enforcement. When compared to existing methodologies, Zero Trust Architecture (ZTA) results in considerableimprovementsinthreatdetection,reactiontime, and security breach reduction. The findings show that centralized access control, network segmentation, and continuous verification improve security posture while lowering operational risks and financial losses. This study presents a viable and scalable methodology for creating secure corporate networks, which includes both theoretical knowledge and real-world application. It concludes that combiningAAA, device hardening, and Zero Trustprinciplesresultsinastrongdefensemodelappropriate for modern digital environments.
DOI:
International Journal of Science, Engineering and Technology