Enforcement firewalls and other security devices are located on a network
for a given source node and destination node. Nodes in the network
topology are programmatically identified as being part of a non-looping
communication path between the source node and the destination node.
These nodes may be part of a path closure set. Security devices that are
part of the path closure set are identified as the enforcement security
devices for the given source and destination node.