Which of the following network-based security controls should the engineer consider implementing?