<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Policy optimisation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61022#M84353</link>
    <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a quick question: I am faced with an issue of where to place Identity Awareness policy rule in the security policy on the management server?&lt;/P&gt;&lt;P&gt;I was under the impression that since this rule has the most hit count, it need to be placed towards the top of the rule base, but I was advised this rule, need to be placed towards the bottom of the rule base since it requires more processing because it utilises the firewall hold limit queue. Reason being not to affect the connection table. Any help on this issue will be well appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards.&lt;/P&gt;&lt;P&gt;Gladstone Abati-George&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Aug 2019 09:14:34 GMT</pubDate>
    <dc:creator>Gladstone_Abati</dc:creator>
    <dc:date>2019-08-23T09:14:34Z</dc:date>
    <item>
      <title>Security Policy optimisation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61022#M84353</link>
      <description>&lt;P&gt;Hello All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a quick question: I am faced with an issue of where to place Identity Awareness policy rule in the security policy on the management server?&lt;/P&gt;&lt;P&gt;I was under the impression that since this rule has the most hit count, it need to be placed towards the top of the rule base, but I was advised this rule, need to be placed towards the bottom of the rule base since it requires more processing because it utilises the firewall hold limit queue. Reason being not to affect the connection table. Any help on this issue will be well appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards.&lt;/P&gt;&lt;P&gt;Gladstone Abati-George&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 09:14:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61022#M84353</guid>
      <dc:creator>Gladstone_Abati</dc:creator>
      <dc:date>2019-08-23T09:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy optimisation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61026#M84354</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I think this question should be moved into Management section, not here.&lt;/P&gt;&lt;P&gt;Regarding the question, it depends. Can you show us Rule itself? Who suggested you to make this kind rule changes, R&amp;amp;D? Maybe they found some specific details. We need more information regarding this case.&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;Vato&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 10:23:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61026#M84354</guid>
      <dc:creator>Vato_Chantladze</dc:creator>
      <dc:date>2019-08-23T10:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security Policy optimisation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61041#M84355</link>
      <description>&lt;P&gt;Moving rules with high hit counts further up in the rulebase was a longstanding recommendation to help reduce the CPU overhead of rule base lookups in R77.30 gateway and earlier.&amp;nbsp; However due to the new &lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Unified-Policy-Column-based-Rule-Matching/m-p/9888" target="_self"&gt;Column-based matching&lt;/A&gt; feature which is enabled by default in R80.10+ gateway, moving frequently-hit rules towards the top of the policy provides only minimal gains and is probably not worth your time to pursue.&lt;/P&gt;
&lt;P&gt;For known users the gateway already has a user to IP mapping in its cache (along with group memberships) by the time a user's traffic reaches the gateway, so I don't see why moving a rule utilizing an IA access role downwards would be a recommendation here unless you are also using something like Domain objects in the same rule or perhaps invoking the Captive Portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 14:26:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Policy-optimisation/m-p/61041#M84355</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-08-23T14:26:55Z</dc:date>
    </item>
  </channel>
</rss>

