You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/rdp-shortpath.md
+4-17Lines changed: 4 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -190,23 +190,7 @@ The following sections contain the source, destination and protocol requirements
190
190
> [!NOTE]
191
191
> For a relayed connection with TURN, the IP subnet **`20.202.0.0/16`** is shared with Azure Communication Services. However, **Azure Virtual Desktop and Windows 365 will transition to the dedicated IP range `51.5.0.0/16`**, which is exclusively reserved for these services.
192
192
> **What to expect:** Starting **June 15**, Microsoft will begin rolling out the new TURN relay IP range **`51.5.0.0/16`** across **40 Azure regions**. This upgrade enhances **RDP Shortpath for public networks (via TURN/Relay)** connectivity, delivering faster, more reliable performance for Azure Virtual Desktop (AVD) and Windows 365 (W365) users.
193
-
> **What admins should do:** To ensure uninterrupted service and optimal performance, administrators should:
194
-
> -**Ensure accessibility**: Make sure the `51.5.0.0/16` subnet is accessible from all networks used for AVD and W365 connectivity, both on-premises and in the cloud.
195
-
> -**Use the `WindowsVirtualDesktop` service tag**: This tag includes the new subnet, simplifying firewall and network rule configuration.
196
-
> -**Optimize traffic flow**:
197
-
> - Avoid TLS inspection on this traffic, as it is already encrypted and inspection can degrade performance.
198
-
> - Ensure traffic is **locally egressed**—routed directly to Microsoft’s infrastructure without unnecessary detours.
199
-
> - **Bypass VPNs, proxies, and Secure Web Gateways (SWGs)** for this traffic to reduce latency and improve reliability.
200
-
> - Use **User Defined Routes (UDRs)** in Azure to direct traffic to the internet instead of through virtual firewalls when needed.
201
-
> **Supported Regions:** The new TURN relay infrastructure is being deployed in 40 regions, including:
202
-
>
203
-
> -**North America**: South Central US, East US, East US 2, East US2 EUAP, West Central US, West US, West US 2, West US 3, Central US, North Central US, Canada Central, Canada East, Mexico Central
204
-
> -**South America**: Brazil South
205
-
> -**Europe**: UK South, UK West, West Europe, North Europe, France Central, Germany West Central, Switzerland North, Norway East, Italy North, Poland Central, Sweden Central, Spain Central
206
-
> -**Asia**: South India, Central India, UAE North, UAE Central, South East Asia, Korea Central, Korea South, Taiwan North, Israel Central, Japan East, Japan West
207
-
> -**Oceania**: Australia East, Australia Southeast
208
-
> -**Africa**: South Africa North, South Africa West
209
-
>
193
+
210
194
#### Session host virtual network
211
195
212
196
The following table details the source, destination and protocol requirements for RDP Shortpath for your session host virtual network.
@@ -227,6 +211,9 @@ The following table details the source, destination and protocol requirements fo
> From June 15th, the traffic will progressively __redirected__ from the current Azure Communication Service(ACS) TURN Relay range (**`20.202.0.0/16`**) to a newly designated subnet (**`51.5.0.0/16`**). While this shift is designed to be seamless, it’s essential that customers __preemptively configure bypass rules__ for the new range to maintain uninterrupted service. With both IP ranges properly bypassed, end users will not experience any connectivity issues
216
+
230
217
### Teredo support
231
218
232
219
While not required for RDP Shortpath, Teredo adds extra NAT traversal candidates and increases the chance of the successful RDP Shortpath connection in IPv4-only networks. To learn how to enable Teredo on session hosts and clients, see [Enable Teredo support](configure-rdp-shortpath.md#optional-enable-teredo-support).
0 commit comments