Firewall Configuration for WebRTC Calls (End-User Networks)
This article describes the required firewall configuration for end-users who want to make WebRTC voice calls from our web application.
TrueEngage uses Vonage WebRTC for real-time audio communication. If users are behind a corporate firewall, specific IP addresses, domains, ports, and protocols must be allowed for calls to work correctly.
- This configuration applies to end-user networks (customers, agents, employees).
- This is NOT a Genesys configuration.
- These rules are required on the user's corporate firewall.
Symptoms of Missing Firewall Rules
If required firewall rules are blocked, users may experience:
- Calls that connect but no audio in either direction
- Calls that never fully connect
- Calls that immediately drop
Official Vonage Documentation
For the most up-to-date and authoritative requirements, please refer to Vonage’s official documentation: https://api.support.vonage.com/hc/en-us/articles/11117874324508-What-are-the-Vonage-Video-API-network-connectivity-requirements
Required Firewall Rules
1. WebRTC Signaling (Call Setup)
Used to establish and control WebRTC calls. This is the absolute minimum — without TCP 443 open, nothing will work.
| Destination | Port | Protocol | Purpose |
|---|---|---|---|
*.vonage.com |
443 | TCP (WSS / HTTPS) | Signaling & WebSocket connections |
*.nexmo.com |
443 | TCP (WSS / HTTPS) | Signaling & WebSocket connections |
2. STUN / TURN Servers (NAT Traversal and Media Relay)
Required to allow audio to flow through NATs and restrictive firewalls. Vonage uses STUN/TURN for ICE negotiation. All connections are outbound-initiated — no ports need to be permanently open inbound, and there are no port-forwarding requirements.
3. Media (RTP Audio Streams)
Actual voice traffic is transmitted using RTP over UDP.
| Protocol | Port Range | Direction |
|---|---|---|
| UDP | 10000 – 50000 | Outbound (inbound after outbound request) |
Allowed IP Ranges (Primary Subnets)
These subnets cover all Vonage API traffic: HTTP Callbacks, WebHooks, WebSocket connections, SIP, and RTP/Media. Allow both ranges for full coverage.
- 216.147.0.0/18
- 168.100.64.0/18
4. SIP Signaling (Used Internally by Vonage)
Even though the application uses WebRTC in the browser, Vonage uses SIP internally for call routing to Genesys Cloud. The primary subnets above cover SIP traffic, but if your firewall requires specific host-level rules, use the addresses below.
| Protocol | Port | Purpose |
|---|---|---|
| UDP | 5060 | SIP signaling |
| TCP | 5060 | SIP signaling |
| TLS | 5061 | Encrypted SIP signaling |
Specific SIP IP Addresses
Use the primary subnets above where possible. If your platform cannot accept subnet notation, allow the following individual IPs:
- 216.147.0.1
- 216.147.0.2
- 216.147.1.1
- 216.147.1.2
- 216.147.2.1
- 216.147.2.2
- 216.147.3.1
- 216.147.3.2
- 216.147.4.1
- 216.147.4.2
- 216.147.5.1
- 216.147.5.2
216.147.0.0/18 and 168.100.64.0/18) rather than individual IPs, to avoid configuration changes if Vonage adds new addresses in the future.Quick Reference Summary
| Traffic Type | Destination | Port(s) | Protocol |
|---|---|---|---|
| WebRTC Signaling | *.vonage.com, *.nexmo.com |
443 | TCP (WSS) |
| TURN (minimum) | 216.147.0.0/18, 168.100.64.0/18 |
3478 | UDP |
| TURN (fallback) | 216.147.0.0/18, 168.100.64.0/18 |
443 | TCP |
| RTP / Media | 216.147.0.0/18, 168.100.64.0/18 |
10000 – 50000 | UDP |
| SIP Signaling | 216.147.0.0/18, 168.100.64.0/18 |
5060 / 5061 | UDP / TCP / TLS |
Important Notes for IT & Security Teams
- IP ranges are maintained by Vonage and may change over time — the authoritative list is available at: https://api.support.vonage.com/hc/en-us/articles/360035471331
Need Help?
If calls still fail after applying these rules:
- Verify that UDP traffic is not blocked or rate-limited
- Confirm that outbound rules are applied (inbound is not required)
- Contact your network administrator to review firewall logs for dropped packets on the ports above
If needed, our support team can assist in validating the configuration.