How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

A.
Use a dedicated sync network.

B.
Configure the sync network to operate within the DMZ.

C.
Secure each sync interface in a cluster with Endpoint.

D.
Encrypt all sync traffic between cluster members.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


DatDude

DatDude

A

Or use a crossover cable to directly connect the two FWs

florentjustin

florentjustin

https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm

The Synchronization Network

The Synchronization Network is used to transfer synchronization information about connections and other Security Gateway states between cluster members.

Since the synchronization network carries the most sensitive Security Policy information in the organization, it is critical that you protect it against both malicious and unintentional threats. We recommend that you secure the synchronization interfaces using one of the following methods:

* Using a dedicated synchronization network
* Connecting the physical network interfaces of the cluster members directly using a cross-cable. In a cluster with three or more members, use a dedicated hub or switch

Esteban

Esteban

A. Use a dedicated sync network.

I agree with florentjustin.