Thanks for the replies and inputs, I do realize the pros/cons of how im doing FW vs the more standard (even default-config) of add rules to accept what you want, then DROP ALL ELSE.
In regards to my main question of performance / efficiency, my idea/theory was that in using connection-state=new , the firewall rule would match (or “be processed”) for many fewer packets which would = less router resource load. In thinking about it more, I came up with a rough way to test my question/“the performance” impact:
by doing the “opposite” of each possible rule (ie using 2x action=passthrough rules , one with connection-state=new , the other without any connection-state set), and then seeing how each packet/byes couter increments, i can get a rough idea of how often connection-state=new is being matched VS no connection-state set , in general
(part of my theory is the more often a rule’s “bytes” or “packets” increments , the greater CPU or other load it is placing upon the router/rOS - thus as im solely protecting management ports with these specific drop rules, connection-state=new should match less, which = less resource load, while still protecting management ports just as well as using no connection-state set ).
When i tested this (one rule at a time, for 30 seconds)- ofcourse the no connection-state set action=passthrough rule had ALOT more traffic than the no connection-state=new. But the difference was pretty large!
for 30s (in-interface=my ISP modem, chain=input, src-address-list=!myApprovedPubIPs proto=tcp) :
no connection-state set = 838 packets / 121k
connection-state=new = 42 packets / 3k
(of course this will vary for different people, and my premise may be entirely incorrect if im wrong about: the more often a rule’s “bytes” or “packets” increments , the greater CPU or other load it is placing upon the router/rOS)