- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi, we're running R80.10 and would like to start cleaning up our policy that has become cluttered and outdated and inline layers look like they could assist in keeping things organized as we clean up the old clutter but I can't find a lot of info about best practices for them.
Should you try to limit how many inline layers/rules you use in a policy?
Is there a preferred method for crafting the parent rule? Should it be vague and then get more particular with each inline layer rule? Or should the parent rules be crafted very specifically as well?
I've read a few of the threads here on CheckMates and any relevant SK's but was just wondering if there was any specific guidance on the best way to utilize inline layers.
Hi Eric,
If I were you, I would be reading up on the following:
Both sections can be found in the following link:
I hope this helps.
I wouldn’t nest inline layers more than 3 or 4 deep. Top-Level rules should be fairly generic but there are use cases when a specific rule at the top might be useful.
Also think "reusable policies" with layers. For example, you might create a layer specific to Internet access that you want to apply in multiple policies. That would be a layer you make shared so it can easily be reused.
Hi,
Today we have hit the limit of 251 layers in a policy. Using more than 251 layers in the policy, we get a policy installation error with error code 1-200008.
Article sk154435 (scenario 1b) mentions the 251 limit.
For our customer this means a redesign of the whole security policy. So be aware of this limit.
Regards,
Martijn.
I would love to learn more about this policy design method. Is every rule using a layer?
I've never seen a security policy yet with more than just a couple layers.
Hi,
Customer creates security rules between VLAN's with inline layers. In these inline layers the rules are specified for traffic between servers in these VLAN's. All inline layers end with a 'Any' 'Any' 'Drop' rule.
With this method all unwanted traffic is dropped by a 'Drop' rule in one of the inline layers without going through the whole policy before traffic is dropped. This means the clean up rule at the end is almost not used and when they see the clean up rule being hit, they know they made an error in the policy / layers.
So yes, all rules are using inline layers. With the exception of clean up, stealth and some management rules. With almost 260 rules, we hit the 251 limit.
Support mentioned the following limites regarding policies.
Limitation for NAT rules in the policy - 16384.
Limmitaion of the layers in the policy - 251.
Limmitaion of the rules in the policy - No limit.
Regards,
Martijn
@Martijn Sounds very complex and not really how the layers are meant to be used.
The main purpose is to make policies more efficient and manageable.
Below are my guidelines for access control policy layers.
@Lari_Luoma Thanks for these tips.
Do you know if the limit of 251 is per Access Policy or per Unified Policy. Or is the type of policy not relevant?
Regards,
Martijn.
Hi @Peter_Baumann FYI, the link is dead
Sorry, I moved to a new cms, the link is now here:
Just an FYI if you have it, the Compliance Blade last I checked sadly doesn't evaluate in-line rules. A good example if you App/URL policy is an in-line rule the compliance blade will show 'Poor' for blocking high risk categories even if you are blocking them. Not sure if this is even addressed in R80.30. Also other policy auditing tools such as Nipper Studio don't evaluate or even list the child rules.
In this topic there have been a few mentions of the limit of 251 inline layers (sk154435).
The new IoT protect functionality will also add many layers, according to what I've seen in a demo (see screenshot below).
What will the impact be for the 251 limit? Will this limit be removed? Will these rules count against that limit?
As I recall, the 251 layer limit was in early R80.x releases.
Not sure if we still have that limit in current versions.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
6 | |
4 | |
4 | |
4 | |
4 | |
2 | |
2 | |
2 | |
2 |
Wed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksWed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY