Twilio Interconnect allows you to connect your SIP infrastructure using a private connection (e.g. MPLS, cross-connect) to a Twilio Elastic SIP Trunk.
To connect over Twilio Interconnect, point your communications infrastructure to the following localized Termination SIP URIs:
Termination SIP URI | Interconnect Exchange |
---|---|
{example}.pstn.ashburn-ix.twilio.com | Ashburn, Virginia, United States |
{example}.pstn.san-jose-ix.twilio.com | San Jose, California, United States |
{example}.pstn.london-ix.twilio.com | London, United Kingdom |
{example}.pstn.frankfurt-ix.twilio.com | Frankfurt, Germany |
{example}.pstn.singapore-ix.twilio.com | Singapore |
{example}.pstn.tokyo-ix.twilio.com | Tokyo, Japan |
{example}.pstn.sydney-ix.twilio.com | Sydney, Australia |
If you are looking for a list of legacy Interconnect localized URIs, visit here. eg: {example}.pstn.ie1-ix.twilio.com
Configure your origination SIP URI, which identifies the network element entry point into your communications infrastructure (e.g. IP-PBX, SBC). To ensure your calls go over your private connection include the edge
parameter in the URI with the value of the Twilio Interconnect Edge Location where your private connection is configured, for example:
sip:172.56.42.132;edge={EDGE_LOCATION}
sip:mysbc.com;edge={EDGE_LOCATION}
Note: without the {}, for example:
sip:172.56.42.132;edge=ashburn-ix
sip:mysbc.com;edge=ashburn-ix
You may also use the deprecated tnx
parameter in the URI with the SID value of the desired Twilio Interconnect connection, however, it is preferred that you use the edge
parameter as documented above. An example of using the tnx
parameter:
sip:172.56.42.132;tnx={TNX_SID}
sip:mysbc.com;tnx={TNX_SID}
You can use multiple origination URIs for failover where you can have a primary URI send traffic over Twilio Interconnect, and a secondary URI send traffic over the public internet in the case of failure.
Interconnect Connections - Global Media IP Range
The Interconnect Connections Destination IP Ranges and Port Ranges are now identical across all locations:
Secure Media (ICE/STUN/SRTP) Edge Locations | Protocol | Source IP | Source Port † | Destination IP Ranges | Destination Port Range |
---|---|---|---|---|---|
sydney-ix (au1-ix) sao-paulo-ix (br1-ix) london-ix (ie1-ix) frankfurt-ix (de1-ix) tokyo-ix (jp1-ix) singapore-ix (sg1-ix) ashburn-ix (us1-ix) san-jose-ix (us2-ix) roaming (gll-ix) | UDP | ANY | ANY | 168.86.128.0/18 | 10,000 - 60,000 |
† The SDK will select any available port from the ephemeral range. On most machines, this means the port range 1,024 to 65,535.
We strongly encourage you to allow all of Twilio's following IP address ranges and ports on your firewall for SIP signalling traffic. This is important if you have Numbers in different regions and for resilience purposes (e.g. if North America Virginia gateways are down, then North America Oregon gateways will be used).
1208.78.112.642208.78.112.653208.78.112.664Ports: 5060 (UDP/TCP), 5061 (TLS)5
167.213.136.64267.213.136.65367.213.136.664Ports: 5060 (UDP/TCP), 5061 (TLS)5
1185.187.132.682185.187.132.693185.187.132.704Ports: 5060 (UDP/TCP), 5061 (TLS)5
1185.194.136.642185.194.136.653185.194.136.664Ports: 5060 (UDP/TCP), 5061 (TLS)5
1103.75.151.682103.75.151.693103.75.151.704Ports: 5060 (UDP/TCP), 5061 (TLS)5
1103.144.142.682103.144.142.693103.144.142.704Ports: 5060 (UDP/TCP), 5061 (TLS)5
1103.146.214.682103.146.214.693103.146.214.704Ports: 5060 (UDP/TCP), 5061 (TLS)5