Which of the following should the administrator use to gain access to the secure network?