You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-floating-ip.md
+14-25Lines changed: 14 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: load-balancer
5
5
author: mbender-ms
6
6
ms.service: azure-load-balancer
7
7
ms.topic: how-to
8
-
ms.date: 06/11/2024
8
+
ms.date: 04/16/2025
9
9
ms.author: mbender
10
10
ms.custom: template-how-to, engagement-fy23
11
11
---
@@ -50,30 +50,23 @@ In order to function, you configure the Guest OS for the virtual machine to rece
50
50
51
51
For each VM in the backend pool, run the following commands at a Windows Command Prompt on the server.
52
52
53
-
To get the list of interface names you have on your VM, type this command:
53
+
1.To get the list of interface names you have on your VM, enter this command:
54
54
55
55
```console
56
56
netsh interface ipv4 show interface
57
57
```
58
-
59
-
For the VM NIC (Azure managed), type this command.
58
+
1.For the VM NIC (Azure managed), enter the following command after replacing **interface-name** with the name of the interface you want to use:
60
59
61
60
```console
62
-
netsh interface ipv4 set interface <interfacename> weakhostreceive=enabled
61
+
netsh interface ipv4 set interface <interface-name> weakhostreceive=enabled
63
62
```
64
-
(replace **"interfacename"** with the name of this interface)
65
-
66
-
For each loopback interface you added, repeat these commands:
63
+
1. For each loopback interface you added, enter these commands after replacing **loopback-interface-name** with the name of the loopback interface and **floating-IP** and **floating-IPnetmask** with the appropriate values that correspond to the load balancer frontend IP:
netsh interface ipv4 set interface <loopback-interface-name> weakhostreceive=enabled weakhostsend=enabled
71
68
```
72
-
(replace **loopbackinterfacename** with the name of this loopback interface and **floatingip** and **floatingipnetmask** with the appropriate values that correspond to the load balancer frontend IP)
73
-
74
-
Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports.
75
-
76
-
This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80:
69
+
1. Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports. This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80:
77
70
78
71
```console
79
72
netsh int ipv4 set int "Ethernet" weakhostreceive=enabled
For each VM in the backend pool, run the following commands via an SSH session.
92
85
93
-
To get the list of interface names you have on your VM, type this command:
86
+
1.To get the list of interface names you have on your VM, type this command:
94
87
95
88
```console
96
89
ip addr
97
90
```
98
-
For each loopback interface, repeat these commands, which assign the floating IP to the loopback alias:
91
+
1.For each loopback interface you added, enter these commands after replacing **loopback-interface-name** with the name of the loopback interface and **floating-IP** and **floating-IPnetmask** with the appropriate values that correspond to the load balancer frontend IP:
99
92
100
93
```console
101
-
sudo ip addr add <floatingip>/<floatingipnetmask> dev lo:0
94
+
sudo ip addr add <floating-IP>/<floating-IPnetmask> dev lo:0
102
95
```
103
-
(replace **floatingip** and **floatingipnetmask** with the appropriate values that correspond to the load balancer frontend IP)
104
-
105
-
Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports.
106
-
107
-
This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4 and a load balancing rule for port 80. This example also assumes the use of [UFW (Uncomplicated Firewall)](https://www.wikipedia.org/wiki/Uncomplicated_Firewall) in Ubuntu.
96
+
1. Finally, if the guest host uses a firewall, ensure a rule set up so the traffic can reach the VM on the appropriate ports. This example configuration assumes a load balancer frontend IP configuration of 1.2.3.4, a load balancing rule for port 80, and the use of [UFW (Uncomplicated Firewall)](https://www.wikipedia.org/wiki/Uncomplicated_Firewall) in Ubuntu.
108
97
109
98
```console
110
99
sudo ip addr add 1.2.3.4/24 dev lo:0
@@ -115,8 +104,8 @@ sudo ufw allow 80/tcp
115
104
## <aname = "limitations"></a>Limitations
116
105
117
106
- With Floating IP enabled on a load balancing rule, your application must use the primary IP configuration of the network interface for outbound.
118
-
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound won't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).
119
-
- You can't use Floating IP on secondary IP configurations for Load Balancing scenarios. This limitation doesn't apply to Public load balancers where the secondary IP configuration is IPv6 an part of a dual-stack configuration or to architectures that utilize a NAT Gateway for outbound connectivity.
107
+
- If your application binds to the frontend IP address configured on the loopback interface in the guest OS, Azure's outbound connection doesn't rewrite the outbound flow, and the flow fails. Review [outbound scenarios](load-balancer-outbound-connections.md).
108
+
- You can't use Floating IP on secondary IP configurations for Load Balancing scenarios. This limitation doesn't apply to Public load balancers where the secondary IP configuration is IPv6 and part of a dual-stack configuration, or to architectures that utilize a NAT Gateway for outbound connectivity.
0 commit comments