Whitelist Cisco IronPort (ESA)
Whitelist Cisco IronPort (ESA) for CyTech – AQUILA Phishing Simulation
Why Whitelist in Cisco IronPort?
Whitelisting ensures that the CyTech - AQUILA Phishing Simulation (PS) emails are delivered without interference from Cisco IronPort’s anti-spam and threat detection filters. Without proper configuration, PS emails may be quarantined, flagged, or altered, impacting the accuracy and effectiveness of the training.
To ensure proper delivery, the following configurations are recommended:
-
IP Allow List (HAT Policy)
-
Mail Flow Policies (Mail Policy)
-
Content Filters (Bypass ATP and anti-spam)
-
Domain and URL Filtering
Key Configurations
1. Whitelist Sending IP Addresses (HAT Policy - Mail Flow Policy)
Steps:
-
Log in to Cisco IronPort (ESA) via the web interface.
-
Go to Mail Policies > HAT Overview.
-
Edit the Incoming Mail Policy or create a new one for CyTech Phishing Simulation.
-
Under the "Sender Group", create a new entry (e.g., AQUILA-Phish).
-
Add the following IPs: Mail Server and Landing Page
35.153.237.243
107.22.65.180
-
Set the Mail Flow Policy for this group to ACCEPTED.
✅ This ensures AQUILA emails are not rejected or throttled by IP filtering.
2. Whitelist Domains and Header-Based Filtering (Message Filters)
To ensure messages are recognized as simulations and not flagged, configure a custom header filter.
Steps:
Filter Syntax Example:
CyTech_Header_Bypass:
if (header("X-PHISHTEST") == "CYTECH") {
skip-spamcheck();
skip-viruscheck();
skip-attachmentcheck();
log-entry("CyTech Simulation Bypass");
}
-
Commit changes and enable the filter.
3. Create a Content Filter to Bypass Anti-Spam & ATP (Content Filters)
Steps:
-
Go to Mail Policies > Content Filters.
-
Add a new filter (e.g., AQUILA_Bypass_SPAM_ATP).
-
Create a condition using either:
-
Sender IP: match any of the CyTech IPs.
- 35.153.237.243
- 107.22.65.180
-
Sender Domain: match domains listed below.
-
Domains to Whitelist:
slackj.com
ttrelli.com
airbnd.cc
attlassians.com
eebbey.com
lastpasss.net
my1psswords.com
zooms.cc
-
Bypass spam and virus filters.
-
Optionally log a custom message.
-
Tag emails if needed for internal monitoring.
-
Commit changes.
4. URL Filtering / Allow List (Optional - Web Reputation / AMP Integration)
If you have Cisco AMP or Web Reputation Filters enabled:
Steps:
slackj.com/*
ttrelli.com/*
airbnd.cc/*
attlassians.com/*
eebbey.com/*
lastpasss.net/*
my1psswords.com/*
zooms.cc/*
5. Prioritize Rules (Recommended)
Ensure that the HAT, content filters, and message filters for CyTech Phishing Simulation have the highest priority or are evaluated before other blocking rules.
Final Checklist
IPs whitelisted in HAT policy
Custom header filtering configured (X-PHISHTEST: CYTECH)
Content filters bypass spam/virus checks
Simulation domains and URLs allowed
Filters/rules are enabled and prioritized correctly
If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.
No Comments