- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
This is an exciting topic:-)
I think that the rules and regulations should be clearly laid out. This is basically a design question.
The unified policy is used for processing rules from R8x onwards.
The Access Policy is processed in according to:
1) Source IP
2) Destination IP
3) Protocol (TCP, UDP,...)
4) Source port
5) Destination port
And the possible match are always sorted out and processed further. Therefore, policy processing is much faster than with older versions R6x and R7x. Therefore, large sets of rules are no longer so critical. I think there are other points to consider, which may be more time-critical (IPS, AV, ...).
@_Val_ has a presentation describing the unified policy processing:
"Performance Optimization Part 1 Introduction"
PS:
But I am also a fan of smaller and more manageable rules.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY