Configure your Trunk using Twilio Interconnect
Twilio Interconnect allows you to connect your SIP infrastructure using a private connection (e.g. MPLS, cross-connect) to a Twilio Elastic SIP Trunk.
Configure your Trunk using Twilio Interconnect
Termination settings for Twilio Interconnect
To connect over Twilio Interconnect, point your communications infrastructure to the following localized Termination SIP URIs:
Termination SIP URI | Interconnect Exchange |
---|---|
{example}.pstn.ashburn-ix.twilio.com |
Ashburn, Virginia, United States |
{example}.pstn.san-jose-ix.twilio.com |
San Jose, California, United States |
{example}.pstn.london-ix.twilio.com |
London, United Kingdom |
{example}.pstn.frankfurt-ix.twilio.com |
Frankfurt, Germany |
{example}.pstn.singapore-ix.twilio.com |
Singapore |
{example}.pstn.tokyo-ix.twilio.com |
Tokyo, Japan |
{example}.pstn.sydney-ix.twilio.com |
Sydney, Australia |
If you are looking for a list of legacy Interconnect localized URIs, visit here. eg: {example}.pstn.ie1-ix.twilio.com
Origination settings for Twilio Interconnect
Configure your origination SIP URI, which identifies the network element entry point into your communications infrastructure (e.g. IP-PBX, SBC). To ensure your calls go over your private connection include the edge
parameter in the URI with the value of the Twilio Interconnect Edge Location where your private connection is configured, for example:
sip:172.56.42.132;edge={EDGE_LOCATION}
sip:mysbc.com;edge={EDGE_LOCATION}
Note: without the {}, for example:
sip:172.56.42.132;edge=ashburn-ix
sip:mysbc.com;edge=ashburn-ix
You may also use the deprecated tnx
parameter in the URI with the SID value of the desired Twilio Interconnect connection, however, it is preferred that you use the edge
parameter as documented above. An example of using the tnx
parameter:
sip:172.56.42.132;tnx={TNX_SID}
sip:mysbc.com;tnx={TNX_SID}
You can use multiple origination URIs for failover where you can have a primary URI send traffic over Twilio Interconnect, and a secondary URI send traffic over the public internet in the case of failure.
IP Addresses using Twilio Interconnect
We strongly encourage you to allow all of Twilio's following IP address ranges and ports on your firewall for SIP signalling and RTP media traffic. This is important if you have Numbers in different regions and for resilience purposes (e.g. if North America Virginia gateways are down, then North America Oregon gateways will be used).
North America Virginia Interconnect Gateways:
Signalling IPs:
208.78.112.64 208.78.112.65 208.78.112.66 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
North America San Jose Interconnect Gateways:
Signalling IPs:
67.213.136.64 67.213.136.65 67.213.136.66 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Europe London Interconnect Gateways:
Signalling IPs:
185.187.132.68 185.187.132.69 185.187.132.70 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Europe Frankfurt Interconnect Gateways:
Signalling IPs:
185.194.136.64 185.194.136.65 185.194.136.66 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Asia Pacific Singapore Interconnect Gateways:
Signalling IPs:
103.75.151.68 103.75.151.69 103.75.151.70 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Asia Pacific Tokyo Interconnect Gateways:
Signalling IPs:
103.144.142.68 103.144.142.69 103.144.142.70 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Asia Pacific Sydney Interconnect Gateways:
Signalling IPs:
103.146.214.68 103.146.214.69 103.146.214.70 Ports: 5060 (UDP/TCP), 5061 (TLS)
Media IPs:
168.86.128.0/18 Port Range: 10,000 to 60,000 (UDP)
Need some help?
We all do sometimes; code is hard. Get help now from our support team, or lean on the wisdom of the crowd by visiting Twilio's Stack Overflow Collective or browsing the Twilio tag on Stack Overflow.