Networking and connectivity considerations for Azure Virtual Desktop workloads
This article discusses the networking and connectivity design area of an Azure Virtual Desktop workload. It's critical to design and implement Azure networking capabilities for your Azure Virtual Desktop landing zone. As a foundation, this article uses several Azure Well-Architected Framework enterprise-scale landing zone architectural principles and recommendations. By building on this guidance, this article shows you how to manage network topology and connectivity at scale.
Important
This article is part of the Azure Well-Architected Framework Azure Virtual Desktop workload series. If you aren't familiar with this series, we recommend that you start with What is an Azure Virtual Desktop workload?.
Client latency
Impact: Performance Efficiency
The latency between end users and session hosts is a key aspect that affects the Azure Virtual Desktop user experience. You can use the Azure VM testing methods described in the Round-trip Latency Figures page to help estimate connection round-trip times (RTTs). Specifically, this page provides estimated latency measurements collected from Azure cloud regions worldwide and is continuously measured in 1-minute intervals by network probes. The monthly latency statistics are derived from averaging the collected samples for the month.
Important
The Azure Virtual Desktop Experience Estimator has been formally decommissioned and replaced with the Azure network round-trip latency statistics page.
To assess the quality of your end-user experience:
- Test end-to-end latencies in development, testing, and proof-of-concept environments. This test should take into account the actual experience of your users. It should consider factors like network conditions, end-user devices and the configuration of the deployed VMs.
- Keep in mind that latency is only one aspect of connectivity with remote protocols. Bandwidth and user workload also affect your end-user experience.
Recommendations
- Test latency between Azure VMs using tools like Latte or SockPerf.
- Test latencies from your Azure virtual networks to your on-premises systems.
- Use a split tunnel that's based on User Datagram Protocol (UDP) for clients who use a point-to-site (P2S) VPN connection.
- Use Remote Desktop Protocol (RDP) Shortpath with a managed network for on-site clients who use a VPN or Azure ExpressRoute.
On-premises connectivity (hybrid networking)
Impact: Performance Efficiency, Operational Excellence
Some organizations use hybrid models that include on-premises and cloud resources. In many hybrid cases, end-user workflows that run on Azure Virtual Desktop need to reach on-premises resources such as shared or platform services, data, or applications.
When you implement hybrid networking, review best practices and recommendations in the Cloud Adoption Framework Network topology and connectivity article.
It's important to align with the Azure Virtual Desktop scaling model that's described in Integrate an Azure Virtual Desktop workload with Azure landing zones. To follow this model:
- Assess the latency and bandwidth requirements of Azure Virtual Desktop workflows that connect to on-premises systems. This information is crucial when you design your hybrid networking architecture.
- Ensure that there are no overlapping IP addresses between your Azure Virtual Desktop subnets and your on-premises networks. We recommend that you assign the task of IP addressing to the network architects who are the owners of your connectivity subscription.
- Give every Azure Virtual Desktop landing zone its own virtual network and subnet configuration.
- Size subnets appropriately by considering potential growth when you determine the amount of IP address space that's needed.
- Use smart IP classless inter-domain routing (CIDR) notation to avoid wasting IP address space.
Recommendations
- Review best practices for connecting Azure virtual networks to on-premises systems.
- Test latencies from your Azure virtual networks to your on-premises systems.
- Ensure that no overlapping IP addresses are used in your Azure Virtual Desktop landing zone.
- Give every Azure Virtual Desktop landing zone its own virtual network and subnet configuration.
- Consider potential growth when you size Azure Virtual Desktop subnets.
Multi-region connectivity
Impact: Performance Efficiency, Cost Optimization
For your Azure Virtual Desktop multi-region deployment to offer the best possible experience to your end users, your design needs to take the following factors into consideration:
- Platform services, such as identity, name resolution, hybrid connectivity, and storage services. Connectivity from Azure Virtual Desktop session hosts to these services is key for the service to be functional. As a result, the ideal design aims to lower the latency from Azure Virtual Desktop landing zone subnets to these services. You can accomplish this goal by replicating services to each region or making them available via the connection with the lowest possible latency.
- End-user latency. When you select locations to use for an Azure Virtual Desktop multi-region deployment, it's important to account for the latency that users experience when they connect to the service. We recommend that you gather latency data from your end-user population by using the Azure network round-trip latency statistics page when you select Azure regions to deploy your session hosts to.
Also consider the following factors:
- Application dependencies across regions.
- VM SKU availability.
- Networking costs that are associated with internet egress, cross region traffic, and hybrid (on-premises) traffic that your application or workload dependencies require.
- The extra load that the FSLogix cloud cache feature places on networking. This factor is only relevant if you use this feature to replicate user profile data between different regions. Also consider the cost of the increased network traffic and storage that this feature uses.
If possible, use VM SKUs that offer accelerated networking. In workloads that use high-bandwidth, accelerated networking can lower CPU utilization and latency.
Your network's available bandwidth dramatically impacts the quality of your remote sessions. As a result, it's a good practice to assess networking bandwidth requirements for users to ensure that enough bandwidth is available for on-premises dependencies.
Recommendations
- Replicate platform and shared services to each region whenever your internal policies allow you to.
- Use VM SKUs that offer accelerated networking if possible.
- Include end-user latency estimations in your region selection process.
- Take workload types into account when you estimate bandwidth requirements, and monitor real-user connections.
Network security
Impact: Security, Cost Optimization, Operational Excellence
Traditionally, network security has been the linchpin of enterprise security efforts. But cloud computing has increased the requirement for network perimeters to be more porous, and many attackers have mastered the art of attacks on identity system elements. The following points provide an overview of the minimum firewall requirements for deploying Azure Virtual Desktop. This section also provides recommendations for connecting to a firewall and reaching the apps that require this service.
- Traditional network controls that are based on a trusted-intranet approach don't effectively provide security assurances for cloud applications.
- Integrating logs from network devices and raw network traffic provides visibility into potential security threats.
- Most organizations end up adding more resources to networks than initially planned. As a result, IP address and subnet schemes need to be refactored to accommodate the extra resources. This process is labor-intensive. There's limited security value in creating a large number of small subnets and then trying to map network access controls, such as security groups, to each of them.
For general information about protecting assets by placing controls on network traffic, see Recommendations for networking and connectivity.
Recommendations
- Understand the configurations that are needed to use Azure Firewall in your deployment. For more information, see Use Azure Firewall to protect Azure Virtual Desktop deployments.
- Create network security groups and application security groups to segment your Azure Virtual Desktop traffic. This practice helps you isolate your subnets by controlling their traffic flows.
- Use service tags instead of specific IP addresses for Azure services. Because addresses change, this approach minimizes the complexity of frequently updating network security rules.
- Familiarize yourself with the required URLs for Azure Virtual Desktop.
- Use a route table to allow Azure Virtual Desktop traffic to bypass any forced tunneling rules that you use to route traffic to a firewall or network virtual appliance (NVA). Otherwise, forced tunneling can affect the performance and reliability of your clients' connectivity.
- Use private endpoints to help protect platform as a service (PaaS) solutions like Azure Files and Azure Key Vault. But consider the cost of using private endpoints.
- Adjust the configuration options for Azure Private Link. When you use this service with Azure Virtual Desktop, you can disable the public endpoints for Azure Virtual Desktop control plane components and use private endpoints to avoid using public IP addresses.
- Implement strict firewall policies if you use Active Directory Domain Services (AD DS). Base those policies on the traffic that's required across your domain.
- Consider using Azure Firewall or NVA web filtering to help protect your end users' access to the internet from Azure Virtual Desktop session hosts.
Private endpoints (Private Link)
Impact: Security
By default, connections to Azure Virtual Desktop resources are established through a publicly accessible endpoint. In some scenarios, the traffic needs to use private connections. These scenarios can use Private Link to privately connect to remote Azure Virtual Desktop resources. For more information, see Azure Private Link with Azure Virtual Desktop. When you create a private endpoint, traffic between your virtual network and the service remains on the Microsoft network. Your service isn't exposed to the public internet.
You can use Azure Virtual Desktop private endpoints to support the following scenarios:
- Your clients, or end users, and your session host VMs both use private routes.
- Your clients, or end users, use public routes while your session host VMs use private routes.
Azure Virtual Desktop session hosts have the same name resolution requirements as any other infrastructure as a service (IaaS) workloads. As a result, the session hosts require connectivity to name resolution services that are configured to resolve private endpoint IP addresses. Consequently, when you use private endpoints, you need to configure specific DNS settings. For detailed information, see Azure private endpoint DNS configuration.
Private Link is also available for other Azure services that work in conjunction with Azure Virtual Desktop, such as Azure Files and Key Vault. We recommend that you also implement private endpoints for these services to keep the traffic private.
Recommendations
- Understand how Private Link works with Azure Virtual Desktop. For more information, see Azure Private Link with Azure Virtual Desktop.
- Understand the DNS configurations that are needed for Azure private endpoints. For more information, see Azure private endpoint DNS configuration.
RDP Shortpath
Impact: Performance Efficiency, Cost Optimization
RDP Shortpath is a feature of Azure Virtual Desktop that's available for managed and unmanaged networks.
- For managed networks, RDP Shortpath establishes a direct connection between a remote desktop client and a session host. The transport is based on UDP. By removing extra relay points, RDP Shortpath reduces the round-trip time, which improves the user experience in latency-sensitive applications and input methods. To support RDP Shortpath, an Azure Virtual Desktop client needs a direct line of sight to the session host. The client also needs to install the Windows Desktop client and run Windows 11 or Windows 10.
- For unmanaged networks, two connection types are possible:
- Direct connectivity is established between the client and session host. Simple traversal underneath network address translation (STUN) and interactive connectivity establishment (ICE) are used to establish the connection. This configuration enhances transport reliability for Azure Virtual Desktop. For more information, see How RDP Shortpath works.
- An indirect UDP connection is established. It overcomes network address translation (NAT) limitations by using the Traversal Using Relay NAT (TURN) protocol with a relay between the client and session host.
With transport that's based on Transmission Control Protocol (TCP), the outbound traffic from a VM to an RDP client flows through an Azure Virtual Desktop gateway. With RDP Shortpath, the outbound traffic flows directly between the session host and the RDP client over the internet. This configuration helps eliminate a hop and improve latency and the end-user experience.
Recommendations
- Use RDP Shortpath to help improve latency and your end-user experience.
- Be aware of the availability of RDP Shortpath connection models.
- Be aware of RDP Shortpath charges.
Next steps
Now that you've examined networking and connectivity in Azure Virtual Desktop, investigate best practices for monitoring your infrastructure and workload.
Use the assessment tool to evaluate your design choices.