PrepAway - Latest Free Exam Questions & Answers

How does Check Point recommend that you secure the sync interface between gateways?

How does Check Point recommend that you secure the sync interface between gateways?

PrepAway - Latest Free Exam Questions & Answers

A.
Use a dedicated sync network.

B.
Configure the sync network to operate within the DMZ.

C.
Secure each sync interface in a cluster with Endpoint.

D.
Encrypt all sync traffic between cluster members.

3 Comments on “How does Check Point recommend that you secure the sync interface between gateways?

  1. florentjustin says:

    https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7288.htm

    The Synchronization Network

    The Synchronization Network is used to transfer synchronization information about connections and other Security Gateway states between cluster members.

    Since the synchronization network carries the most sensitive Security Policy information in the organization, it is critical that you protect it against both malicious and unintentional threats. We recommend that you secure the synchronization interfaces using one of the following methods:

    * Using a dedicated synchronization network
    * Connecting the physical network interfaces of the cluster members directly using a cross-cable. In a cluster with three or more members, use a dedicated hub or switch




    0



    0

Leave a Reply