Zero Trust Microsegmentation Network
completedFall 2025
Sponsor
Networking & Security
Problem & Approach
Configured six VLANs (HR, Finance, Engineering, Guest, Management, Admin) with strict microsegmentation to isolate departmental traffic and minimize lateral movement. Implemented 802.1X port-based network access control integrated with a RADIUS server to enforce identity-based authentication for all connected devices.
Developed and applied comprehensive ACL rules on relevant Layer 3 interfaces to tightly control inter-VLAN and external access, ensuring least-privilege communication paths. Conducted unauthorized access simulations (including attempts at VLAN hopping, rogue device connection, and privilege escalation) to validate and fine-tune the security posture.
Methodology: Applied SCRUM with four sprints, weekly standups for progress tracking and risk review, and GANTT charting for timeline and dependency visualization, ensuring iterative delivery, continuous feedback, and clear visibility into milestones and security validation activities.
Technology Stack
Team
Outcome & Impact
Successful zero trust network segmentation with validated security. Configured 6 VLANs with strict microsegmentation, 802.1X authentication with RADIUS server integration, and comprehensive ACL rules.
Testimonials
"Working on the Zero Trust Microsegmentation project with Cisco gave me hands-on experience with enterprise network security that you can't get in a classroom. The SCRUM methodology and real-world validation testing prepared me for my career."
"The Zero Trust Microsegmentation project and Blockchain-Secured DNS both demonstrated exceptional technical depth. Students validated security through penetration testing and achieved 99.9% uptime on the DNS system."