Show Table of Contents
5.3. Network Configuration
5.3.1. Network Interfaces
The following network interfaces are defined and created so that trusted and untrusted network traffic is separated.
Network Interfaces
- public
- For communication to and from external, potentially untrusted parties.
- cluster
- For communication between cluster nodes. Cannot be accessed by untrusted parties. This must be enforced as part of network/firewall configuration.
- internal
- For communication between trusted servers or users (such as administrators) via the internal network. Cannot be accessible to untrusted parties or general users of the system.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.