Fortinet recently published (according to my RSS feed, 1st October) "Wrong firewall policy sequence will cause high CPU during policy add/modify" implying that for optimum performance during business-as-usual provisioning of firewall policies, most popular rules should be placed topmost in Policy sequence and in fact it is a "wrong firewall policy sequence" methodology to do it otherwise.
The issue I have is that Policy sequence dictates order of matching to traffic, and a policy that matches most traffic is most likely to be most general and hence be at the bottom. In fact, as per FortiOS Handbook for FortiOS 5.2.4, section 'Policy order', "... make sure that the more specific or specialized a policy is, the closer to the beginning of the sequence ..."
I feel that publication an KnowledgeBase like this is evidence that Fortigate's Policy-related algorithms are insufficiently engineered. Or, perhaps, I'm missing logic that justifies it?
Quoting the B
"more than 2,000 firewall policies in the same VDOM"
Unless you have more than 2K policies, I don't see this being a big event. All changes should be done at low oeak hours regardless and more so in big firewall systems imho.
PCNSE
NSE
StrongSwan
AlexFeren wrote:Well to me that makes perfect sense.implying that for optimum performance [...] most popular rules should be placed topmost in Policy sequence
Think of it like that:
switch (packetMachesID) {
case PolicyID1:
usePolicy1();
break;
case PolicyID2:
usePolicy2();
break;
default:
deny();
}
Of course it uses less CPU load if the traffic matches on the first comparison instead of performing 2001 comparisons
User | Count |
---|---|
2047 | |
1170 | |
770 | |
448 | |
339 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.