Which of the following options will end the intruder’s access, after the next Phase 2 exchange occurs?