- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hello,
Is there are alternative way to identify exactly what is causing Accept Templates to be disabled. The output from the "fwaccel stat" has a output display issue and does not show me the information.
fwaccel stat
All I can see is "Layer ---", there is a missing carriage return and then "Drop Templates".
Many thanks,
Michael
Strange, it looks like fwaccel stat is not displaying its output correctly. Please provide the output of fwaccel templates -s and fwaccel templates -S, as I suspect Accept templating is actually working.
Ah here we go, your policy layer name must be longer than 32 characters. Shorten it and the fwaccel stat output will start working correctly:
Which version do you use ? Afaik, this is the only way to display these layers. Even looks like an issue for TAC to me...
Is the firewall being managed by MDSM/Provider-1, and if so are there global rules being inserted at the top of the policy? Also please provide the output of enabled_blades.
Hello,
The cluster is not managed as part of a MDM environment, so there are not global rules. the following blades are activated:
Blades
Regards,
Michael
Try temporarily disabling Anti-bot, reinstall policy, then check Accept templating status again.
Are you using any of those in the policy: dhcp-request' / 'dhcp-reply' / 'dhcpv6-request' / 'dhcpv6-reply' / 'dhcpv6-relay?
If yes, look here: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
Strange, it looks like fwaccel stat is not displaying its output correctly. Please provide the output of fwaccel templates -s and fwaccel templates -S, as I suspect Accept templating is actually working.
Ah here we go, your policy layer name must be longer than 32 characters. Shorten it and the fwaccel stat output will start working correctly:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 03:00 PM (EDT)
Maestro Masters Americas: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY