Webex Edge Connect
Edge Connect is a solution that peers your Webex meetings and Webex Calling traffic with an Equinix Cloud Exchange (ECX) location. This peering improves the calling and in-meeting user experience by providing guaranteed bandwidth and quality of service (QoS), which minimizes network latency, packet loss, and jitter.
The link between the Customer Premise Equipment (CPE) and the Webex Provider Edge router will have low latency, but the actual user experience may vary depending on your location. As a rule of thumb: the closer you are to your regional Data Center, the lower your network latency. Large customers that have a national or international network should peer with Webex in multiple regions to minimize latency.
For reference, see the ECX Fabric Workflow documentation at https://docs.equinix.com/.
Network latency can negatively affect the Webex user experience. Latency can be influenced by geographic location, Internet routing patterns, user network connectivity method (LAN versus Wi-Fi), and the overall health of the network paths between each connection point.
Also, see the Cisco Preferred Architecture for Webex Edge Connect for Webex Meetings and Calling, which provides detailed information on the design and deployment of Edge Connect for Webex Meetings and Webex Calling.
Revision date | New or changed information |
---|---|
September 20, 2024 |
This documentation update and the previous one are aimed at matching the BGP advertised routes. IP ranges added to Webex Meetings (By Theater):
IP ranges added to Webex Calling (By Theater):
Added a note in Webex Public IP Block Ranges By Theater and Solution. |
August 28, 2024 |
IP ranges added to Webex Meetings (By Theater):
IP ranges added to Webex Calling (By Theater):
IP ranges removed from Webex Meetings (By Theater):
IP ranges removed from Webex Calling (By Theater):
|
August 01, 2024 |
IP ranges added to Webex Calling (By Theater):
|
August 14, 2023 |
The following IP ranges will go live on September 15, 2023. IP ranges added to Webex Meetings (By Theater):
|
July 17, 2023 |
IP ranges added to Webex Meetings (By Theater):
IP ranges removed from Webex Meetings (By Theater):
|
April 12, 2023 |
IP ranges added to Webex Meetings (By Theater):
|
March 28, 2023 | Restructured article into tabbed format. Added article revision history, starting March 17th. |
March 17, 2023 |
IP ranges added to Webex Meetings (By Theater):
IP ranges removed from Webex Meetings (By Theater):
|
The following are the base requirements for establishing Edge Connect peering:
-
An active connection on the Equinix Cloud Exchange that is established through Equinix, see the ECX Fabric Workflow documentation at https://docs.equinix.com/.
-
A Public or Private Border Gateway Protocol (BGP) Autonomous System Number (ASN).
-
Your IP addresses: both sides of the BGP peering connection as well as your advertised routes for performing NAT from your private network to the public network:
-
Your BGP peering link address space, which is a public IP with /30 or /31 prefix
-
Your advertised public IP space (must be provider-independent)
-
Edge Connect does not accept private prefix advertisements like RFC1918.
An IP space that is public and provider-independent.
-
-
An IT team with knowledge of BGP and peering principles.
-
A network device capable of running BGP and 802.1Q tagging.
-
Layer 1 – Physical Connectivity through Equinix.
-
Layer 2 – Data-link Connectivity through Equinix.
-
Layer 3 – Network Connectivity with Webex through the Equinix Cloud Exchange Portal.
To set up Edge Connect, you first work with an Equinix representative on two tasks: establishing Physical Connectivity and establishing Data-link Connectivity. When these tasks are complete, you can continue to the third task: establishing Network Connectivity with Webex through the Equinix Cloud Exchange Portal.
The diagram illustrates the Layer 1, Layer 2, and Layer 3 connections that must be set up to configure Edge Connect in the corresponding tasks.
Physical Connectivity
You will need to consult with an Equinix representative to set up your Physical and Data-link connectivity. There are three available methods for provisioning physical connectivity for Edge Connect.
-
An Equinix local facility cross-connect between your router in an Equinix facility and the ECX switch. The purple segment below shows the connection that must be made between your cage and the ECX switch.
This type of physical connectivity is only available in the following cities:
North American Locations
International Locations
-
Ashburn, VA, US
-
Chicago, IL, US
-
Dallas, TX, US
-
New York, NY, US
-
Silicon Valley, CA, US
-
Montreal, Canada
-
Toronto, Canada
-
Amsterdam, NL
-
London, GB
-
Frankfurt, DE
-
Singapore, SG
-
Sydney, AU
-
Tokyo, JP
-
Seoul, KR
-
-
A Partner Network Connection that creates a circuit between your building and the closest Equinix facility that colocates with the Webex cloud. The purple segment below shows the connection that must be made between your building and an Equinix facility.
-
There is an Equinix facility, Facility A, close to your building but it does not colocate with the Webex cloud. You can create a circuit between your building and Facility A. Equinix then connects Facility A with a Facility that colocates with the Webex cloud, Facility B, using their network.
The purple segment and cloud in the image below shows the connection that must be made to the ECX switch in Equinix Facility A, the connecting circuit between the Equinix facility closest to you, and the Equinix colocation facility.
Data-link Connectivity
You must provision an Ethernet virtual circuit connection to Webex using the Equinix Cloud Exchange portal.
See the Cisco Preferred Architecture for Webex Edge
Connect for Webex Meetings and Calling for information on how to create a
connection in the ECX Portal. The section Creating a Connection in the ECX Portal
(Example)
walks you through the steps for creating the connection.
Route Policy Technical Details
-
The Webex public BGP ASN is 13445.
-
The maximum length prefix that Webex advertises is /24. The maximum length prefix that Webex accepts is /29.
-
The number of routes that Webex advertises may change over time. We recommend that customers allow 500 routes from Webex on the BGP peering.
-
The maximum number of routes Webex accepts is 100.
-
Customers can use Bidirectional-Forwarding Detection (BFD). BFD is enabled with a default value of 300 ms x 3 on the Webex Perimeter Edge routers.
-
All Webex routes are included in the BGP advertisements.
-
Customer traffic-engineering techniques such as NAT, BGP AS-PATH prepending, or predefined BGP communities are available to influence traffic flows within the Cisco Backbone. BGP communities may be implemented to limit the scope of customer route propagation between the Webex geographic theaters.
-
Customers can use the Webex Looking Glass portal to see advertised BGP routes and perform ping and traceroute tests.
AS-PATH prepending is not supported when using Private ASNs. This is because to support Private ASNs in Edge Connect, Webex strips the ASN after ingress into the Webex backbone network. It is recommended to use Link Priority Communities instead to affect BGP routing path priorities from Webex back towards the private network.
Webex Public IP Block Ranges By Theater and Solution
We encourage customers to accept all Webex routes with a prefix length that is less than or equal to /24. Route advertisements may change over time so customers shouldn’t set up filters using IP prefix lists. The prefix lists are purely informational. Use Network Requirements for Webex Services and Port Reference Information for Webex Calling CIDRs to create firewall rules. Additionally, customers may create custom filters using BGP communities to accept routes based on geographic theater or Webex solution (Webex Meetings or Webex Calling).
Edge Connect notifications are sent out to notification contacts assigned in the Equinix portal when Webex advertises a new IP subnet range or removes an IP subnet. These emails reflect the dates when any changes will occur in the network.
Webex Meetings (By Theater)
AMER
-
23.89.0.0/18
-
23.89.0.0/20
-
23.89.16.0/20
-
23.89.32.0/20
-
23.89.48.0/20
- 23.89.192.0/20
- 23.89.208.0/20
-
64.68.96.0/19
-
64.68.104.0/21
-
66.163.32.0/19
-
66.163.52.0/24
-
66.163.53.0/24
-
144.196.0.0/19
-
144.196.32.0/20
-
144.196.48.0/20
-
144.196.128.0/19
-
144.196.224.0/20
-
144.196.240.0/20
-
150.253.128.0/18
-
150.253.160.0/21
-
163.129.0.0/19
-
170.72.128.0/18
-
170.72.128.0/20
-
170.72.144.0/21
-
170.72.152.0/21
-
170.72.160.0/20
-
170.72.192.0/19
-
170.133.128.0/19
-
173.243.0.0/20
-
173.39.224.0/19
-
207.182.160.0/19
-
170.133.128.0/19
-
207.182.172.0/22
-
209.197.192.0/19
-
209.197.192.0/21
-
216.151.128.0/19
-
216.151.128.0/20
APAC
-
23.89.128.0/20
-
23.89.144.0/20
-
23.89.154.0/24
-
23.89.160.0/20
-
23.89.176.0/21
-
69.26.176.0/20
-
69.26.176.0/24
-
114.29.192.0/23
-
114.29.196.0/23
-
114.29.200.0/22
-
114.29.204.0/22
-
114.29.208.0/21
-
114.29.216.0/21
-
144.196.80.0/20
-
144.196.96.0/20
-
144.196.160.0/20
-
144.196.208.0/20
-
150.253.192.0/19
-
150.253.192.0/21
-
150.253.200.0/21
-
150.253.208.0/21
-
150.253.216.0/21
-
150.253.240.0/20
-
163.129.32.0/22
-
163.129.48.0/20
-
163.129.64.0/20
-
170.133.176.0/23
-
170.133.178.0/23
-
170.133.180.0/22
-
170.133.181.0/24
-
170.133.184.0/22
-
170.133.188.0/22
-
170.72.48.0/21
-
170.72.56.0/21
-
170.72.64.0/20
-
170.72.64.0/21
-
170.72.72.0/21
-
170.72.80.0/21
-
170.72.88.0/21
-
170.72.96.0/20
-
210.4.194.0/23
-
210.4.196.0/23
-
210.4.198.0/23
-
210.4.198.0/24
-
210.4.200.0/22
-
210.4.204.0/22
-
210.4.206.0/23
EMEA
-
23.89.64.0/18
-
23.89.64.0/20
-
23.89.80.0/20
-
23.89.96.0/20
-
23.89.112.0/21
-
23.89.120.0/21
-
69.26.160.0/24
-
62.109.192.0/18
-
69.26.160.0/20
-
144.196.64.0/20
-
144.196.112.0/22
-
144.196.116.0/23
-
144.196.118.0/23
-
144.196.176.0/20
-
144.196.192.0/20
-
150.253.224.0/20
-
170.133.160.0/20
-
170.72.0.0/19
-
170.72.0.0/20
-
170.72.16.0/20
-
170.72.16.0/21
-
170.72.24.0/21
-
170.72.32.0/20
-
170.72.32.0/21
-
170.72.40.0/21
-
170.72.112.0/20
-
170.72.208.0/20
Global Anycast
-
66.163.52.0/24
-
66.163.53.0/24
-
69.26.160.0/24
Webex Calling (By Theater)
AMER
-
23.89.1.128/25
-
23.89.33.0/24
-
23.89.40.0/25
-
128.177.14.0/24
-
128.177.36.0/24
-
135.84.171.0/24
-
135.84.172.0/24
-
135.84.173.0/24
-
135.84.174.0/24
-
139.177.64.0/24
-
139.177.65.0/24
-
139.177.72.0/24
-
139.177.73.0/24
-
139.177.94.0/24
-
139.177.95.0/24
-
199.19.197.0/24
-
199.19.199.0/24
-
199.59.65.0/24
-
199.59.66.0/24
EMEA
-
23.89.76.128/25
-
85.119.56.0/24
-
85.119.57.0/24
-
139.177.66.0/24
-
139.177.67.0/24
-
144.196.114.0/24
-
144.196.115.0/24
-
144.196.70.0/24
-
144.196.71.0/24
-
170.72.0.128/25
-
170.72.17.128/25
-
170.72.29.0/24
-
185.115.196.0/24
-
185.115.197.0/24
ANZ
-
139.177.70.0/24
-
139.177.71.0/24
-
139.177.76.0/24
-
199.59.64.0/24
-
199.59.67.0/24
APAC
-
23.89.154.0/25
-
135.84.169.0/24
-
135.84.170.0/24
-
139.177.68.0/24
-
139.177.69.0/24
-
150.253.209.128/25
The following BGP communities are honored by Webex inbound route policies and may be used by customers to influence Direct Connect link priority.
Link Priority Communities
-
None — Default (least desirable path)
-
13445:200 — Local Preference 200
-
13445:300 — Local Preference 300
-
13445:400 — Local Preference 400
-
13445:500 — Local Preference 500
-
13445:600 — Local Preference 600
-
13445:700 — Local Preference 700
-
13445:800 — Local Preference 800
-
13445:900 — Local Preference 900 (most desirable path)
Route Propagation Scoping Communities
Customers that have a global peering arrangement with Webex may want to limit route advertisements within the Cisco Webex cloud to the local geographic theater. The following communities may be used to limit customer route propagation across the Webex network.
-
None — Default permit global reachability
-
13445:677 — Permit local theater reachability
Webex Route Origin Communities
Webex applies BGP community tags to indicate where the Webex prefix originates. This can be helpful if you want to perform route filtering based on location tag. The following BGP communities indicate the origin of the Webex prefix.
Webex Meetings Communities (By Theater)
-
13445:10000—AMER
-
13445:10010—EMEA
-
13445:10020—APAC
Webex Calling Communities (By Theater)
-
13445:20000—AMER
-
13445:20010—EMEA
-
13445:20020—ANZ
-
13445:20060—APAC