AVD outbound web access, different outbound public IPs.

Zuuber 35 Reputation points
2025-10-08T11:22:16.3533333+00:00

Hi

Basically I would like outbound AVD web traffic to use different public IPs. We already have Azure basic firewall, AVD subnet has a route out to Azure Firewall.

The documentation suggests that if you add multiple public IPs to Azure Firewall that a random IP is selected from one of the IPs assigned to the firewall, but this doesn't seem to be the case. All AVD outbound traffic seems to use the same public IP even though multiple public IPs are assigned to the firewall.

How do we get AVD outbound web traffic to use different public IPs?

thanks

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
{count} votes

Answer accepted by question author
  1. Thanmayi Godithi 1,885 Reputation points Microsoft External Staff Moderator
    2025-10-08T12:21:03.82+00:00

    Hi @Zuuber,

    Thank you for reaching out on Microsoft Q&A forum.

    I understand you’d like your Azure Virtual Desktop (AVD) outbound traffic to use multiple public IP addresses assigned to your Azure Firewall, rather than seeing all traffic go through the same IP. Let me clarify how Azure Firewall handles multiple IPs and what options you have.

    Azure Firewall supports attaching multiple public IPs (up to 250). However, for outbound traffic, the firewall performs Source Network Address Translation (SNAT).

    The SNAT behaviour is as follows:

    • Azure Firewall will preferentially use the first public IP address for all outbound connections until its SNAT ports are exhausted.
    • Only when that happens will the firewall start using additional public IPs.
    • This design is intended to increase SNAT port capacity, not to balance outbound flows across multiple IPs.
    • Because AVD typically establishes a moderate number of outbound sessions, you’ll usually see one consistent public IP for all traffic, and this is expected behaviour.

    Reference:

    If you want your outbound traffic to appear from multiple IPs, there are a few approaches:

    1.Use Azure NAT Gateway for outbound SNAT

    • You can associate a NAT Gateway (with multiple public IPs or prefixes) to your firewall subnet.
    • NAT Gateway randomly selects a public IP for each outbound flow.
    • This setup is recommended for scenarios needing scalable outbound connections or IP diversity-Integrate Azure Firewall with NAT Gateway

    2.Separate workloads across multiple firewalls or NAT gateways

    • For deterministic egress IP mapping, use separate subnets or distinct NAT Gateways per workload.
    • Each subnet/firewall combination will have its own unique outbound IP(s).

    Kindly let us know if the above helps or you need further assistance on this issue. Please "Accept the answer" if the information helped you. This will help us and others in the community as well.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.