a security administrator needs to set up a honeynet to avoid allowing hackers to compromise servers on the corporate network. Which of the following would be the best option for the admin to implement to keep the honeynet traffic separate from the rest of the corporate network?