A customer implements Cloud Identity-Aware Proxy for their ERP system hosted on Compute Engine. Their security team wants to add a security layer so that theERP systems only accept traffic from Cloud Identity-Aware Proxy. What should the customer do to meet these requirements?