Response from Meraki: Thank you for reaching out to Cisco Meraki Technical Support!
I would like to provide some clarity regarding the issue you experienced this morning, where traffic to the Cisco Umbrella DNS endpoint (dns.sse.cisco.com, IP: 208.67.222.222) was blocked by the Cisco Meraki Intrusion Detection System (IDS).
The IDS detected what it interpreted as an "OpenSSL SSLv3 large heartbeat response – possible SSL Heartbleed attempt" in the encrypted traffic to the Umbrella DNS resolver. This detection was a false-positive, meaning the IDS mistakenly flagged legitimate traffic as a security threat. As a result, the traffic was blocked, causing connection issues across your network.
Once the IP address 208.67.222.222 is added to the IDS whitelist in the Meraki dashboard, normal connectivity could be restored, confirming that this was indeed a false-positive.
To whitelist this IP address, please go to Security & SD-WAN > Threat protection > Trusted IP Addresses/Subnets and add the corresponding IP. This will help prevent future false-positive blocks from this IP.