We have an HQ site with an MX100. We are using a number of Content Filtering blocked website categories. Today, one of our users at the HQ site complained about a website that was blocked by Meraki. He sent a screenshot that proves Meraki blocked it.
Another of our workers, at home using a Z3 gateway, was able to bring up that very same website. The Z3 gateway doesn't have built-in Content Filtering, but we do have the Z3 on full-tunnel. What I mean is, on the Site-to-Site VPN settings, the HQ MX100 is the default route. I had assumed that putting the Z3 in full tunnel mode would mean that the Content Filtering and Threat Protection capabilities of the MX100 at our HQ site would be leveraged to protect the remote worker on the Z3 gateway. Did I make a faulty assumption?
Thanks for anyone that can help me understand how both Content Filtering and Threat Protection apply in this case.