Which of the following should be implemented to allow for a secure wireless network for the customer while meeting the customers requirements?