You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/private-link-overview.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,23 +25,25 @@ The following high-level diagram shows how Private Link securely connects a loca
25
25
26
26
:::image type="content" source="media/private-link-diagram.png" alt-text="A high-level diagram that shows Private Link connecting a local client to the Azure Virtual Desktop service.":::
27
27
28
-
The following table summarizes the private endpoints required:
| Initial feed discovery | Microsoft.DesktopVirtualization/workspaces | global | One for all your Azure Virtual Desktop deployments |
33
-
| Feed download | Microsoft.DesktopVirtualization/workspaces | feed | One per workspace |
34
-
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool |
30
+
When adding Private Link with Azure Virtual Desktop, you have the following supported scenarios to connect to Azure Virtual Desktop. Each can be enabled or disabled depending on your requirements. You can either share these private endpoints across your network topology or you can isolate your virtual networks so that each has their own private endpoint to the host pool or workspace.
35
31
36
-
You can either share these private endpoints across your network topology or you can isolate your virtual networks so that each has their own private endpoint to the host pool or workspace.
32
+
1. Both clients and session host VMs use private routes. You need the following private endpoints:
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool |
37
+
| Feed download | Microsoft.DesktopVirtualization/workspaces | feed | One per workspace |
38
+
| Initial feed discovery | Microsoft.DesktopVirtualization/workspaces | global |**Only one for all your Azure Virtual Desktop deployments**|
37
39
38
-
## Supported scenarios
40
+
1. Clients use public routes while session host VMs use private routes. You need the following private endpoints. Endpoints to workspaces aren't required.
39
41
40
-
When adding Private Link with Azure Virtual Desktop, you have the following options to connect to Azure Virtual Desktop. Each can be enabled or disabled depending on your requirements.
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool |
41
45
42
-
- Both clients and session host VMs use private routes.
43
-
- Clients use public routes while session host VMs use private routes.
44
-
- Both clients and session host VMs use public routes. Private Link isn't used.
46
+
1. Both clients and session host VMs use public routes. Private Link isn't used in this scenario.
45
47
46
48
For connections to a workspace, except the workspace used for initial feed discovery (global sub-resource), the following table details the outcome of each scenario:
47
49
@@ -75,11 +77,13 @@ When a user connects to Azure Virtual Desktop over Private Link, and Azure Virtu
75
77
76
78
1. For each workspace in the feed, a DNS query is made for the address `<workspaceId>.privatelink.wvd.microsoft.com`.
77
79
78
-
1. Your private DNS zone for **privatelink.wvd.microsoft.com** returns the private IP address for the workspace feed download.
80
+
1. Your private DNS zone for **privatelink.wvd.microsoft.com** returns the private IP address for the workspace feed download, and downloads the feed using TCP port 443.
81
+
82
+
1. When connecting to a remote session, the `.rdp` file that comes from the workspace feed download contains the address for the Azure Virtual Desktop gateway service with the lowest latency for the user's device. A DNS query is made to an address in the format `<hostpooId>.afdfp-rdgateway.wvd.microsoft.com`.
79
83
80
-
1.When connecting a remote session, the `.rdp` file that comes from the workspace feed download contains the Remote Desktop gateway address. A DNS query is made for the address `<hostpooId>.afdfp-rdgateway.wvd.microsoft.com`.
84
+
1.Your private DNS zone for **privatelink.wvd.microsoft.com** returns the private IP address for the Azure Virtual Desktop gateway service to use for the host pool providing the remote session. Orchestration through the virtual network and the private endpoint uses TCP port 443.
81
85
82
-
1.Your private DNS zone for **privatelink.wvd.microsoft.com** returns the private IP address for the Remote Desktop gateway to use for the host pool providing the remote session.
86
+
1.Following orchestration, the network traffic between the client, Azure Virtual Desktop gateway service, and session host is transferred over to a port in the TCP dynamic port range of 1 - 65535. The entire port range is needed because port mapping is used to all global gateways through the single private endpoint IP address corresponding to the *connection* sub-resource. Azure private networking internally maps these ports to the appropriate gateway that was selected during client orchestration.
@@ -65,13 +65,24 @@ To re-register the *Microsoft.DesktopVirtualization* resource provider:
65
65
66
66
## Create private endpoints
67
67
68
-
During the setup process, you create private endpoints to the following resources:
68
+
During the setup process, you create private endpoints to the following resources, depending on your scenario.
69
69
70
-
| Purpose | Resource type | Target sub-resource | Quantity | Private DNS zone name |
71
-
|--|--|--|--|--|
72
-
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool |`privatelink.wvd.microsoft.com`|
73
-
| Feed download | Microsoft.DesktopVirtualization/workspaces | feed | One per workspace |`privatelink.wvd.microsoft.com`|
74
-
| Initial feed discovery | Microsoft.DesktopVirtualization/workspaces | global |**Only one for all your Azure Virtual Desktop deployments**|`privatelink-global.wvd.microsoft.com`|
70
+
1. Both clients and session host VMs use private routes. You need the following private endpoints:
71
+
72
+
| Purpose | Resource type | Target sub-resource | Endpoint quantity | IP address quantity |
73
+
|--|--|--|--|--|
74
+
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool | Four per endpoint |
75
+
| Feed download | Microsoft.DesktopVirtualization/workspaces | feed | One per workspace | Two per endpoint |
76
+
| Initial feed discovery | Microsoft.DesktopVirtualization/workspaces | global |**Only one for all your Azure Virtual Desktop deployments**| One per endpoint |
77
+
78
+
1. Clients use public routes while session host VMs use private routes. You need the following private endpoints. Endpoints to workspaces aren't required.
79
+
80
+
| Purpose | Resource type | Target sub-resource | Endpoint quantity | IP address quantity |
81
+
|--|--|--|--|--|
82
+
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool | Four per endpoint |
83
+
84
+
> [!IMPORTANT]
85
+
> IP address allocations are subject to change as the demand for IP addresses increases. During capacity expansions, additional addresses are needed for private endpoints. It's important you consider potential address space exhaustion and ensure sufficient headroom for growth. For more information on determining the appropriate network configuration for private endpoints in either a hub or a spoke topology, see [Decision tree for Private Link deployment](/azure/architecture/networking/guide/private-link-hub-spoke-network#decision-tree-for-private-link-deployment).
75
86
76
87
### Connections to host pools
77
88
@@ -374,7 +385,6 @@ To create a private endpoint for the *feed* sub-resource for a workspace, select
374
385
375
386
1. Select **Create** to create the private endpoint for the feed sub-resource.
376
387
377
-
378
388
# [Azure PowerShell](#tab/powershell)
379
389
380
390
1. In the same PowerShell session, create a Private Link service connection for a workspace with the feed sub-resource by running the following commands. In these examples, the same virtual network and subnet are used.
0 commit comments