This document provides information that might be required to configure a firewall and Cisco Email Security Appliance (ESA) for Cisco Registered Envelope Service (RES) communication to Cisco RES key servers. Customers with strict firewall rules require permissions for specific IP addresses or hostnames in order to allow communication for Cisco RES. Encryption via Cisco RES on the ESA requires firewall rules for port 80 and 443 in order to send key requests to Cisco RES to encrypt a message.
Cisco RES: IP Addresses and Hostnames for Key Servers
Cisco RES uses the following IP address ranges in order to initiate SMTP - Transport Layer Security (TLS) sessions:
Active (18.104.22.168 - 22.214.171.124)
Backup (126.96.36.199 - 188.8.131.52)
Some customers might restrict access to the Cisco RES key server res.cisco.com. The Cisco RES key server res.cisco.com has two (2) blocks of VIPs. Add them to your network device's access rules where appropriate:
Active (184.108.40.206 - 220.127.116.11)
Backup: (18.104.22.168 - 22.214.171.124)
Add the previously listed IP addresses and hostnames by their IP address range to your existing sender group that is used for TLS (Incoming):
Log in to the ESA GUI.
Navigate to Mail Policies > Host Access Table > HAT Overview and edit your TLS sender group (naming convention might vary).
Note: It is highly recommended to add the hostname .res.cisco.com along with the IP address range since any future additions will use the Domain Name Server (DNS) in order to do the lookup for the IP address information.
The previous Cisco RES key server hostnames might have been listed as: vega.res.cisco.com soma.res.cisco.com
It is recommended to update your network and/or firewall rules and definitions as well to match the previous information.