Menu
  • Downloads
  • Knowledge Base
  • Documentation
  • Reputation
  • Email Security Tester
  • Downloads
  • Knowledge Base
  • Documentation
  • Reputation
  • Email Security Tester
home/Knowledge Base/Libraesva ESG/Libraesva ESG Firewall Ports Requirements
Popular searches:GDPR, ESG 5 migration guide, "How to configure Libraesva ESG for Microsoft 365"

Libraesva ESG Firewall Ports Requirements

4405 views 2 May 21, 2014 Updated on July 12, 2024 sal

Table of Contents

  • Mandatory ports
  • Optional ports
  • More details
    • DNS (port 53)
    • SMTP (port 25)
    • HTTP (port 80)
    • HTTPS (port 443)
    • Razor2 (port 2703)
    • Pyzor (port 24441)
    • DCC (port 6277)
    • OpenPGP (port 11371)
Print to PDF

Libraesva ESG needs to open and receive connections from and to some ports. You must completely exclude the firewall and all Layer-7 inspections from it on the listed ports.

Note: you can easily test your firewall configuration using the on-board Check Firewall Ports tool.

Mandatory ports

Below are the ports Libraesva ESG needs open.

  • TCP/UDP 53: DNS (outbound) without Layer-7 firewall inspection
  • TCP 25: SMTP (bi-directional) without Layer-7 firewall inspection
  • TCP 80: HTTP (outbound) without Layer-7 firewall inspection
  • TCP 443: HTTPS (outbound) without Layer-7 firewall inspection
  • TCP 2703: Razor2 (outbound)
  • UDP 24441: Pyzor (outbound)
  • UDP 6277: DCC (outbound)

Optional ports

Below are the ports Libraesva ESG needs open if using the related service.

  • TCP 465: SMTPS (inbound)
  • TCP 578: SMTPS (inbound)
  • TCP 389: LDAP (from Libraesva ESG to LDAP Server)
  • TCP 636: LDAPS (from Libraesva ESG to LDAP Server)

More details

DNS (port 53)

ESG performs a very high volume of DNS requests during email analysis, for this reason it has a high performance recursive DNS onboard.
DNS is crucial both for being able to deliver email and to perform reputation checks of email relays, contents and links.
Using an external DNS may lead to delays in email delivery and in a degradation of the quality of the analysis.
The onboard DSN requires outbound traffic to port 53 (both UDP and TCP) to be allowed without any inspection or rate-limiting.

SMTP (port 25)

ESG must be able to receive email and to send outbound email (this includes NDR messages for inbound traffic), so traffic to TCP port 25 inbound and outbound must be unrestricted.
Content inspection on SMTP can interfere and impair ESG’s ability to perform its task, it is advised to disable any content inspection for this traffic, ESG is a perimeter protection appliance designed to handle  malicious content safely.

HTTP (port 80)

ESG analyses links in emails and also discovers the real link behind a shortener (or a chain of shorteners). Some of these links are in plain HTTP.
There are hundreds of shortening services and new services pop-up every day, so the list of IP addresses cannot be pre-determined and ESG must be able to access any host on TCP port 80 (outbound only).
If the firewall blocks this outbound traffic to port 80, ESG will not be able to resolve some of the shortened links and it will not be able to perform reputation checks on the real links hidden behind the shortening services (a very common technique to try to avoid reputation checks).
Inbound HTTP traffic is required for certificate renewal.
Let’s Encrypt servers need to connect to Libraesva ESG on port 80 when issuing or renewing the certificate. The list of servers is not static and cannot be pre-authorised. If inbound traffic to port 80 is not allowed, Let’s Encrypt certificates cannot be used.
Content inspection on HTTP can interfere and impair ESG ability to perform its task, it is advised to disable any content inspection for this traffic, ESG is a perimeter protection appliance designed to handle  malicious content safely.

HTTPS (port 443)

This protocol is used to download system updates, security updates, virus definition updates, engine updates and reputation data updates. Such updates happen continuously with a frequency of about five minutes.
This data is distributed through content delivery networks like Cloudflare’s and others. It is not possible to define a list of IP addresses to be pre-authorised therefore outbound traffic to TCP port 443 must be unrestricted for ESG.
If this traffic is restricted, ESG will not be able to perform it’s tasks.
Inbound HTTPS traffic must be allowed if the web interface of Libraesva ESG must be accessed from the Internet, this includes outlook plugins and mobile applications. Network restrictions can be configured on Libraesva ESG itself.

Razor2 (port 2703)

It is a distributed network of servers that share hashes of email features along with a reputation index. The system is used to quickly discover and block spam campaigns that hit multiple servers.
The protocol automatically discovers the list of IP addresses to connect to, the network is dynamic and a fixed list of IP addresses cannot be pre-approved.
The firewall configuration requires outbound TCP traffic to port 2703, this enables ESG to connect to any host but only on this port.
If the firewall blocks this traffic, ESG will not use razor2 for the email analysis, all other checks will be performed.

Pyzor (port 24441)

It is a distributed network of servers that share sanitised hashes of email contents. It is used to discover email campaigns that hit multiple email servers and multiple recipients with the same email content, which is one of the characteristics of spam campaigns.
The protocol automatically discovers the list of IP addresses to connect to, the network is dynamic and a fixed list of IP addresses cannot be pre-approved.
The firewall configuration requires outbound UDP traffic to port 24441, this enables ESG to connect to any host but only on this port.
If the firewall blocks this traffic, ESG will not use Pyzor for the email analysis, all other checks will be performed.

DCC (port 6277)

It is a distributed network of servers that share sanitised checksums of email contents It is used to discover email campaigns that hit multiple email servers and multiple recipients with the same email content, which is one of the characteristics of spam campaigns.
The protocol connects to Libraesva’s DCC servers dcc1.esvacloud.com and dcc2.esvacloud.com.
The firewall configuration requires outbound UDP traffic to port 6277 of the servers above.
If the firewall blocks this traffic, ESG will not use DCC for the email analysis, all other checks will be performed.

OpenPGP (port 11371)

By convention and history, HKP uses HTTP on TCP port 11371, and HTTPS on TCP port 443. These are often distinguished from generic use of HTTP(S) by using the URI schemes “hkp” and “hkps”. For reasons of maximum compatibility with firewalls and filtering HTTP proxies, HKP is also often served over the standard HTTP port (TCP port 80)

reference https://www.ietf.org/archive/id/draft-gallagher-openpgp-hkp-04.html

Tags:firewallfirst setupinfrastructureportsrequirements

Was this helpful?

2 Yes  2 No
Related Articles
  • Troubleshooting Outlook Add-in Authentication with Microsoft 365
  • Libraesva AI usage: technical implementation, governance, privacy and regulatory compliance
  • ESG API
  • Cluster Firewall ports requirements for workers (distributed setup)
  • Encryption at rest
  • Distributed setup

Didn't find your answer? Contact Us

Popular Article
  • Encryption at rest
  • Protocol number
  • Migration process from UkCloud due to liquidation
  • Cluster Firewall ports requirements for workers (distributed setup)
  • Quarantine Reports are not sent after a migration
Tag Cloud
active content blacklist Cluster Alert Cluster Error delisting delivery disk performance email esva file sandbox gdpr hypervisor ip address memory usage monitoring monitring performance privacy production quarantine disk quicksand rbl reputation retention time sandbox sanitize document security snmp template testing tnef uri sandbox url rewrite url sandbox winmail.dat zabbix

  Libraesva AI usage: technical implementation, governance, privacy and regulatory compliance

Libra Esva 3.2 Greylisting link error  

Products
  • Email Security Gateway
  • Email Archiving & Compliance
  • Phishing Awareness
Industry
  • SMB Companies
  • Large Companies
  • Education
  • MSP’s
Solutions
  • Microsoft 365
  • General Data Protection Regulation (GDPR)
  • Business Email Compromise
  • Migrate from Symantec
Resources
  • Email Security Tester
  • Company Website
  • Security Blog
  • Case Studies
  • Free Tech Webinars
Partners
  • Partner Portal
  • Become a Partner
  • Technology Alliances
Company
  • About Libraesva
  • Why Libraesva
  • News
  • Careers
  • Contact Us

LIBRAESVA SRL
Piazza Cermenati, 11
23900 Lecco - ITALY
VAT ID: 03442930131


LIBRAESVA LIMITED
Spaces, 83 Baker St
London W1U 6AG - United Kingdom
VAT ID: 274381685


LIBRAESVA INC
2608 2nd Ave, Suite 327
Seattle, WA 98121 - United States

  • (C) Libraesva 2024 - All rights reserved

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT

WordPress Download Manager

WordPress Download Manager - Best Download Management Plugin

Popular searches:GDPR, ESG 5 migration guide, "How to configure Libraesva ESG for Microsoft 365"