How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

A.
Configure the sync network to operate within the DMZ.

B.
Secure each sync interface in a cluster with Endpoint.

C.
Use a dedicated sync network.

D.
Encrypt all sync traffic between cluster members.



Leave a Reply 0

Your email address will not be published. Required fields are marked *