How To Replace An Existing Meraki MX Device

Meraki Threat Protection: New Features in Meraki MX: Snort 3 and Beyond

Cyber threats are no longer isolated or predictable. Today’s attackers use polymorphic malware, encrypted payloads, lateral movement, and persistent footholds that challenge even modern firewalls. For organizations using Cisco Meraki MX appliances, this evolution has made embedded threat protection capabilities more crucial than ever.

Meraki has answered the call by reengineering its approach to network security. What began as basic IDS/IPS with Snort 2 has matured into a full threat defense stack powered by Snort 3, Advanced Malware Protection (AMP), and cloud-driven updates from Cisco Talos. This isn’t just about signature matching. It’s about creating a security posture that’s adaptive, scalable, and built for today’s decentralized networks. Meraki’s integrated networking solutions—including access points and switching—work together to provide a comprehensive and scalable security and network management system, supporting customization and automation across your entire infrastructure.

At Stratus Information Systems, we work closely with IT teams to design and implement secure, resilient Meraki MX deployments. Whether you need zero-trust architecture or real-time threat blocking, our Cisco-certified engineers ensure your infrastructure delivers. Meraki’s approach streamlines network management processes and boosts operational efficiency, helping IT teams reduce costs and increase productivity.

Core Components of Threat Protection in Meraki MX

cisco meraki firewall

Threat protection in the Meraki MX platform is not a single feature, but a layered defense model. The components that power this system include:

  1. Snort-based IDS/IPS: At the core is the Snort engine, responsible for inspecting packet data and applying curated rulesets to detect malicious activity. It scans for command-and-control activity, exploit kits, malware traffic, and other malicious activity.
  2. Advanced Malware Protection (AMP): AMP inspects file downloads over HTTP, comparing them against Cisco’s threat intelligence database. It prevents infected files from ever reaching your endpoints.
  3. URL and File Allow Lists: Meraki provides granular control over what’s blocked or allowed, allowing administrators to override certain detections when false positives occur.
  4. Threat Detection Policies: Administrators can fine-tune protection by selecting from different rulesets—Connectivity, Balanced, or Security, depending on the desired tradeoff between security depth and performance.

Both IDS/IPS and AMP serve as key prevention systems, proactively identifying, mitigating, and neutralizing cyber threats to protect sensitive data and ensure network security.

This multilayered system is constantly updated via the Meraki Cloud, with rules and signature updates delivered directly from Cisco Talos, Cisco’s elite threat research organization. All these features are managed through a single dashboard, providing centralized visibility and control for simplified network management.

These features are available exclusively with Meraki MX Advanced Security Edition licensing, and require MX firmware version 12.20 or higher.

Cloud Managed Threat Protection

Cloud-managed threat protection is transforming how businesses approach network security. With Cisco Meraki’s cloud-managed solutions, including the Meraki MX, organizations gain access to industry-leading threat protection, intrusion detection, and advanced malware protection—all managed from a single, intuitive dashboard. This centralized approach streamlines network management, allowing IT teams to monitor, configure, and respond to threats across all sites in real time.

By leveraging the power of the Meraki cloud, businesses benefit from continuous updates to threat intelligence, ensuring that their network security posture evolves alongside emerging cyber threats. Features like content filtering, intrusion detection and prevention, and advanced malware protection are seamlessly integrated, reducing operational complexity and risk. The result is robust network security that protects sensitive data, maintains business continuity, and supports compliance—all while minimizing operational costs and management overhead.

With Meraki MX, organizations can confidently protect their networks against advanced threats, knowing that their security infrastructure is always up-to-date and centrally managed for maximum efficiency and control.

From Snort 2 to Snort 3 – What’s Changed

Snort 2 was a powerful intrusion detection engine in its day, but its single-threaded design and static architecture posed limitations. As modern networks demand real-time inspection of gigabit-level traffic, Snort 2 began to show its age.

Snort 3 solves these challenges with a multi-threaded architecture. It distributes packet inspection across multiple cores, making it faster and more responsive. This reduces bottlenecks in high-traffic environments, such as school campuses, healthcare facilities, or large corporate offices.

Key improvements in Snort 3 include:

  • Port-independent protocol inspection: Protocols like HTTP and FTP are now detected regardless of the port they operate on.
  • Support for HTTP/2: Snort 3 can inspect modern web traffic more effectively.
  • Runtime engine swapping: Detection engines and modules can be updated without a firmware upgrade, reducing downtime.
  • Hyperscan support: This feature accelerates regular expression (regex) processing using CPU vector extensions, thereby improving performance on newer hardware.
  • Modularity and memory efficiency: Snort 3 uses memory more intelligently, improving its ability to scale on large deployments.

Note: Only Meraki MX appliances running firmware version 17.6 or later can run Snort 3. Models like the MX64 and MX65 remain on Snort 2 due to hardware constraints.

Inspection Coverage – What Gets Scanned

Meraki MX’s threat inspection applies to specific types of traffic flows:

  • LAN to Internet
  • Inter-VLAN
  • Protected subnets in passthrough mode

This means MX will inspect both outbound traffic and east-west traffic between VLANs. However, it will not inspect intra-VLAN traffic—that is, traffic between two clients on the same VLAN.

While this design decision helps conserve resources, it also creates blind spots if the network is flat. Protecting all traffic, including internal traffic from clients, is critical to ensure a zero-trust approach and prevent threats from moving laterally within the network. The system is designed to detect and block malicious traffic in real time, both inbound and within the network, using advanced IDS/IPS capabilities. That’s why it’s important to implement VLAN segmentation and avoid leaving all internal systems on a single broadcast domain. For zero-trust environments, this step is essential.

With Snort 3, Meraki is aligning more closely with zero-trust principles, treating all traffic, internal or external, as potentially hostile.

Meraki MX Threat Protection Modes – IDS vs IPS

Meraki MX offers flexible deployment modes for threat detection:

  • Detection (IDS) Mode: All traffic is logged and analyzed, but malicious flows are not blocked. This is useful for visibility and tuning.
  • Prevention (IPS) Mode: Packets matching threat signatures are blocked in real-time.

Both IDS and IPS modes enable proactive monitoring of network traffic, allowing for early detection and automated response to threats across your infrastructure.

Each mode can be paired with one of three detection rulesets:

  • Connectivity: Lightweight and fast. Ideal for performance-sensitive environments. Focuses only on high-CVSS vulnerabilities from the last two years.
  • Balanced: Default option. Provides protection against command-and-control traffic, exploit kits, SQL injection, and blocklisted indicators with moderate performance impact.
  • Security: Most aggressive. Includes more historical CVEs and application-layer threat detection.

For most environments, Balanced provides the best mix of safety and stability. High-security environments—such as financial services or defense contractors—may opt for the Security ruleset despite the higher CPU load.

Advanced Malware Protection (AMP)

AMP works alongside Snort to provide file-level inspection. When enabled, it inspects HTTP downloads and blocks known malware based on Cisco’s global threat database. AMP is specifically designed to detect and block malicious files before they can infect the network.

Here’s how it works:

  • A user attempts to download a file.
  • MX inspects the download and checks the hash against known threat signatures.
  • If the file is malicious, the download is blocked, and the event is logged in the Security Center.

AMP is especially useful in networks where endpoint protection may be inconsistent, such as guest environments, shared terminals, or BYOD deployments.

Administrators can review AMP events by navigating to Security & SD-WAN > Monitor > Security Center in the Meraki Dashboard.

URL Filtering

URL filtering is a cornerstone of effective network security, empowering organizations to control web access and enforce compliance with internal policies. Cisco Meraki MX appliances offer powerful URL filtering capabilities, enabling administrators to block or allow specific websites and categories with ease. This level of content filtering not only helps prevent users from accessing malicious or inappropriate sites but also reduces the risk of malware infections and exposure to cyber threats.

By aligning internet usage with organizational policies and compliance standards, URL filtering ensures that users remain productive and focused, while the network stays protected from harmful content. Meraki MX’s intuitive dashboard makes it simple to implement and manage URL filtering rules, providing granular control over web access across the entire organization.

With these advanced features, businesses can maintain a secure, compliant, and efficient network environment—protecting both users and critical data from evolving online threats.

Fine-Tuning Detection with Allow Lists

No threat detection system is perfect. Occasionally, AMP or Snort may block a legitimate file or domain. In these cases, Meraki provides two key allow list options:

  1. Allow List URLs: This list overrides AMP and Snort blocks on specific domains or IPs. You can enter URLs like https://trustedvendor.com/* to permit access moving forward. Wildcards are supported.
  2. Allow List Files: For non-URL-based detections, such as JavaScript snippets or file hashes, you can allow specific object IDs. These IDs are found in the event logs and can be added manually.

Only full organization admins have the rights to modify allow lists. This ensures that overrides are controlled and auditable across distributed teams.

Trusted Traffic Exclusions and Zero-Trust Design

With Snort 3, Meraki introduced a new feature: Trusted Traffic Exclusions. This allows admins to define IP ranges or hosts whose traffic should be exempt from inspection, such as internal application servers or partner appliances.

While this can reduce false positives, it should be used cautiously. In a true zero-trust network, no internal traffic should be automatically trusted. Use exclusions only when necessary and pair them with detailed logging to maintain oversight.

This feature allows Snort 3 to apply the same detection fidelity to both internal and external traffic, supporting zero-trust strategies where segmentation and validation are key.rnal and external traffic, supporting zero-trust strategies where segmentation and validation are key.

Logging, Alerts, and Visibility

Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured

From the Dashboard, you can:

  • View historical and real-time alerts
  • Filter by source, destination, threat type, or detection engine
  • Investigate AMP or Snort-based detections
  • Export events to Syslog or forward them to a SIEM

This centralized view supports incident response, compliance audits, and threat hunting. It’s also fully cloud-managed, which means no additional software or on-prem infrastructure is required.

Software License Management

Effective software license management is vital for maintaining strong network security and operational continuity. By ensuring that all security solutions are properly licensed and up-to-date, businesses can avoid unexpected service interruptions and reduce the risk of vulnerabilities. Comprehensive license management services, such as those offered by Mindsight, provide proactive oversight of software contracts, including full administration, co-termination of contract end dates, and timely notifications for End of Life (EOL), End of Support (EOS), and Last Day of Support (LDOS) for network devices.

This vigilant approach to license management helps organizations maintain the integrity, confidentiality, and availability of their data by ensuring that all security solutions remain operational and supported. It also streamlines management, reduces administrative burden, and minimizes risk—allowing IT teams to focus on strategic initiatives rather than compliance headaches.

By prioritizing software license management as part of their overall network security strategy, businesses can safeguard their infrastructure, maintain compliance, and ensure continuous protection against evolving cyber threats.

Best Practices for Secure Meraki MX Deployments

To maximize the value of Meraki MX threat protection, consider the following best practices:

  • Enable IPS mode as soon as you’ve evaluated your environment for false positives.
  • Use the Balanced ruleset for most environments; switch to Security mode for high-sensitivity networks.
  • Review firmware status regularly and upgrade to Snort 3-capable versions when eligible.
  • Avoid over-reliance on allow lists and implement a clear review process for overrides.
  • Use VLAN segmentation to increase inspection coverage and reduce attack surfaces.
  • Log events centrally via Syslog for better correlation and faster response.

To Conclude

Cisco Meraki MX, equipped with Snort 3 and AMP, offers a robust security platform for organizations that require agility and protection at scale. With cloud-managed updates, flexible rulesets, and zero-trust alignment, these appliances offer not just visibility, but action.

Stratus Information Systems helps organizations configure Meraki MX security the right way. Our experts can tailor deployments to your exact needs—from schools and city networks to global enterprises.

Need to upgrade to Snort 3 or fine-tune your threat policies? Talk to our team today.

Do you like this article?

Share with friend!

Read also

Stratus Information Systems - Cisco Meraki Channel Partner
Request a Free Quote
Whether you are considering moving to a cloud-hosted solution for the first time or just refreshing old gear, Stratus has the knowledge and expertise to set your organization up for a flawless network deployment.
Enter your requirements or upload your Bill of Materials (BoM) below
Thank you!
We are working on your request and we will contact you as soon as possible. Have a nice day!