When I was in a secure computing area we had to set up a clone of the network to do this. It was expensive but those were the rules then.

Bob