IPS/IDS Whitelisting without Traffic Exclusion

LeonardoTNS
Comes here often

IPS/IDS Whitelisting without Traffic Exclusion

Hi,

 

I have a cloud based threat & vulnerability scanning solution, it's not possible to white list the IP to allow Port scanning device subnets on the LAN side of an MX?

 

The customer MX doesnt support 18.2

 

Regards

 

4 Replies 4
alemabrahao
Kind of a big deal
Kind of a big deal

Meraki MX does not support direct port scanning of LAN subnets from external (WAN) sources unless you configure port forwarding or NAT rules to expose internal devices.
Even then, only the public IP of the MX is exposed, and internal devices are not directly reachable unless explicitly configured.

 

MX Firewall Settings - Cisco Meraki Documentation

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
LeonardoTNS
Comes here often

Hi,

I explained wrong sorry, Nessus is located at the Customer DC, the Customer DC have VPN connectivity with all the customer sites.

The MXs are blocking the scan from Nessus.

Its possible to allow the IP of Nessus at the MX?

alemabrahao
Kind of a big deal
Kind of a big deal

In this case, you cannot whitelist the IP in IDS/IPS directly, but you can allow the traffic using Layer 3 firewall rules and adjust IPS settings to avoid blocking the scans.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
RaphaelL
Kind of a big deal
Kind of a big deal

Without MX18.2++ and Trusted Traffic Exclusions

https://documentation.meraki.com/MX/Content_Filtering_and_Threat_Protection/Trusted_Traffic_Exclusio...

 

I don't see any viable solution

Get notified when there are additional replies to this discussion.