Having set up a site-to-site VPN to an external organisation I'm wondering if traffic entering our network will be protected by Meraki Threat Protection
Does Threat Protection scan traffic entering the network via site-to-site VPN (non-meraki peer)?
I'm pretty sure that threat protection, content filtering, AMP and all those items only apply to WAN ports. I believe Site to Site VPN is considered a LAN link and then only those firewall rules that you setup on the Security Appliance>Site to Site VPN apply. Only thing I could find in the documentation is this "In a full tunnel topology, all security and content filtering must be performed on the full tunnel client. The Exit hub will not apply Content Filtering, IPS blocking, or Malware Scanning to traffic coming in over the VPN. However, IDS scanning will be performed for this traffic."
Thanks, I found the same documentation but it doesn't really clear things up. I'll see if I can get a definitive answer out of Meraki Support...
I received the following from Support:
This traffic should still be inspected by the threat protection features on the MX as the MX is required to unencrypt the VPN traffic, so will apply the threat protection features during this.
I'd be interested in others feedback on this also. I know for sure the MX unencrypts. But I was definitely unaware that it still applied the threat protections to the VPN tunnel traffic. I'd be glad if it does but surprised.
I'm with @Adam - I don't believe VPN traffic will be AMP inspected.
Perhaps do some tests with the EICAR test virus. Note you might have to have your settings set to prefer "Security" for the test case virus to be blocked.
This would be something I hope is clarified soon! -great question
As far as I know, threat protection absolutely scans all site to site VPN traffic. We had an issue where threat protection was blocking QNAP replication between two sites. After weeks of working with support, they confirmed there is no way to stop that from happening at this time. The only fix was to white list all the signatures so it ignored them. That was our fix which worked.