When using Firewalls, Anti-Virus, or other content blockers, Aircall has some configuration recommendations.
We Recommend opening ports in your router/firewall/antivirus software to the following:
- TCP: 443, 3478, 5349, 10194
- UDP: 443, 3478, and range from 10000 to 60000
Please also make sure to allow the following URLs and IP’s:
- *.aircall.io
- *.amazonaws.com
- *.twilio.com
- media.twiliocdn.com
- static.intercomcdn.com
- *.intercom.io
- ws.pusherapp.com
- *.pusher.com
⚠️ Please note that the * covers all subdomains.
Media Server (RTP traffic)
Region | IP Range | Port Range |
Worldwide | 168.86.128.0/18 | 10000 to 60000 UDP |
WebRTC Server (STUN traffic)
Region | IP Range | Port Range |
Worldwide | 168.86.128.0/18 |
10000 to 60000 UDP |
For Specific locations:
For users located physically in Texas or South Africa (or near them) kindly allow the below in order to be able to choose those servers with Roaming feature.
WebRTC Server (TURN traffic)
Region | IP Range | Port Range |
Texas (US2) |
18.88.10.37 |
10000 to 60000 UDP |
South Africa (IE1) | 13.247.45.53 13.244.44.255 13.247.0.151 |
10000 to 60000 UDP 443 TCP & UDP 3478 TCP & UDP 5349 TCP |
Middle East (DE1) |
3.29.101.45 |
10000 to 60000 UDP |
All of these Aircall domains are hosted on AWS (Amazon Web Services). You can find Amazon’s current public ranges by checking here. Amazon may change these ranges, and services could originate from any address in these ranges.
Please note: it is important to take into consideration that the below Gateway features may impact VOIP quality:
-
Deep Packet Inspection (DPI)
-
Stateful Packet Inspection (SPI)
-
Intrusion detection/intrusion prevention system (IDS/IPS)
-
Web proxy
-
WAN optimization devices
-
Port filtering
-
Packet-by-packet load balancing across multiple ISP links
-
UDP Time Out:
-
VoIP traffic generally uses UDP to set up the call and transmit media. Unlike TCP, UDP does not have a handshake, making it difficult for routers to know when a call is finished. Many firewalls/routers will have a timeout that kills the connection if no traffic is received. For the purposes of our service, this timeout should be increased to 90 seconds. If your firewall/router is capable, you can limit this extended timeout to only Aircall IPs.
-