If user authentication is enforced on firewall using the user settings in access rules, then the changes mentioned in this article are recommended as best practices should the firewall be seen to be experiencing high CPU load.
TIP: To learn more about configuring user settings in access rules and how to use it, please check How can I enforce local authentication for my users before allowing access to the Internet?
Access rules are used to enforce authentication for users before they can be allowed to access resources.
When user traffic reaches the firewall, it will require the user to be authenticated before letting it pass, redirecting any HTTP/HTTPS traffic from an unauthenticated source to a login page.
If this is enforced in a large network where huge numbers of connections may need to be redirected to the login page, it could result in a high load on the internal web server, particularly if a lot of the connections are coming from non-user devices that can't respond to it and log in.
The changes mentioned in this article will help reduce load on the web server, allowing redirecting to the login page more efficiently for both HTTP and HTTPS.
NOTE: This change isn't needed if HTTP User Login or HTTP Management are enabled on the interface since the required access rule will then already exist for those.
NOTE: Browsers send theses HTTP portal detection probes separate from and concurrent with the user's traffic, hence it operates independently from it and is not affected by the type of traffic sent by the user traffic, be it HTTP or HTTPS.
Chrome and Edge shows similar page with minor differences.
Firefox shows page as below,