- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Hi CheckMates,
Encountered an issue with Management API while creating a rule via Web API.
Trying to set track level according to https://sc1.checkpoint.com/documents/latest/APIs/index.html#web/set-access-rule~v1.5%20 , track field is able to receive "log" (even though it seems not to be documented).
However, it automatically switches on "Accounting" log feature as well.
Trying to adjust the accounting setting results in an error.
Any thoughts how it can be resolved?
Sent payload that creates a rule with logging enabled plus accounting:
payload_For_API = {
"layer": "Network",
"position": "top",
"name": "API 1",
"action": "Accept",
"destination": "hst_dst_1.10.1.100",
"service": "Kubernetes1",
"enabled": True,
"source": "Any",
"track": "log"
}
Trying to use track.type (as in https://community.checkpoint.com/t5/Policy-Management/change-to-Track-setting-in-policy/m-p/47958#M2...) results in
{'code': 'generic_err_invalid_parameter_name', 'message': 'Unrecognized parameter [track.type]'}
Trying to configure track using additional fields:
{'code': 'generic_err_invalid_parameter', 'message': 'Invalid parameter for [track]. The invalid value [ "accounting" : False }] should be replaced by one of the following values: [none, log, extended log, detailed log]'}
or:
{'code': 'generic_err_invalid_parameter', 'message': 'Invalid parameter for [track]. The invalid value [ "log" , {"accounting" : False }] should be replaced by one of the following values: [none, log, extended log, detailed log]'}
Thanks,
Vlad Tonne
@Vlad_Tonne , @Maik ,
Which version are we talking about?
Here are commands that worked for me on R80.30.
mgmt_cli:
mgmt_cli add access-rule layer "Network" position 1 name "Rule 1" track.type "Log" track.accounting true
Web Services:
{
"name": "amiad rule1",
"position" : 1,
"track": {
"accounting": true,
"type": "Log"
},
"layer": "Network"
}
As Maarten mentioned "track.accounting true" should work fine.
The documentation mentions that accounting only accepts boolean values; meaning true or false.
The "type" option can only be used with "Log", "Extended Log", "Detailed Log" or "None".
Hi,
Usage of "track.accounting" results in error.
"track": "log",
"track.accounting": False
{'layer': 'Network', 'position': 'top', 'name': 'API 1', 'action': 'Accept', 'destination': 'hst_dst_1.10.1.100', 'service': 'Kubernetes1', 'enabled': True, 'source': 'Any', 'track': 'log', 'track.accounting': False}
{'code': 'generic_err_invalid_parameter_name', 'message': 'Unrecognized parameter [track.accounting]'}
BR,
Vlad Tonne.
Works via management cli:
"add access-rule name 'Test' layer Network position bottom track.accounting true"
My guess is that you cant use both statements with one task:
"track": "log",
"track.accounting": False
Try to create the rule with track log first and afterwards use the set access rule command and enable account via "track.accounting": True.
Maybe @Amiad_Stern can help.
@Vlad_Tonne , @Maik ,
Which version are we talking about?
Here are commands that worked for me on R80.30.
mgmt_cli:
mgmt_cli add access-rule layer "Network" position 1 name "Rule 1" track.type "Log" track.accounting true
Web Services:
{
"name": "amiad rule1",
"position" : 1,
"track": {
"accounting": true,
"type": "Log"
},
"layer": "Network"
}
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 1 |
Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Tue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY