Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?