Network security typically requires pulling together policies at Layer 2 and Layer 3 and at each topology layer to prevent malicious or inadvertent usage. The network boundary — where users enter the network — represents an effective security checkpoint to prevent a single endpoint device from either hijacking network resources or impacting other users’ ability to access network services. Endpoint security traps the misbehaving endpoint at its closest point and minimizes the number of network links that must carry any malicious traffic.