A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?