Skip to main content

Network Requirements

This guide details the network requirements for integrating with Exotel, including firewall rules, ports, protocols, bandwidth recommendations, and DNS configuration. Ensure your network meets these requirements for reliable voice, SMS, and API communication.

API Connectivity​

Exotel API Endpoints​

ServiceEndpointProtocolPort
REST API (v1)api.exotel.comHTTPS443
REST API (v2)api.exotel.com/v2HTTPS443
REST API (v3)api.exotel.com/v3HTTPS443
Dashboardmy.exotel.comHTTPS443
Call Recordings*.amazonaws.com (S3)HTTPS443

Firewall Rules for API Access​

Allow outbound traffic from your servers to the following:

DestinationProtocolPortPurpose
api.exotel.comTCP (HTTPS)443API requests
my.exotel.comTCP (HTTPS)443Dashboard access
*.amazonaws.comTCP (HTTPS)443Recording downloads

Firewall Rules for Webhooks (Inbound)​

Allow inbound traffic from Exotel's servers to your webhook endpoints:

SourceProtocolPortPurpose
Exotel IP rangesTCP (HTTPS)443 (or your custom port)Webhook deliveries
info

Contact Exotel support or your account manager for the current list of Exotel IP ranges to whitelist. See also IP Whitelisting.

WebRTC Requirements​

If you are using Exotel's WebRTC SDK for browser-based calling, the following additional network requirements apply.

Ports and Protocols​

ProtocolPort RangeDirectionPurpose
HTTPS443OutboundWebRTC signaling (WSS)
STUN/TURN3478OutboundNAT traversal
TURN (TLS)443, 5349OutboundNAT traversal over TLS
UDP10000 -- 60000OutboundMedia (RTP/SRTP)
TCP443OutboundMedia fallback (TURN over TCP)

WebRTC Media Flow​

Browser (Agent)
│
├── WSS (443) ──► Signaling Server (WebSocket)
│
├── STUN (3478) ──► STUN Server (NAT discovery)
│
└── UDP (10000-60000) ──► Media Server (voice audio)
or
TCP (443) ──► TURN Server (media relay, if UDP blocked)
warning

If your corporate network blocks UDP traffic or uses a restrictive firewall, WebRTC calls will fall back to TURN over TCP (port 443). This may increase latency. For the best call quality, allow UDP traffic on ports 10000 -- 60000.

WebRTC Domains to Whitelist​

DomainPurpose
*.exotel.comSignaling and API
*.twilio.comMedia servers (if Twilio-based WebRTC)
global.stun.twilio.comSTUN server
global.turn.twilio.comTURN server

SIP Trunk Requirements​

For SIP trunk integrations (see VSIP documentation):

Ports and Protocols​

ProtocolPortDirectionPurpose
SIP (UDP)5060BidirectionalSIP signaling
SIP (TCP)5060BidirectionalSIP signaling (TCP)
SIP (TLS)5061BidirectionalSecure SIP signaling
RTP (UDP)10000 -- 60000BidirectionalVoice media
SRTP (UDP)10000 -- 60000BidirectionalEncrypted voice media

SIP Codec Support​

CodecBandwidthQualityRecommended
G.711 (PCMU/PCMA)64 kbpsToll qualityYes (preferred)
G.7298 kbpsGoodYes (low bandwidth environments)
Opus6 -- 510 kbps (variable)ExcellentYes (WebRTC)

Bandwidth Requirements​

Voice Calls​

CodecBandwidth per Call10 Concurrent Calls50 Concurrent Calls
G.71180 -- 100 kbps0.8 -- 1 Mbps4 -- 5 Mbps
G.72924 -- 32 kbps0.24 -- 0.32 Mbps1.2 -- 1.6 Mbps
Opus32 -- 64 kbps0.32 -- 0.64 Mbps1.6 -- 3.2 Mbps

API Traffic​

ActivityBandwidthNotes
API callsMinimal (< 1 Mbps)Small JSON payloads
Webhook deliveryMinimal (< 1 Mbps)Small POST payloads
Recording download10 -- 50 Mbps (during bulk download)Depends on file size and concurrency
Dashboard accessStandard web (1 -- 5 Mbps)Browser-based

Network Quality Requirements​

MetricAcceptable RangeImpact of Poor Performance
Latency< 150 ms (one-way)Noticeable delay in conversation
Jitter< 30 msAudio distortion, choppy speech
Packet loss< 1%Dropped audio, gaps in speech
BandwidthSee codec table aboveAudio quality degradation
tip

For the best voice quality, use a dedicated internet connection for voice traffic, or implement QoS (Quality of Service) rules to prioritize voice packets over other traffic.

DNS Configuration​

Required DNS Resolution​

Ensure your DNS servers can resolve the following domains:

DomainPurpose
api.exotel.comREST API
my.exotel.comDashboard
*.exotel.comAll Exotel services
*.amazonaws.comRecording storage (S3)

DNS Best Practices​

  1. Use multiple DNS servers -- Configure at least two DNS resolvers for redundancy
  2. Low TTL awareness -- Exotel may update DNS records; respect TTL values
  3. No DNS caching of resolved IPs -- Do not hard-code resolved IP addresses; always use domain names

Proxy and Firewall Considerations​

HTTP Proxy​

If your network routes outbound traffic through an HTTP proxy:

RequirementDetails
HTTPS CONNECT supportProxy must support the HTTP CONNECT method for TLS tunneling
Certificate inspectionIf your proxy performs SSL inspection, ensure it does not break Exotel's TLS certificates
TimeoutProxy timeout must be > 60 seconds for long-running API calls

Corporate Firewall​

RuleDirectionSourceDestinationPortProtocol
API accessOutboundYour serversapi.exotel.com443TCP
DashboardOutboundUser browsersmy.exotel.com443TCP
WebhooksInboundExotel IPsYour servers443TCP
WebRTC signalingOutboundAgent browsers*.exotel.com443TCP
WebRTC mediaOutboundAgent browsersMedia servers10000-60000UDP
WebRTC fallbackOutboundAgent browsersTURN servers443TCP
SIP signalingBidirectionalYour PBXExotel SIP proxy5060/5061UDP/TCP
SIP mediaBidirectionalYour PBXExotel media servers10000-60000UDP

Network Testing​

Connectivity Test​

Verify basic connectivity to Exotel services:

# Test API connectivity
curl -v https://api.exotel.com/v1/

# Test DNS resolution
nslookup api.exotel.com

# Test HTTPS connectivity
openssl s_client -connect api.exotel.com:443

# Test latency
ping api.exotel.com

Voice Quality Test​

For WebRTC or SIP deployments, test voice quality:

  1. Make a test call through Exotel
  2. Check for audio clarity, echo, delay, and one-way audio
  3. Monitor network metrics (latency, jitter, packet loss) during the call
  4. Use tools like iperf or traceroute to diagnose network issues

Troubleshooting​

IssuePossible CauseResolution
API requests timeoutFirewall blocking port 443 outboundAllow outbound TCP 443 to api.exotel.com
Webhooks not receivedFirewall blocking Exotel's inbound IPsWhitelist Exotel IP ranges for inbound 443
WebRTC no audioUDP blocked on networkOpen UDP 10000-60000 or enable TURN fallback
WebRTC one-way audioAsymmetric NAT or firewallConfigure TURN server; check NAT type
SIP registration failsPort 5060/5061 blockedAllow SIP ports bidirectionally
Poor voice qualityHigh latency, jitter, or packet lossCheck network metrics; enable QoS
Recording download failsS3 domain blockedWhitelist *.amazonaws.com on port 443