Skip to content

Commit 61e43f1

Browse files
author
RoseHJM
committed
WIP
1 parent ef32849 commit 61e43f1

File tree

1 file changed

+12
-54
lines changed

1 file changed

+12
-54
lines changed

articles/dev-box/concept-dev-box-network-requirements.md

Lines changed: 12 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: dev-box
66
author: RoseHJM
77
ms.author: rosemalcolm
88
ms.topic: concept-article
9-
ms.date: 05/29/2024
9+
ms.date: 10/28/2024
1010
ms.custom: template-concept
1111

1212
#Customer intent: As a platform engineer, I want to understand Dev Box networking requirements so that developers can access the resources they need.
@@ -53,6 +53,7 @@ You can check that your dev boxes can connect to these FQDNs and endpoints by fo
5353
> [!IMPORTANT]
5454
> Microsoft doesn't support dev box deployments where the FQDNs and endpoints listed in this article are blocked.
5555
56+
## Physical device network connectivity
5657
Although most of the configuration is for the cloud-based dev box network, end user connectivity occurs from a physical device. Therefore, you must also follow the connectivity guidelines on the physical device network.
5758

5859
|Device or service |Network connectivity required URLs and ports |Description |
@@ -66,59 +67,14 @@ Although most of the configuration is for the cloud-based dev box network, end u
6667

6768
The following URLs and ports are required for the provisioning of dev boxes and the Azure Network Connection (ANC) health checks. All endpoints connect over port 443 unless otherwise specified.
6869

69-
# [Windows 365 service endpoints](#tab/W365)
70-
- *.infra.windows365.microsoft.com
71-
- cpcsaamssa1prodprap01.blob.core.windows.net
72-
- cpcsaamssa1prodprau01.blob.core.windows.net
73-
- cpcsaamssa1prodpreu01.blob.core.windows.net
74-
- cpcsaamssa1prodpreu02.blob.core.windows.net
75-
- cpcsaamssa1prodprna01.blob.core.windows.net
76-
- cpcsaamssa1prodprna02.blob.core.windows.net
77-
- cpcstcnryprodprap01.blob.core.windows.net
78-
- cpcstcnryprodprau01.blob.core.windows.net
79-
- cpcstcnryprodpreu01.blob.core.windows.net
80-
- cpcstcnryprodpreu02.blob.core.windows.net
81-
- cpcstcnryprodprna01.blob.core.windows.net
82-
- cpcstcnryprodprna02.blob.core.windows.net
83-
- cpcstprovprodpreu01.blob.core.windows.net
84-
- cpcstprovprodpreu02.blob.core.windows.net
85-
- cpcstprovprodprna01.blob.core.windows.net
86-
- cpcstprovprodprna02.blob.core.windows.net
87-
- cpcstprovprodprap01.blob.core.windows.net
88-
- cpcstprovprodprau01.blob.core.windows.net
89-
- prna01.prod.cpcgateway.trafficmanager.net
90-
- prna02.prod.cpcgateway.trafficmanager.net
91-
- preu01.prod.cpcgateway.trafficmanager.net
92-
- preu02.prod.cpcgateway.trafficmanager.net
93-
- prap01.prod.cpcgateway.trafficmanager.net
94-
- prau01.prod.cpcgateway.trafficmanager.net
95-
96-
# [Dev box communication endpoints](#tab/DevBox)
97-
- *.agentmanagement.dc.azure.com
98-
99-
- endpointdiscovery.cmdagent.trafficmanager.net
100-
- registration.prna01.cmdagent.trafficmanager.net
101-
- registration.preu01.cmdagent.trafficmanager.net
102-
- registration.prap01.cmdagent.trafficmanager.net
103-
- registration.prau01.cmdagent.trafficmanager.net
104-
- registration.prna02.cmdagent.trafficmanager.net
105-
106-
# [Registration endpoints](#tab/Registration)
107-
- login.microsoftonline.com
108-
- login.live.com
109-
- enterpriseregistration.windows.net
110-
- global.azure-devices-provisioning.net (443 & 5671 outbound)
111-
- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)
112-
- hm-iot-in-prod-prau01.azure-devices.net (443 & 5671 outbound)
113-
- hm-iot-in-prod-preu01.azure-devices.net (443 & 5671 outbound)
114-
- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)
115-
- hm-iot-in-prod-prna02.azure-devices.net (443 & 5671 outbound)
116-
- hm-iot-in-2-prod-preu01.azure-devices.net (443 & 5671 outbound)
117-
- hm-iot-in-2-prod-prna01.azure-devices.net (443 & 5671 outbound)
118-
- hm-iot-in-3-prod-preu01.azure-devices.net (443 & 5671 outbound)
119-
- hm-iot-in-3-prod-prna01.azure-devices.net (443 & 5671 outbound)
120-
121-
---
70+
| Category | Endpoints | How to apply | More information |
71+
|---------------------------------|--------------------------------|-------------------------------------|------------------------------|
72+
| **Dev box communication endpoints** | - *.agentmanagement.dc.azure.com<br>- *.cmdagent.trafficmanager.net | Line by line in your firewall rules. | N/A |
73+
| **Windows 365 service endpoints** | - *.infra.windows365.microsoft.com<br>- *.cmdagent.trafficmanager.net<br>- UDP connectivity via TURN<br>- TURN connectivity | FQDN tag: *Windows365*<br> or <br>Line by line in your firewall rules. | [Windows 365 network requirements](/windows-365/enterprise/requirements-network?tabs=enterprise%2Cent#windows-365-service). |
74+
| **Windows 365 Registration endpoints** | - login.microsoftonline.com<br>- login.live.com<br>- enterpriseregistration.windows.net<br>- global.azure-devices-provisioning.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prau01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prna02.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-2-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-2-prod-prna01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-3-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-3-prod-prna01.azure-devices.net (443 & 5671 outbound) |
75+
| **Azure Virtual Desktop service endpoints** | - login.microsoftonline.com<br> - *.wvd.microsoft.com<br> - *.prod.warm.ingest.monitor.core.windows.net<br> - catalogartifact.azureedge.net<br> - gcs.prod.monitoring.core.windows.net<br> - azkms.core.windows.net<br> - mrsglobalsteus2prod.blob.core.windows.net<br> - wvdportalstorageblob.blob.core.windows.net<br> - 169.254.169.254<br> - 168.63.129.16<br> - oneocsp.microsoft.com<br> - www.microsoft.com | FQDN tags: *WindowsVirtualDesktop*, *AzureMonitor*, *AzureFrontDoor.Frontend*, *AzureCloud*, *Internet* | [Session host virtual machines](/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure#session-host-virtual-machines). |
76+
| **Microsoft Entra ID** | FQDNs and endpoints for Microsoft Entra ID can be found under ID 56, 59 and 125 in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online). | Add service tag `AzureActiveDirectory` | [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
77+
| **Microsoft Intune** | For current FQDNs and endpoints for Microsoft Entra ID, see [Intune core service](/mem/intune/fundamentals/intune-endpoints?tabs=north-america#endpoints)| FQDN tag: *MicrosoftIntune* | [Intune endpoints](/mem/intune/fundamentals/intune-endpoints) |
12278

12379
## Use FQDN tags and service tags for endpoints through Azure Firewall
12480

@@ -128,6 +84,8 @@ Managing network security controls for dev boxes can be complex. To simplify con
12884

12985
An [FQDN tag](/azure/firewall/fqdn-tags) is a predefined tag in Azure Firewall that represents a group of fully qualified domain names. By using FQDN tags, you can easily create and maintain egress rules for specific services like Windows 365 without manually specifying each domain name.
13086

87+
The groupings defined by FQDN tags can overlap. For example, the Windows365 FQDN tag includes AVD endpoints for standard ports, see [reference](/windows-365/enterprise/azure-firewall-windows-365#windows365-tag).
88+
13189
Non-Microsoft firewalls don't usually support FQDN tags or service tags. There might be a different term for the same functionality; check your firewall documentation.
13290

13391
- **Service tags**

0 commit comments

Comments
 (0)