Skip to content

Commit 1ff9978

Browse files
committed
fixes for review
1 parent 8b8b903 commit 1ff9978

2 files changed

Lines changed: 5 additions & 3 deletions

File tree

windows-365/enterprise/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,8 @@ items:
139139
href: device-management-overview.md
140140
- name: Remotely manage Cloud PC devices
141141
href: remotely-manage-cloud-pc.md
142+
- name: RDP Shortpath for public networks
143+
href: rdp-shortpath-public-networks.md
142144
- name: Reprovision a Cloud PC
143145
href: reprovision-cloud-pc.md
144146
- name: Resize a Cloud PC

windows-365/enterprise/rdp-shortpath-public-networks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ To use RDP Shortpath for public networks with Windows 365, you must meet these r
4040
- UDP outbound to all public IP space (because, in most cases, it’s not possible to know the source IP address of the connecting PC).
4141
- STUN server IP ranges on UDP port 347.
4242
- Client PC Network
43-
- UDP outbound to:
44-
- the public IP addresses assigned to NAT gateway or the Azure Firewall in an Azure Hosted Network Scenario.
43+
- UDP outbound:
44+
- To the public IP addresses assigned to NAT gateway or the Azure Firewall in an Azure Hosted Network Scenario.
4545
- For a Microsoft Hosted network scenario, all public IP spaces.
4646

4747
## Enable the preview of RDP Shortpath for public networks
@@ -78,7 +78,7 @@ When using RPD Shortpath, the connection with the Cloud PC proceeds as follows:
7878

7979
The RDP Shortpath for public networks may not work with Cloud PCs in the following scenarios:
8080

81-
- Where double NAT is in place. For example, if the traffic is routed through a Secure Web Gateway (SWG) or proxy where the connection is NATTed twice (first, on egress from Azure and, second, from the VPN/SWG endpoint.)
81+
- Where double NAT is in place. For example, if the traffic is routed through a Secure Web Gateway (SWG) or proxy where the connection is Natted twice (first, on egress from Azure and, second, from the VPN/SWG endpoint.)
8282
- Where the connection is routed through an internet proxy or other inspection device.
8383
- Any network that restricts UDP access or limits access to specific ports or IP ranges.
8484
- Where Carrier Grade NAT (CGN) is used. Where the network shares a public IP address with other networks.

0 commit comments

Comments
 (0)