What feature is used by control connections to ensure strong authentication between Check Point Nodes?

Check Point Nodes communicate with other Check Point Nodes by means of control connections. What feature is used by control connections to ensure strong authentication between Check Point Nodes?

Check Point Nodes communicate with other Check Point Nodes by means of control connections. What feature is used by control connections to ensure strong authentication between Check Point Nodes?

A.
Implied Rules

B.
Diffie-Hellman

C.
FireWall Implied Rules

D.
Explicit Rules

E.
Secure Internal Communication



Leave a Reply 0

Your email address will not be published. Required fields are marked *