Browse Definitions :
Definition

logical interface (LIF)

Contributor(s): Matthew Haughn

A logical interface (LIF) Is a software entity consisting of an IP address that is associated with a number of attributes such as a role, a home port, a firewall policy, a home node, a routing group and a list of ports for failover purposes.

Logical interfaces are created through configuration. Each LIF may be associated with a specific physical interface or device.

LIFs fill a number of purposes in cluster computing and have different roles to this end. The type of LIF role determines the traffic type it passes over its interface. Roles also determine the failover  and firewall rules, security, load balancing, how they route traffic and how they are used by cluster administrators.

LIF roles:
 

  • Data LIFs use a Vserver and communicate with clients, configured through data specific ports.
  • Cluster LIFs  are used for intra-cluster traffic, configured through specific cluster ports. They generally use 10-GbE ports and can be used for failover for cluster ports on the same node.
  • Intercluster LIFs are used for cross-cluster communication, replication and backup. They are configured via data ports or inter-cluster ports. Intercluster LIFs are needed for each node to establish a peering relationship.
  • Cluster management LIFs are used for overall cluster management. They can be configured on data ports or node-management ports and can fail over to any node management LIF or data port in the cluster.
  • Node managment LIFs  provide a dedicated IP for management of specific nodes. They are created at the time of cluster joining or creation and configured over node-managment or data ports. They can fail over to other data or node-managment ports on the same node.
This was last updated in June 2015

Continue Reading About logical interface (LIF)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

In case of routers why does it need interface IP address?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close