Any way to get MX Security Center to inspect/block traffic going to forwarded ports?

KenLux
Getting noticed

Any way to get MX Security Center to inspect/block traffic going to forwarded ports?

Hi,

 

We have a few ports that are forwarded to servers handling traffic from the internet.

 

It appears that the MX forwards traffic before it does anything else. So Level 3 inbound/outbound have no effect (you have to block outbound in the Level 7 rules, which is inconvenient, but appears to work sometimes).

 

It also appears that the Security Center on the MX does not inspect forwarded packets either.

 

Am I missing something here? Why even have the Security Center if the MX ignores the traffic that you most want to inspect and/or block?

 

I do recall looking into this before and found something along the lines of using 1:Many NAT with some sort of optional setting, but this option was incompatible with AnyConnect VPN, so we can't use it.

 

Any thoughts?

9 Replies 9
Mloraditch
Kind of a big deal
Kind of a big deal

Security Center is just a reporting mechanism. As far as I understand AMP and IPS should be inspecting inbound traffic. Are you aware of an exploit that should have been detected that wasn't?

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
KenLux
Getting noticed

We had a few IP addresses trying to connect to our mail server via port 25 up to several thousand times a day. Our spam filter wasn't susceptible to the attacks, but did log them. Absolutely nothing in the Security Center.

 

I don't know about specific exploits, but these appear to be brute-force attacks to try to login into an SMTP server.

 

Another server that has a port forwarding rule has seen probes for the recent Sharepoint exploit. Nothing on that in security center. It also got targeted by a reflected XSS attempt (GET /Mondo/lang/sys/Failure.aspx?state=19753%22;}alert(document.domain);function%20test(){%22 HTTP/1.1), and it didn't show up in Security Center.

 

Weirdly, Security Center did flag some connections to that server as: limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt. So maybe it is inspecting some packets.

 

Maybe a brute-force attempt to logon to a server isn't supposed to be flagged by Security Center?

 

As far as blocking traffic, I meant using Threat Protection to block things. We currently have threat protection set to "Detection". My understanding is that these detections are what populate Security Center and that changing the setting to "Prevention" would block the detections it is currently finding. (Though it still has problems identifying clients and flagging DNS traffic to our DC and ISP as malicious).

 

I do have AMP disabled, but I would have thought that it would still check SMTP traffic.

alemabrahao
Kind of a big deal
Kind of a big deal

Bigip is the key 

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
KenLux
Getting noticed

I did just notice that the MX Security Center was flagging some traffic to out SMTP server. I guess it really doesn't detect the brute-force-logon attempts (hard to do from inspection of individual packets).

 

I'll try turning AMP on to see if it picks up more http-based attacks.

RWelch
Kind of a big deal
Kind of a big deal

Screenshot 2025-08-14 at 16.08.19.png

 

Does traffic show up for those devices if you select (enable) CLEAN and UNKNOWN boxes? 

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
KenLux
Getting noticed

For our SMTP server, nothing detecting brute-force logon attempts, but I did see that it picked up a few events. (Crypto-mining pool connection attempts, ISO file attachment). I didn't see them at first because the MX listed the client as "(none)" - it really doesn't do a good job with host resolution.

 

For a web server, it misses probes for Sharepoint exploits and Revese XSS attacks. It did flag a few connections for: limited RSA ciphersuite list - possible Bleichenbacher SSL attack attempt.

 

So, I guess it's not designed to flag brute-force attempts. 

alemabrahao
Kind of a big deal
Kind of a big deal

In your case, it is recommended to use a solution like Bigip.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
KenLux
Getting noticed

Would enabling this allow blacklisting inbound IPv4 addresses?

https://documentation.meraki.com/MX/Networks_and_Routing/NAT_Exceptions-No_NAT_on_MX_Security_Applia... 

 

If so, can this be enabled without disabling NAT? I just want a L3 firewall on forwarded traffic.

 

Before I thought that this disabled AnyConnect, but it looks like you need to configure allow rules for inbound AnyConnect connections.

 

Mloraditch
Kind of a big deal
Kind of a big deal

This caveat for AnyConnect still exists on that link
"In order to accommodate AnyConnect Client VPN on MX appliances, changes were required that prevent the concurrent use of Client VPN - either via AnyConnect or IPsec) - and No NAT."

If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.
Get notified when there are additional replies to this discussion.