There are two policy interceptor pipelines. The first pipeline is depicted as a series of five boxes in the following order: Reliable Messaging, Management, Addressing, Security, and MTOM. An arrow, indicating a Request, points from a client to the policy interceptor pipeline. The arrow continues from the end of the pipeline and points to a Network "cloud." The arrow continues and points to a second policy interceptor pipeline. The second pipeline is depicted as a series of five boxes in the following order: MTOM, Security, Addressing, Management, and Reliable Messaging. The arrow points from the end of the pipeline to a Web service. There is another arrow, indicating a Response, that follows the reverse path. This arrow points from the Web service, to the second policy interceptor pipeline, to the Network cloud, to the first interceptor pipeline, ending at the client.