How does Check Point recommend that you secure the sync interface between gateways?
A.
Use a dedicated sync network.
B.
Configure the sync network to operate within the DMZ.
C.
Secure each sync interface in a cluster with Endpoint.
D.
Encrypt all sync traffic between cluster members.
A
Or use a crossover cable to directly connect the two FWs
https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm
The Synchronization Network
The Synchronization Network is used to transfer synchronization information about connections and other Security Gateway states between cluster members.
Since the synchronization network carries the most sensitive Security Policy information in the organization, it is critical that you protect it against both malicious and unintentional threats. We recommend that you secure the synchronization interfaces using one of the following methods:
* Using a dedicated synchronization network
* Connecting the physical network interfaces of the cluster members directly using a cross-cable. In a cluster with three or more members, use a dedicated hub or switch
A. Use a dedicated sync network.
I agree with florentjustin.