You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/enterprise/microsoft-365-vpn-stream-and-live-events.md
+61-22Lines changed: 61 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,11 +34,11 @@ description: "Special considerations for Teams events in VPN environments"
34
34
>- For guidance on securing Teams media traffic in VPN split tunneling environments, see [Securing Teams media traffic for VPN split tunneling](microsoft-365-vpn-securing-teams.md).
35
35
>- For information about optimizing Microsoft 365 worldwide tenant performance for users in China, see [Microsoft 365 performance optimization for China users](microsoft-365-networking-china.md).
36
36
37
-
Microsoft Teams Live events attendee traffic (this includes attendees to Teams-produced live events and those produced with an external encoder via Teams or Viva Engage) and Microsoft Teams Town hall attendee traffic is currently categorized as **Default** versus **Optimize** in the [URL/IP list for the service](urls-and-ip-address-ranges.md). These endpoints are categorized as **Default** because they're hosted on CDNs that might also be used by other services. Customers generally prefer to proxy this type of traffic and apply any security elements normally done on endpoints such as these.
37
+
Microsoft Teams Live events **attendee** traffic (this includes attendees to Teams-produced live events and those produced with an external encoder via Teams or Viva Engage) and Microsoft Teams Town hall **attendee** traffic is currently categorized as **Default** versus **Optimize** in the [URL/IP list for the service](urls-and-ip-address-ranges.md). These endpoints are categorized as **Default** because they're hosted on Content Delivery Networks (CDNs) that might also be used by other services. Customers generally prefer to proxy this type of traffic and apply any security elements normally done on endpoints such as these.
38
38
39
39
Many customers have asked for URL/IP data needed to connect their attendees in Teams events directly from their local internet connection, rather than route the high-volume and latency-sensitive traffic via the VPN infrastructure. Typically, this isn't possible without both dedicated namespaces and accurate IP information for the endpoints, which isn't provided for Microsoft 365 endpoints categorized as **Default**.
40
40
41
-
Use the following steps to identify and enable direct connectivity for attendee traffic for Teams Events from clients that are using a forced tunnel VPN. This solution is intended to provide customers with an option to avoid routing attendee traffic over VPN while there's high network traffic due to work-from-home scenarios. If possible, we recommend accessing the service through an inspecting proxy.
41
+
Use the following steps to identify and enable direct connectivity for attendee traffic for Teams Events from clients that are using a forced tunnel VPN. This solution is intended to provide customers with an option to avoid routing attendee traffic over VPN while there's high network traffic due to work-from-home scenarios. If possible, we recommend accessing the service through an inspecting proxy. Attendee traffic will connect to the CDN over TCP/UDP 443.
42
42
43
43
> [!NOTE]
44
44
> Using this solution, there might be service elements that don't resolve to the IP addresses provided and thus traverse the VPN, but the bulk of high-volume traffic like streaming data should. There might be other elements outside the scope of Live Events/Stream which get caught by this offload, but these should be limited as they must meet both the FQDN _and_ the IP match before going direct.
@@ -53,7 +53,6 @@ To implement the forced tunnel exception for Teams Events, the following steps s
53
53
Clients need external, recursive DNS resolution to be available so that the following host names can be resolved to IP addresses.
54
54
55
55
For the **Commercial** cloud:
56
-
-\*.bmc.cdn.office.net
57
56
-\*.ml.cdn.office.net
58
57
59
58
@@ -77,11 +76,36 @@ To solve this, we can provide the following IPs and use them in combination with
77
76
78
77
### Gathering the current lists of CDN Endpoints
79
78
80
-
For the Commercial cloud and Microsoft 365 U.S. Government clouds (GCC, GCC High and DoD) Teams events use Azure CDN from Microsoft. Over time this could be changed due to situations such as regional availability. This article provides the required namespaces for Teams events and guidance for the corresponding IP address ranges used (where available).
79
+
For the Commercial cloud Teams events use Azure CDN from Microsoft and Akamai CDN; Microsoft 365 U.S. Government clouds (GCC, GCC High and DoD) use Azure CDN from Microsoft along with the existing IP ranges defined in the respective Optimize category for their environment. Over time this could be changed due to situations such as regional availability. This article provides the required namespaces for Teams events and guidance for the corresponding IP address ranges used (where available).
81
80
82
81
For the **Commercial** cloud:
83
82
84
83
- For Azure CDN from Microsoft, you can download the list from [Download Azure IP Ranges and Service Tags – Public Cloud from Official Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=56519) - you'll need to look specifically for the service tag `AzureFrontdoor.Frontend` in the JSON; _addressPrefixes_ will show the IPv4/IPv6 subnets. Over time the IPs can change, but the service tag list is always updated before they're put in use.
84
+
- For Akamai CDN, the following IP addresses are used (these are only used for Teams traffic):
85
+
* 23.11.32.10/32
86
+
* 23.11.33.10/32
87
+
* 23.11.34.10/32
88
+
* 23.11.35.10/32
89
+
* 23.11.38.12/32
90
+
* 23.11.39.12/32
91
+
* 23.11.36.9/32
92
+
* 23.11.37.9/32
93
+
* 23.11.40.9/32
94
+
* 23.11.41.9/32
95
+
* 23.11.42.9/32
96
+
* 23.11.43.9/32
97
+
* 2600:14e1:0:1::/64
98
+
* 2600:14e1:4:1::/64
99
+
* 2600:14e1:8:1::/64
100
+
* 2600:14e1:c:1::/64
101
+
* 2600:14e1:18:2::/64
102
+
* 2600:14e1:1c:2::/64
103
+
* 2600:14e1:10:7::/64
104
+
* 2600:14e1:14:7::/64
105
+
* 2600:14e1:20:7::/64
106
+
* 2600:14e1:24:7::/64
107
+
* 2600:14e1:28:7::/64
108
+
* 2600:14e1:2c:7::/64
85
109
86
110
For the **Government** clouds **(GCC, GCC High and DoD)**:
87
111
@@ -94,10 +118,11 @@ The following script can generate a PAC file that will include the namespaces an
94
118
Here's an example of how to generate the PAC file for the Commercial cloud:
95
119
96
120
1. Save the script to your local hard disk as _Get-EventsPacFile.ps1_.
97
-
1. In a PowerShell window, run the following command. If you only desire the Optimize names (and not Optimize and Allow) change the -Type parameter to OptimizeOnly.
121
+
2. Create a new text file named AkamaiCDN.txt, and copy the Akamai CDN IP addresses from the previous section into the file. Ensure there is only one IP address/prefix per line. Save this file, you will need it in the next step.
122
+
1. In a PowerShell window, run the following command. If you desire the Optimize and Allow names (and not Optimize only) change the -Type parameter to OptimizeAnyAllow.
@@ -393,7 +430,7 @@ function Get-TeamsEventsConfiguration {
393
430
}
394
431
}
395
432
396
-
function Get-TLEPacConfiguration {
433
+
function Get-TeamsEventsPacConfiguration {
397
434
[CmdletBinding()]
398
435
param (
399
436
[Parameter(ValueFromPipelineByPropertyName)]
@@ -502,9 +539,9 @@ else {
502
539
}
503
540
```
504
541
505
-
The script will automatically parse the appropriate Azure CDN list based on the **Instance** parameter value and keys off of **AzureFrontDoor.Frontend**, so there's no need to get that manually.
542
+
The script will automatically parse the appropriate Azure CDN list based on the **Instance** parameter value and keys off of **AzureFrontDoor.Frontend**, so there's no need to get that manually. The Akamai CDN information will be incorporated if you supplied the AkamaiCDN.txt file.
506
543
507
-
Performing VPN offloading utilizing **both** the FQDNs and the IP addresses (where provided) in the function helps scope the use of this offload to a limited set of endpoints including Teams Events. The way the function is structured will result in a DNS lookup being done for the FQDN that matches those listed by the client directly, that is, DNS resolution of the remaining namespaces remains unchanged. In the case of the Commercial cloud, not all IP addresses are provided; VPN offloading would need to rely on matching the namespaces defined earlier in this article.
544
+
Performing VPN offloading utilizing **both** the FQDNs and the IP addresses in the function helps scope the use of this offload to a limited set of endpoints including Teams Events. The way the function is structured will result in a DNS lookup being done for the FQDN that matches those listed by the client directly, that is, DNS resolution of the remaining namespaces remains unchanged.
508
545
509
546
510
547
## 3. Configure routing on the VPN to enable direct egress
@@ -518,6 +555,10 @@ The final step is to add a direct route for the Teams event IPs (or namespaces)
518
555
519
556
No, this will send the latency-sensitive, potentially high-volume streaming traffic for a Teams Event attendee direct, any other traffic will continue to use the VPN tunnel if they don't resolve to the IPs published or match the defined namespace.
520
557
558
+
### Is a PAC file required?
559
+
560
+
No, the PAC file is not required - it all depends on your network and security requirements. The information provided in this document can also be leveraged in other configurations, such as VPN concentrators - please refer to the manufacturer's documentation for configuration assistance.
561
+
521
562
### Do I need to use the IPv6 Addresses?
522
563
523
564
No, the connectivity can be IPv4 only if necessary.
@@ -530,16 +571,16 @@ The **Default** endpoint category has no IP information provided for numerous re
530
571
531
572
### Do I only need to allow access to these IPs/namespaces?
532
573
533
-
No, access to all of the **Required** marked endpoints for the appropriate environment is essential for the service to operate.
574
+
No, access to all of the **Required** marked endpoints for the appropriate environment is essential for the service to operate. Government clouds can also leverage the Optimize endpoint ranges.
534
575
- Worldwide including GCC: [Endpoints for Worldwide](urls-and-ip-address-ranges.md)
535
576
- Microsoft 365 U.S. Government GCC High: [Endpoints for GCC High](microsoft-365-u-s-government-gcc-high-endpoints.md)
536
577
- Microsoft 365 U.S. Government DoD: [Endpoints for DoD](microsoft-365-u-s-government-dod-endpoints.md)
537
578
538
579
### What scenarios will this advice cover?
539
580
540
-
1. Live events produced within the Teams App
541
-
2. Teams encoder produced live events
542
-
3. Teams Town hall
581
+
1.Attending Live events produced within the Teams App
582
+
2.Attending Teams encoder produced live events
583
+
3.Attending Teams Town hall
543
584
544
585
### Does this advice cover presenter traffic?
545
586
@@ -568,6 +609,4 @@ It doesn't; the preceding advice is purely for those attending the event. Presen
568
609
569
610
[Enhancing VPN performance at Microsoft: using Windows 10 VPN profiles to allow auto-on connections](https://www.microsoft.com/itshowcase/enhancing-remote-access-in-windows-10-with-an-automatic-vpn-profile)
570
611
571
-
[Running on VPN: How Microsoft is keeping its remote workforce connected](https://www.microsoft.com/itshowcase/blog/running-on-vpn-how-microsoft-is-keeping-its-remote-workforce-connected/?elevate-lv)
572
-
573
612
[Microsoft global network](/azure/networking/microsoft-global-network)
0 commit comments