Stay organized with collections
Save and categorize content based on your preferences.
For the agent adapter to function properly, certain domains, IP addresses, and
ports must be permitted in your network infrastructure. The domains and IP
addresses also need to be permitted on any system utilities such as Norton,
ESET, McAfee, ZoneAlarm or any other software that controls external
connectivity.
CCAI Platform uses carriers' Global Low Latency routing
capabilities by default. This dynamic capability uses latency-based DNS lookups
to determine your location and routes requests through the nearest data center.
You can also set a fixed location if your users are using a DNS server in
another region.
If you use a restricted network that requires media IP access to be permitted,
Google recommends that you specify the region within your network allowances. As our
global presence continues to expand, the media IP address list will be updated.
Ports
The following ports should be permitted for egress connectivity:
443 UDP/TCP
10,000 to 60,000 UDP (Ephemeral Port Range)
4080 UDP/TCP
3478 UDP/TCP
5349, 5066, 7443 TCP (STUN/TURN)
Media IP ranges
The following table shows the IP address ranges that must be permitted in your
network infrastructure to allow the passing of voice traffic through the agent
adapter.
Agent adapter (webRTC)
36.255.198.128/25
50.114.136.128/25
50.114.144.0/21
64.16.226.0/24
64.16.227.0/24
64.16.228.0/24
64.16.229.0/24
64.16.230.0/24
64.16.248.0/24
64.16.249.0/24
Domains (TCP Traffic on Port 443)
The following domains must be permitted in your network infrastructure:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eThe agent adapter requires specific domains, IP addresses, and ports to be permitted within your network infrastructure and security software for proper functionality.\u003c/p\u003e\n"],["\u003cp\u003ePermitted egress ports include 443 TCP, 10,000 to 60,000 UDP, 3478 UDP/TCP, and 5349 TCP for STUN/TURN.\u003c/p\u003e\n"],["\u003cp\u003eA range of media IP addresses must be whitelisted to ensure voice traffic passes through the agent adapter, and this list will be updated as global presence expands.\u003c/p\u003e\n"],["\u003cp\u003eCCAI Platform uses latency-based DNS lookups to route requests through the nearest data center, but a fixed location can be set if needed.\u003c/p\u003e\n"],["\u003cp\u003eSpecific domains must be permitted for general use and for providers like Twilio, Nexmo, Vonage, and Telnyx.\u003c/p\u003e\n"]]],[],null,["# Agent adapter IP allow list\n\nFor the agent adapter to function properly, certain domains, IP addresses, and\nports must be permitted in your network infrastructure. The domains and IP\naddresses also need to be permitted on any system utilities such as Norton,\nESET, McAfee, ZoneAlarm or any other software that controls external\nconnectivity.\n\nCCAI Platform uses carriers' Global Low Latency routing\ncapabilities by default. This dynamic capability uses latency-based DNS lookups\nto determine your location and routes requests through the nearest data center.\nYou can also set a fixed location if your users are using a DNS server in\nanother region.\n\nIf you use a restricted network that requires media IP access to be permitted,\nGoogle recommends that you specify the region within your network allowances. As our\nglobal presence continues to expand, the media IP address list will be updated.\n| **Note:** Connections can be established to regions that are not permitted by your infrastructure.\n\nPorts\n-----\n\nThe following ports should be permitted for egress connectivity:\n\n- 443 UDP/TCP\n- 10,000 to 60,000 UDP (Ephemeral Port Range)\n- 4080 UDP/TCP\n- 3478 UDP/TCP\n- 5349, 5066, 7443 TCP (STUN/TURN)\n\nMedia IP ranges\n---------------\n\nThe following table shows the IP address ranges that must be permitted in your\nnetwork infrastructure to allow the passing of voice traffic through the agent\nadapter.\n\n### Agent adapter (webRTC)\n\n- 36.255.198.128/25\n- 50.114.136.128/25\n- 50.114.144.0/21\n- 64.16.226.0/24\n- 64.16.227.0/24\n- 64.16.228.0/24\n- 64.16.229.0/24\n- 64.16.230.0/24\n- 64.16.248.0/24\n- 64.16.249.0/24\n\nDomains (TCP Traffic on Port 443)\n---------------------------------\n\nThe following domains must be permitted in your network infrastructure:\n\n- General:\n - api.ujet.co\n - firebaseio.comgstatic.com\n - firebasedatabase.app\n - ccaiplatform.com\n - stun.l.google.com\n - stun1.l.google.com\n - stun2.l.google.com\n - stun3.l.google.com\n - stun4.l.google.com\n- Twilio:\n - chunderw-gll.twilio.com\n - chunderw-vpc-gll.twilio.com\n - chunderw-vpc-gll-au1.twilio.com\n - chunderw-vpc-gll-br1.twilio.com\n - chunderw-vpc-gll-de1.twilio.com\n - chunderw-vpc-gll-ie1.twilio.com\n - chunderw-vpc-gll-jp1.twilio.com\n - chunderw-vpc-gll-sg1.twilio.com\n - chunderw-vpc-gll-us1.twilio.com\n - matrix.twilio.com\n - eventgw.twilio.com\n - eventgw.us1.twilio.com\n - twiliocdn.com\n - networktest.twilio.com\n- Nexmo:\n - api-us-1.nexmo.com\n - api-us-2.nexmo.com\n - api-sg-1.nexmo.com\n - api-eu-1.nexmo.com\n - api-eu-2.nexmo.com\n - ws-us-1.nexmo.com\n - ws-us-2.nexmo.com\n - ws-sg-1.nexmo.com\n - ws-eu-1.nexmo.com\n - ws-eu-2.nexmo.com\n- Vonage:\n - api-us-3.vonage.com\n - api-us-4.vonage.com\n - api-eu-3.vonage.com\n - api-eu-4.vonage.com\n - api-ap-3.vonage.com\n - api-ap-4.vonage.com\n - ws-us-3.vonage.com\n - ws-us-4.vonage.com\n - ws-eu-3.vonage.com\n - ws-eu-4.vonage.com\n - ws-ap-3.vonage.com\n - ws-ap-4.vonage.com\n- Telnyx:\n - stun.telnyx.com\n - turn.telynx.com\n - sip.telnyx.com\n - sip.telnyx.ca\n - sip.telnyx.eu\n - sip.telnyx.com.au\n - rtc.telnyx.com"]]