Hi Esteban,
I assume you are referring to gateway performance, both for throughput impact and policy evaluation. The short answer is that using Security Zones vs. using host/network/group objects doesn't make a noticeable difference in gateway performance, and I explicitly stated this in my book. This is all based on my own research, and I'm sure if anything is incorrect someone from Check Point will be chiming in shortly. 🙂
Using Security Zones vs. network/host/group makes no difference as far as throughput performance.
As far as policy evaluation overhead on the Firewall Worker cores, the Source and Destination Zone is always calculated for traffic anyway regardless of whether you are actually using Zone objects. Security Zones also work just fine with SecureXL Accept Templates and the new Column-based policy matching. I suppose if you have an extremely large group of objects in the source and/or destination of a policy layer rule Security Zones would provide a slight advantage as far as policy evaluation overhead, but even that potential gain is probably limited due to Column-based matching.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com