Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • wvx Voice Interaction

How to Integrate Your Telephone Exchange with the wolkvox Contact Center Platform to Manage Inbound Calls (Inbound Topology)

Written by Jhon Bairon Figueroa

Updated at March 9th, 2026

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Introduction Configuration 1) Understand the Inbound Integration Topology Wolkvox Side Internet Connection Client Side 2) Verify the Technical Integration Requirements Communication Protocol Required Ports TCP UDP Supported Codecs 3) Enable Ports on the Firewall TCP UDP 4) Provide the Public IP of the Infrastructure 5) Configure the SIP Trunk Credentials 6) Perform Connectivity and Audio Tests 7) Validate the Available Bandwidth 8) Apply Best Configuration Practices Specific Case for Fortinet

Introduction

If you have a telephone exchange in your company and need to route inbound calls to the wolkvox Contact Center platform, it is necessary to perform a technical integration using a SIP trunk.

This integration allows calls arriving at your telephone infrastructure to be managed by wolkvox, where they can be distributed to agents, automated via IVR, or integrated with other service flows.

To achieve a successful integration, it is important to understand the inbound connection topology, the required ports and protocols, and follow a configuration procedure that ensures stable communication between the client's infrastructure and wolkvox's SIP servers.

 

 

Configuration

 

1) Understand the Inbound Integration Topology

The integration between your telephone exchange and wolkvox follows a SIP-based connection structure involving the following components:

 

Wolkvox Side

The following elements are involved in the wolkvox infrastructure:

  • SIP Servers: Responsible for managing call signaling and processing.
  • Virtual Private Cloud (VPC): Private environment that isolates and protects the infrastructure.
  • Cloud Firewall Rules: Control incoming and outgoing traffic to ensure security.
  • Cloud Router: Enables connectivity between the wolkvox infrastructure and the public network.

 

Internet Connection

All communication between the client's infrastructure and wolkvox is carried out over the internet, using the defined protocols and ports for signaling and audio transmission.

 

Client Side

The following are involved in the client's infrastructure:

  • Firewall: Responsible for controlling access to the corporate network.
  • Server or PBX (telephone exchange): From where calls are originated or routed to wolkvox.

 

The agent finally attends the call from the wolkvox interface.

 

 

2) Verify the Technical Integration Requirements

Before starting the configuration, it is important to validate the following technical requirements.

 

Communication Protocol

Integration with wolkvox is done exclusively via:

  • SIP (Session Initiation Protocol)

 

Required Ports

For communication to work correctly, the following ports must be enabled on the firewall.

 

TCP

  • 80 (HTTP)
  • 443 (HTTPS)

 

UDP

  • 5060 – 5061 (SIP signaling)
  • 10000 – 20000 (RTP voice traffic)

 

Supported Codecs

wolkvox supports the following audio codecs:

  • GSM
  • G711
  • G729
  • G723

 

It is recommended to use GSM for better performance and stability.

 

 

3) Enable Ports on the Firewall

Configure your infrastructure's firewall to allow communication with wolkvox servers. You must enable:

 

TCP

  • 80 (HTTP)
  • 443 (HTTPS)

 

UDP

  • 5060 – 5061 (SIP signaling)
  • 10000 – 20000 (RTP traffic)

 

This configuration is essential to allow both call signaling and audio transmission.

 

 

4) Provide the Public IP of the Infrastructure

You must provide wolkvox with the public IP from which call traffic will be generated.

 

Once this information is received:

  • wolkvox will configure access from its servers.
  • wolkvox will provide you with the public IP of the SIP server to be configured in your telephone exchange or firewall.

 

It is important that the previously defined ports are enabled for this IP.

 

 

5) Configure the SIP Trunk Credentials

The wolkvox implementation team will provide the SIP trunk authentication credentials needed to complete the integration. This configuration should be validated with the support of the technical team.

 

For initial testing, it is recommended to use a softphone, such as:

  • Zoiper
  • X-Lite

 

Preferably, the test should be performed from a PC to correctly validate the connection.

 

 

6) Perform Connectivity and Audio Tests

Before performing the production configuration, tests must be executed to validate the correct operation of the trunk. During these tests, you should:

  • Verify that calls are established correctly.
  • Validate two-way RTP audio.
  • Keep a call active for at least 10 minutes to check stability.

 

These tests allow confirming that the configuration is correct before starting real operation.

 

 

7) Validate the Available Bandwidth

Each simultaneous call requires approximately: 150 kbps of symmetrical bandwidth.

Therefore, you must ensure that the network infrastructure has sufficient capacity to support the expected call volume.

 

 

8) Apply Best Configuration Practices

To ensure service stability, it is recommended to apply the following best practices:

  • Avoid channel balancing on the configured trunk.
  • Segment the telephony network to avoid interference with other services.
  • Configure QoS (Quality of Service) to prioritize voice traffic.
  • Disable SIP-ALG or SIP-Helper on the firewall, as they can cause problems such as:
    • SIP registration failures.
    • NAT issues.
    • One-way audio.
    • Call drops.

 

Specific Case for Fortinet

For Fortinet equipment, it is recommended to:

  • Change SIP-ALG to kernel mode
  • Disable SIP-Helper

 

More information by [clicking here].

 

 

inbound contact center telephone integration

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Qué ocurre al transferir llamadas directamente a la extensión de un agente
  • Qué debo tener en cuenta para conectar mi carrier a Wolkvox
  • Which report allows me to analyze call transfers from the IVR to agents?

2026 Wolkvox

Information security policy | Privacy Policy

Expand