Hi @Zuuber,
Thank you for reaching out on Microsoft Q&A forum.
I understand you’d like your Azure Virtual Desktop (AVD) outbound traffic to use multiple public IP addresses assigned to your Azure Firewall, rather than seeing all traffic go through the same IP. Let me clarify how Azure Firewall handles multiple IPs and what options you have.
Azure Firewall supports attaching multiple public IPs (up to 250). However, for outbound traffic, the firewall performs Source Network Address Translation (SNAT).
The SNAT behaviour is as follows:
- Azure Firewall will preferentially use the first public IP address for all outbound connections until its SNAT ports are exhausted.
- Only when that happens will the firewall start using additional public IPs.
- This design is intended to increase SNAT port capacity, not to balance outbound flows across multiple IPs.
- Because AVD typically establishes a moderate number of outbound sessions, you’ll usually see one consistent public IP for all traffic, and this is expected behaviour.
Reference:
- Configure public IP for Azure Firewall
- Azure Firewall FAQ – Public IP associations
- Azure Firewall SNAT behavior and private ranges
If you want your outbound traffic to appear from multiple IPs, there are a few approaches:
1.Use Azure NAT Gateway for outbound SNAT
- You can associate a NAT Gateway (with multiple public IPs or prefixes) to your firewall subnet.
- NAT Gateway randomly selects a public IP for each outbound flow.
- This setup is recommended for scenarios needing scalable outbound connections or IP diversity-Integrate Azure Firewall with NAT Gateway
2.Separate workloads across multiple firewalls or NAT gateways
- For deterministic egress IP mapping, use separate subnets or distinct NAT Gateways per workload.
- Each subnet/firewall combination will have its own unique outbound IP(s).
Kindly let us know if the above helps or you need further assistance on this issue. Please "Accept the answer" if the information helped you. This will help us and others in the community as well.