You have implemented a Check Point High Availability solution. You have defined a Gateway Cluster and a group of Security Gateways with synchronized state tables. If the active Security Gateway fails, what happens?
A.
Clear text connections survive the failure. Encrypted connections must be re-established
B.
All connections must be re-established with the security Gateway that assumes control
C.
Encrypted and clear text connections fail over to the Security Gateway that assumes control
D.
The remaining Security Gateway force an election to determine who takes over
E.
The control network is flooded with synchronization packets