About Threat Defense Virtual Clustering in the Private Cloud This section describes the clustering architecture and how it works. How the Cluster Fits into Your NetworkControl and Data Node RolesIndividual InterfacesCluster Control LinkConfiguration ReplicationManagement Network