Well,
You can run IPSLA to outside world on your internal routers and keep the route 0 cost reversed on each side. This way, hosts on the inside of Check Point will be able to get out through any available ISP.
Networks located on DMZ(s) could keep propagating normally.
Inbound traffic to your hosts (i.e. mail, web, etc..) may be a bit trickier, since you’ll have to create conditional NAT rules that will take under consideration where the traffic destined to those is coming from.
Another issue will be the antispoofing for hosts in DMZ: Under normal circumstances, fw is aware of the interface leading to the Internet.
During failover, depending on topology, route 0 may end-up behind internal interface.
If you have class C public addresses, you can run cross-site BGP on the outside of your firewalls to prevent the scenario described above.
Vladimir Yakovlev
973.558.2738
<mailto:vlad@eversecgroup.com> vlad@eversecgroup.com