Creating an Internet-facing load balancer using the Azure portal


Azure Load Balancer supports two different types: Basic and Standard. This article discusses Basic Load Balancer. Although Basic Load Balancer is generally available, Standard Load Balancer is currently in public preview. For more information about Standard Load Balancer, see Standard Load Balancer overview.

An Azure load balancer is a Layer-4 (TCP, UDP) load balancer. The load balancer provides high availability by distributing incoming traffic among healthy service instances in cloud services or virtual machines in a load balancer set. Azure Load Balancer can also present those services on multiple ports, multiple IP addresses, or both.

You can configure a load balancer to:

  • Load balance incoming Internet traffic to virtual machines (VMs). We refer to a load balancer in this scenario as an Internet-facing load balancer.
  • Load balance traffic between VMs in a virtual network (VNet), between VMs in cloud services, or between on-premises computers and VMs in a cross-premises virtual network. We refer to a load balancer in this scenario as an internal load balancer (ILB).
  • Forward external traffic to a specific VM instance.

This article covers the Resource Manager deployment model.

The following tasks will be done in this scenario:

  • Create a load balancer that receives network traffic on port 80 and send load-balanced traffic to virtual machines "web1" and "web2"
  • Create NAT rules for remote desktop access/SSH for virtual machines behind the load balancer
  • Create health probes

Load balancer scenario

This covers the sequence of individual tasks that have to be done to create a load balancer and explain in detail what is being done to accomplish the goal.

What is required to create an Internet-facing load balancer?

You need to create and configure the following objects to deploy a load balancer.

  • Front-end IP configuration - contains public IP addresses for incoming network traffic.
  • Back-end address pool - contains network interfaces (NICs) for the virtual machines to receive network traffic from the load balancer.
  • Load balancing rules - contains rules mapping a public port on the load balancer to port in the back-end address pool.
  • Inbound NAT rules - contains rules mapping a public port on the load balancer to a port for a specific virtual machine in the back-end address pool.
  • Probes - contains health probes used to check availability of virtual machines instances in the back-end address pool.

You can get more information about load balancer components with Azure Resource Manager at Azure Resource Manager support for Load Balancer.

Set up a load balancer in Azure portal


This example assumes you have a virtual network called myVNet. Refer to create virtual network to do this. It also assumes there is a subnet within myVNet called LB-Subnet-BE and two VMs called web1 and web2 respectively within the same availability set called myAvailSet in myVNet. Refer to this link to create VMs.

  1. From a browser navigate to the Azure portal: and login with your Azure account.
  2. On the top left-hand side of the screen select Create a resource > Networking > Load Balancer.
  3. In the Create load balancer blade, type a name for your load balancer. Here it is called myLoadBalancer.
  4. Under Type, select Public.
  5. Under Public IP address, create a new public IP called myPublicIP.
  6. Under Resource Group, select myRG. Then select an appropriate Location, and then click OK. The load balancer then starts to deploy and takes a few minutes to successfully complete deployment.

    Updating resource group of load balancer

Create a back-end address pool

  1. Once your load balancer has successfully deployed, select it from within your resources. Under settings, select Backend Pools. Type a name for your backend pool. Then click on the Add button toward the top of the blade that shows up.
  2. Click on Add a virtual machine in the Add backend pool blade. Select Choose an availability set under Availability set and select myAvailSet. Next, select Choose the virtual machines under the Virtual Machines section in the blade and click on web1 and web2, the two VMs created for load balancing. Ensure that both have blue check marks to the left as shown in the image below. Then, click Select in that blade followed by OK in the Choose Virtual machines blade and then OK in the Add backend pool blade.

    Adding to the backend address pool -

  3. Check to make sure your notifications drop down list has an update regarding saving the load balancer backend pool in addition to updating the network interface for both the VMs web1 and web2.

Create a probe, LB rule, and NAT rules

  1. Create a health probe.

    Under Settings of your load balancer, select Probes. Then click Add located at the top of the blade.

    There are two ways to configure a probe: HTTP or TCP. This example shows HTTP, but TCP can be configured in a similar manner. Update the necessary information. As mentioned, myLoadBalancer load balances traffic on Port 80. The path selected is HealthProbe.aspx, Interval is 15 seconds, and Unhealthy threshold is 2. Once finished, click OK to create the probe.

    Hover your pointer over the 'i' icon to learn more about these individual configurations and how they can be changed to cater to your requirements.

    Adding a probe

  2. Create a load balancer rule.

    Click on Load balancing rules in the Settings section of your load balancer. In the new blade, click on Add. Name your rule. Here, it is HTTP. Choose the frontend port and Backend port. Here, 80 is chosen for both. Choose LB-backend as your Backend pool and the previously created HealthProbe as the Probe. Other configurations can be set according to your requirements. Then click OK to save the load balancing rule.

    Adding a load balancing rule

  3. Create inbound NAT rules

    Click on Inbound NAT rules under the settings section of your load balancer. In the new blade that, click Add. Then name your inbound NAT rule. Here it is called inboundNATrule1. The destination should be the Public IP previously created. Select Custom under Service and select the protocol you would like to use. Here TCP is selected. Enter the port, 3441, and the Target port, in this case, 3389. then click OK to save this rule.

    Once the first rule is created, repeat this step for the second inbound NAT rule called inboundNATrule2 from port 3442 to Target port 3389.

    Adding an inbound NAT rule

Remove a Load Balancer

To delete a load balancer, select the load balancer you want to remove. In the Load Balancer blade, click on Delete located at the top of the blade. Then select Yes when prompted.

Next steps

Get started configuring an internal load balancer

Configure a load balancer distribution mode

Configure idle TCP timeout settings for your load balancer