How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

A.
Configure the sync network to operate within the DMZ.

B.
Secure each sync interface in a cluster with Endpoint.

C.
Encrypt all sync traffic between cluster members.

D.
Use a dedicated sync network.



Leave a Reply 0

Your email address will not be published. Required fields are marked *