Skip to content

Commit 919e2d3

Browse files
Merge pull request #126926 from ridalwan/docs-editor/rdp-shortpath-1748378093
Update rdp-shortpath.md
2 parents 2e253e5 + 644fe47 commit 919e2d3

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/virtual-desktop/rdp-shortpath.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ The following diagram gives a high-level overview of the network connections whe
114114

115115
#### TURN relay availability
116116

117-
TURN relay is available in the following Azure regions:
117+
TURN relay is available in the following Azure regions with ACS TURN Relay (20.202.0.0/16):
118118

119119
:::row:::
120120
:::column:::
@@ -188,9 +188,7 @@ Where users have RDP Shortpath for both managed network and public networks is a
188188
The following sections contain the source, destination and protocol requirements for your session hosts and client devices that must be allowed for RDP Shortpath to work.
189189

190190
> [!NOTE]
191-
> For a relayed connection with TURN, the IP subnet `20.202.0.0/16` is shared with Azure Communication Services. However, Azure Virtual Desktop and Windows 365 will transition to `51.5.0.0/16`, which is dedicated exclusively to these services. We recommend you configure both ranges in your network environment now to ensure a seamless transition.
192-
>
193-
> If you want to wait to use the dedicated subnet, please follow the steps in [Configure host pool networking settings](configure-rdp-shortpath.md#configure-host-pool-networking-settings) and set **RDP Shortpath for public network (via TURN/relay)** to **Disabled**. Alternatively you can disable UDP on the local device, but that will disable UDP for all connections. To disable UDP on the local device, follow the steps in [Check that UDP is enabled on Windows client devices](configure-rdp-shortpath.md#check-that-udp-is-enabled-on-windows-client-devices), but set **Turn Off UDP On Client** to **Enabled**. If you block the IP range `20.202.0.0/16` on your network and are using VPN applications, it might cause disconnection issues.
191+
> Starting June 15, Microsoft will begin rolling out a new TURN relay IP range, `51.5.0.0/16`, across 40 Azure regions. This new range is dedicated exclusively to Azure Virtual Desktop and Windows 365, marking a transition away from the previously shared 20.202.0.0/16 subnet used by Azure Communication Services. The upgrade is designed to enhance RDP Shortpath for Public Networks (via TURN/Relay), delivering faster, more reliable connectivity for users.
194192
195193
#### Session host virtual network
196194

@@ -212,6 +210,9 @@ The following table details the source, destination and protocol requirements fo
212210
| STUN infrastructure/TURN relay | Client network | Any | `20.202.0.0/16` | 3478 | UDP | Allow |
213211
| TURN relay | Client network | Any | `51.5.0.0/16` | 3478 | UDP | Allow |
214212

213+
> [!NOTE]
214+
> From June 15th, the traffic will progressively be redirected from the current Azure Communication Service (ACS) TURN Relay range (`20.202.0.0/16`) to the newly designated subnet `51.5.0.0/16`. While this shift is designed to be seamless, it’s essential that customers preemptively configure bypass rules for the new range to maintain uninterrupted service. With both IP ranges properly bypassed, end users shouldn't experience any connectivity issues.
215+
215216
### Teredo support
216217

217218
While not required for RDP Shortpath, Teredo adds extra NAT traversal candidates and increases the chance of the successful RDP Shortpath connection in IPv4-only networks. To learn how to enable Teredo on session hosts and clients, see [Enable Teredo support](configure-rdp-shortpath.md#optional-enable-teredo-support).

0 commit comments

Comments
 (0)