About Threat Defense Virtual Clustering in the Public Cloud This section describes the clustering architecture and how it works. How the Cluster Fits into Your NetworkIndividual InterfacesControl and Data Node RolesCluster Control LinkConfiguration ReplicationManagement Network