- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
Is there are alternative way to identify exactly what is causing Accept Templates to be disabled. The output from the "fwaccel stat" has a output display issue and does not show me the information.
fwaccel stat
All I can see is "Layer ---", there is a missing carriage return and then "Drop Templates".
Many thanks,
Michael
Strange, it looks like fwaccel stat is not displaying its output correctly. Please provide the output of fwaccel templates -s and fwaccel templates -S, as I suspect Accept templating is actually working.
Ah here we go, your policy layer name must be longer than 32 characters. Shorten it and the fwaccel stat output will start working correctly:
Which version do you use ? Afaik, this is the only way to display these layers. Even looks like an issue for TAC to me...
Is the firewall being managed by MDSM/Provider-1, and if so are there global rules being inserted at the top of the policy? Also please provide the output of enabled_blades.
Hello,
The cluster is not managed as part of a MDM environment, so there are not global rules. the following blades are activated:
Blades
Regards,
Michael
Try temporarily disabling Anti-bot, reinstall policy, then check Accept templating status again.
Are you using any of those in the policy: dhcp-request' / 'dhcp-reply' / 'dhcpv6-request' / 'dhcpv6-reply' / 'dhcpv6-relay?
If yes, look here: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
Strange, it looks like fwaccel stat is not displaying its output correctly. Please provide the output of fwaccel templates -s and fwaccel templates -S, as I suspect Accept templating is actually working.
Ah here we go, your policy layer name must be longer than 32 characters. Shorten it and the fwaccel stat output will start working correctly:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 42 | |
| 19 | |
| 13 | |
| 11 | |
| 9 | |
| 8 | |
| 6 | |
| 5 | |
| 5 | |
| 5 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY