Akamai Technologies, Inc. currently publishes it's IP ranges under these 14 ASNs (limiting the list to US based operations):
AS36183, AS35994, AS35993, AS30675, AS23455, AS23454, AS22207, AS20189, AS18717, AS18680, AS17334, AS16702, AS16625, AS12222
The list of IP ranges goes into the thousands though (roughly 4000 of them), so I suggest you rather define firewall rules based on reverse DNS lookups, if that's possible on your equipment, or compile an import list by using the approach I describe in the answer to the question "How to get info on company , company owned sites etc…?".
Problem is, these ASNs and IP ranges might constantly change, and you'll have to keep your list updated on regular basis.
Alternatively, you could extract only IP ranges (IPv4 and/or IPv6) published under the ASN your network is assigned to, hopefully limiting that list to a more manageable number of ranges.
Edit to add: You say in the comments to your question that rDNS is out of the question for being insecure. You're spot on with that, as these records a reverse DNS lookup is checking against can be all too easily spoofed. There is one way to check this however that might mean it's also possible to automate your firewall filters without resorting to ridiculously long IP range lists: Forward-confirmed reverse DNS Look-up.
I wouldn't know if your firewall appliance is actually capable of doing this check, so that might be a no-go, but if it does, what it will do is take the client's IP that is connecting, do a reverse DNS lookup and then query the DNS name returned against A
or AAAA
records. If the list returned includes client IP, then the FCrDNS was successful, otherwise it wasn't. See this question of mine for a bit more explanation on how this FCrDNS might be used and what it's good for.