Skip to content

Commit a07ae2f

Browse files
committed
acrolinx + freshness
1 parent 183ed9e commit a07ae2f

File tree

1 file changed

+14
-25
lines changed

1 file changed

+14
-25
lines changed

articles/load-balancer/load-balancer-floating-ip.md

Lines changed: 14 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: load-balancer
55
author: mbender-ms
66
ms.service: azure-load-balancer
77
ms.topic: how-to
8-
ms.date: 06/11/2024
8+
ms.date: 04/16/2025
99
ms.author: mbender
1010
ms.custom: template-how-to, engagement-fy23
1111
---
@@ -50,30 +50,23 @@ In order to function, you configure the Guest OS for the virtual machine to rece
5050

5151
For each VM in the backend pool, run the following commands at a Windows Command Prompt on the server.
5252

53-
To get the list of interface names you have on your VM, type this command:
53+
1.To get the list of interface names you have on your VM, enter this command:
5454

5555
```console
5656
netsh interface ipv4 show interface
5757
```
58-
59-
For the VM NIC (Azure managed), type this command.
58+
1.For the VM NIC (Azure managed), enter the following command after replacing **interface-name** with the name of the interface you want to use:
6059

6160
```console
62-
netsh interface ipv4 set interface <interfacename> weakhostreceive=enabled
61+
netsh interface ipv4 set interface <interface-name> weakhostreceive=enabled
6362
```
64-
(replace **"interfacename"** with the name of this interface)
65-
66-
For each loopback interface you added, repeat these commands:
63+
1. For each loopback interface you added, enter these commands after replacing **loopback-interface-name** with the name of the loopback interface and **floating-IP** and **floating-IPnetmask** with the appropriate values that correspond to the load balancer frontend IP:
6764

6865
```console
69-
netsh interface ipv4 add addr <loopbackinterfacename> floatingip floatingipnetmask
70-
netsh interface ipv4 set interface <loopbackinterfacename> weakhostreceive=enabled weakhostsend=enabled
66+
netsh interface ipv4 add addr <loopback-interface-name> <floating-IP> <floating-IPnetmask>
67+
netsh interface ipv4 set interface <loopback-interface-name> weakhostreceive=enabled weakhostsend=enabled
7168
```
72-
(replace **loopbackinterfacename** with the name of this loopback interface and **floatingip** and **floatingipnetmask** with the appropriate values that correspond to the load balancer frontend IP)
73-
74-
Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports.
75-
76-
This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80:
69+
1. Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports. This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80:
7770

7871
```console
7972
netsh int ipv4 set int "Ethernet" weakhostreceive=enabled
@@ -90,21 +83,17 @@ netsh advfirewall firewall add rule name="http" protocol=TCP localport=80 dir=in
9083

9184
For each VM in the backend pool, run the following commands via an SSH session.
9285

93-
To get the list of interface names you have on your VM, type this command:
86+
1. To get the list of interface names you have on your VM, type this command:
9487

9588
```console
9689
ip addr
9790
```
98-
For each loopback interface, repeat these commands, which assign the floating IP to the loopback alias:
91+
1. For each loopback interface you added, enter these commands after replacing **loopback-interface-name** with the name of the loopback interface and **floating-IP** and **floating-IPnetmask** with the appropriate values that correspond to the load balancer frontend IP:
9992

10093
```console
101-
sudo ip addr add <floatingip>/<floatingipnetmask> dev lo:0
94+
sudo ip addr add <floating-IP>/<floating-IPnetmask> dev lo:0
10295
```
103-
(replace **floatingip** and **floatingipnetmask** with the appropriate values that correspond to the load balancer frontend IP)
104-
105-
Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports.
106-
107-
This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80. This example also assumes the use of [UFW (Uncomplicated Firewall)](https://www.wikipedia.org/wiki/Uncomplicated_Firewall) in Ubuntu.
96+
1. Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports. This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4, a load balancing rule for port 80, and the use of [UFW (Uncomplicated Firewall)](https://www.wikipedia.org/wiki/Uncomplicated_Firewall) in Ubuntu.
10897

10998
```console
11099
sudo ip addr add 1.2.3.4/24 dev lo:0
@@ -115,8 +104,8 @@ sudo ufw allow 80/tcp
115104
## <a name = "limitations"></a>Limitations
116105

117106
- With Floating IP enabled on a load balancing rule, your application must use the primary IP configuration of the network interface for outbound.
118-
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound won't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).
119-
- You can't use Floating IP on secondary IP configurations for Load Balancing scenarios. This limitation doesn't apply to Public load balancers where the secondary IP configuration is IPv6 an part of a dual-stack configuration or to architectures that utilize a NAT Gateway for outbound connectivity.
107+
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound connection doesn't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).
108+
- You can't use Floating IP on secondary IP configurations for Load Balancing scenarios. This limitation doesn't apply to Public load balancers where the secondary IP configuration is IPv6 and part of a dual-stack configuration, or to architectures that utilize a NAT Gateway for outbound connectivity.
120109

121110
## Next steps
122111

0 commit comments

Comments
 (0)