Security boundaries in the network layer