Skip to content

Commit a4e3e4f

Browse files
authored
add warning about azfw and avd
1 parent 591f4da commit a4e3e4f

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/firewall/protect-azure-virtual-desktop.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ Follow the guidelines in this article to provide extra protection for your Azure
2525

2626
To learn more about Azure Virtual Desktop terminology, see [Azure Virtual Desktop terminology](../virtual-desktop/terminology.md).
2727

28+
> [!WARNING]
29+
> Azure Virtual Desktop disconnections may occur during Azure Firewall scale-ins if all traffic is routed to the Azure Firewall using a default route. We recommend having direct access to the gateway and broker for Azure Virtual Desktop to avoid these disconnections. To resolve this issue, add a route to the route table applied to the Azure Virtual Desktop subnet with the *destination type* set to **Service tag**, the *destination service* set to **WindowsVirtualDesktop**, and the *next hop* set to **Internet**.
30+
2831
## Host pool outbound access to Azure Virtual Desktop
2932

3033
The Azure virtual machines you create for Azure Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall uses the Azure Virtual Desktop FQDN tag `WindowsVirtualDesktop` to simplify this configuration. You need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an *allow* or *deny* action.

0 commit comments

Comments
 (0)