- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
We see this on an R81.10 gateway:
| Error: 'URL Filtering' is not responding. Verify that 'URL Filtering' is installed on the gateway. If 'URL Filtering' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
| Error: 'Identity Awareness' is not responding. Verify that 'Identity Awareness' is installed on the gateway. If 'Identity Awareness' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
| Error: 'Application Control' is not responding. Verify that 'Application Control' is installed on the gateway. If 'Application Control' should not be installed verify that it is not selected in the Products List of the gateway (SmartDashboard > Gateway > General Properties > Check Point Products List). This error may occur if the Security Cluster is in Multi-Version Cluster mode. After upgrading all the cluster members to the same version, this error should disappear. |
Output from 'fw stat' and 'enabled_blades':
[Expert@gateway:0]# fw stat
HOST POLICY DATE
localhost Perimeter 7Feb2024 16:06:12 : [>eth0] [<eth0] [>eth1] [<eth1] [>vpnt200] [<vpnt200] [>vpnt201] [<vpnt201] [>vpnt100] [<vpnt100] [>vpnt101] [<vpnt101]
[Expert@gateway:0]# enabled_blades
fw vpn urlf av appi ips identityServer SSL_INSPECT anti_bot content_awareness mon
We see logs for all three blades on this gateway:
So I'm thinking this is cosmetic but the OCD in me doesn't like seeing the splats on the overview page. Also, this survives a reboot.
Anyone have any helpful suggestions?
I saw this few times in my labs before (on different versions) and way I fixed it was simply by installing policy and also database from smart console. Not sure if its cosmetic, but if blades are enabled and functioning, seems like it could be.
Best,
Andy
You running VSX? You cannot have those blades enabled in vs0 -> https://support.checkpoint.com/results/sk/sk106496
Hello, thank you for your reply, we are not running VSX.
When did you notice this? Any changes recently? ie upgrade, policy change, any other blades?
Best,
Andy
It has been this way for several months but I haven't been too worked up about it because it seemed to be cosmetic. I did try disabling the blades, install database, enable the blades and install database just prior to a service window to change affinity for CoreXL (which requires a reboot). When the gateway came up from reboot the Identity Awareness blade error went away but the other two still show the error.
One easy fix (if it works of course) wuld be to disable those blades, install policy, re-enable, install policy again. No guarantee, but easy to try.
Best,
Andy
Hello,
Unless I'm missing something, it isn't that easy to do without re-writing my rulebase to remove dependencies for rules written on those blades?
Only way to know would be to uncheck it, save and see if it complains about anything.
Best,
Andy
I think it will give messages if you disable blades that are in 'use'
Maybe we should focus on the mgmt and not gateways? Have you rebooted FWMGT?
Maybe this SK helps:
https://support.checkpoint.com/results/sk/sk111944
Thats good sk to follow, agree.
Andy
reboot mgmt fixed the issue for me last week
I always found rebooting the gateway fixed it for me, but does not hurt to reboot the mgmt, for sure...no downtime needed.
Best,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 33 | |
| 10 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY