An organization requires administrators to authenticate to a dedicated server before accessing critical systems within a secure network segment. Which of the following network appliances is being used to enforce this security measure?
Load balancer
Router
Proxy server
Jump server