- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
For almost two decades, ClusterXL remains one of the most complex elements of Check Point Security Architecture, and probably the most used one. It is hard to imagine a modern security system without built-in redundancy for Security Gateways. To build it in the most effective way, understanding is the key.
Here is the best document about Check Point clustering that you could find - ClusterXL Advanced Technical Reference Guide
It thoroughly describes everything you ever need when planning, deploying and troubleshooting Check Point clusters:
For both experts and beginners, this is something to keep among one's bookmarks.
For almost two decades, ClusterXL remains one of the most complex elements of Check Point Security Architecture, and probably the most used one. It is hard to imagine a modern security system without built-in redundancy for Security Gateways. To build it in the most effective way, understanding is the key.
Here is the best document about Check Point clustering that you could find - ClusterXL Advanced Technical Reference Guide
It thoroughly describes everything you ever need when planning, deploying and troubleshooting Check Point clusters:
For both experts and beginners, this is something to keep among one's bookmarks.
;About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY