As the CISO, you're reevaluating the layout of your organization's network infrastructure. You aim to add an extra layer of protection between your internal network and the untrusted external network. Which component would you introduce to achieve this?