You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/bastion/bastion-create-host-portal.md
+21-18Lines changed: 21 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,28 +6,25 @@ author: cherylmc
6
6
7
7
ms.service: bastion
8
8
ms.topic: conceptual
9
-
ms.date: 12/09/2019
9
+
ms.date: 02/03/2020
10
10
ms.author: cherylmc
11
11
# Customer intent: As someone with a networking background, I want to create an Azure Bastion host.
12
12
13
13
---
14
14
15
15
# Create an Azure Bastion host
16
16
17
-
This article shows you how to create an Azure Bastion host. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all your VMs in the same virtual network. This deployment is per virtual network, not per subscription/account or virtual machine.
17
+
This article shows you how to create an Azure Bastion host using the Azure portal. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all of the VMs in the same virtual network. Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine.
18
18
19
-
There are two ways that you can create a Bastion host resource:
20
-
21
-
* Create a Bastion resource using the Azure portal.
22
-
* Create a Bastion resource in the Azure portal by using existing VM settings.
19
+
You can create a new bastion host resource in the portal either by specifying all of the settings manually, or by using the settings that correspond to an existing VM. Optionally, you can use [Azure Powershell](bastion-create-host-powershell.md) to create an Azure Bastion host.
23
20
24
21
## Before you begin
25
22
26
23
Bastion is available in the following Azure public regions:
## <aname="createhost"></a>Create a bastion host - specify settings
31
28
32
29
This section helps you create a new Azure Bastion resource from the Azure portal.
33
30
@@ -47,20 +44,22 @@ This section helps you create a new Azure Bastion resource from the Azure portal
47
44
***Resource Group**: The Azure resource group in which the new Bastion resource will be created in. If you don’t have an existing resource group, you can create a new one.
48
45
***Name**: The name of the new Bastion resource
49
46
***Region**: The Azure public region that the resource will be created in.
50
-
***Virtual network**: The virtual network in which the Bastion resource will be created in. You can create a new virtual network in the portal during this process, in case you don’t have or don’t want to use an existing virtual network. If you are using an existing virtual network, make sure the existing virtual network has enough free address space to accommodate the Bastion subnet requirements.
51
-
***Subnet**: The subnet in your virtual network to which the new Bastion host resource will be deployed. You must create a subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a Gateway subnet.You must use a subnet of at least a /27 or larger subnet (/27, /26, and so on). Create the **AzureBastionSubnet** without any route tables or delegations. When you use Network Security Groups on the **AzureBastionSubnet**, refer to [Work with NSGs](bastion-nsg.md).
47
+
***Virtual network**: The virtual network in which the Bastion resource will be created in. You can create a new virtual network in the portal during this process, or use an existing virtual network. If you are using an existing virtual network, make sure the existing virtual network has enough free address space to accommodate the Bastion subnet requirements.
48
+
***Subnet**: The subnet in your virtual network to which the new Bastion host resource will be deployed. You must create a subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger (/27, /26, and so on).
49
+
50
+
Create the **AzureBastionSubnet** without any route tables or delegations. If you use Network Security Groups on the **AzureBastionSubnet**, refer to the [Work with NSGs](bastion-nsg.md) article.
52
51
***Public IP address**: The public IP of the Bastion resource on which RDP/SSH will be accessed (over port 443). Create a new public IP, or use an existing one. The public IP address must be in the same region as the Bastion resource you are creating.
53
52
***Public IP address name**: The name of the public IP address resource.
54
-
***Public IP address SKU**: Prepopulated by default to **Standard**. Azure Bastion uses/supports only the Standard Public IP SKU.
55
-
***Assignment**: Prepopulated by default to **Static**.
53
+
***Public IP address SKU**: This setting is prepopulated by default to **Standard**. Azure Bastion uses/supports only the Standard Public IP SKU.
54
+
***Assignment**: This setting is prepopulated by default to **Static**.
56
55
57
56
1. When you have finished specifying the settings, click **Review + Create**. This validates the values. Once validation passes, you can begin the creation process.
58
-
1. On the Create a bastion page, click **Create**.
59
-
1. You will see a message letting you know that your deployment is underway. Status will display on this page as the resources are created. It takes about 5 mins for the Bastion resource to be created and deployed.
57
+
1. On the **Create a bastion** page, click **Create**.
58
+
1. You will see a message letting you know that your deployment is underway. Status will display on this page as the resources are created. It takes about 5 minutes for the Bastion resource to be created and deployed.
60
59
61
-
## <aname="createvmset"></a>Create a bastion host using VM settings
60
+
## <aname="createvmset"></a>Create a bastion host - use VM settings
62
61
63
-
If you create a bastion host in the portal by using an existing VM, various settings will automatically default corresponding to your virtual machine and/or virtual network.
62
+
If you create a bastion host in the portal by using an existing VM, various settings will automatically default to correspond to your virtual machine and/or virtual network.
64
63
65
64
1. Open the [Azure portal](https://portal.azure.com). Go to your virtual machine, then click **Connect**.
66
65
@@ -71,11 +70,15 @@ If you create a bastion host in the portal by using an existing VM, various sett
71
70
1. On the Bastion page, fill out the following settings fields:
72
71
73
72
***Name**: The name of the bastion host you want to create.
74
-
***Subnet**: The subnet inside your virtual network to which Bastion resource will be deployed. The subnet must be created with the name **AzureBastionSubnet**. This lets Azure know which subnet to deploy the Bastion resource to. This is different than a Gateway subnet. Click **Manage subnet configuration** to create the Azure Bastion Subnet. We highly recommend that you use at least a /27 or larger subnet (/27, /26, etc.). Create the **AzureBastionSubnet** without any Network Security Groups, route tables, or delegations. Click **Create** to create the subnet, then proceed with the next settings.
73
+
***Subnet**: The subnet inside your virtual network to which Bastion resource will be deployed. The subnet must be created with the name **AzureBastionSubnet**. This lets Azure know which subnet to deploy the Bastion resource to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger (/27, /26, and so on). Create the subnet without any Network Security Groups, route tables, or delegations. If you later choose to use Network Security Groups on the **AzureBastionSubnet**, see [Work with NSGs](bastion-nsg.md).
74
+
75
+
Click **Manage subnet configuration** to create the **AzureBastionSubnet**. Click **Create** to create the subnet, then proceed with the next settings.
75
76
***Public IP address**: The public IP of the Bastion resource on which RDP/SSH will be accessed (over port 443). Create a new public IP, or use an existing one. The public IP address must be in the same region as the Bastion resource you are creating.
76
77
***Public IP address name**: The name of the public IP address resource.
77
-
1. On the validation screen, click **Create**. Wait for about 5 mins for the Bastion resource to be created and deployed.
78
+
1. On the validation screen, click **Create**. Wait for about 5 minutes for the Bastion resource create and deploy.
78
79
79
80
## Next steps
80
81
81
-
Read the [Bastion FAQ](bastion-faq.md)
82
+
* Read the [Bastion FAQ](bastion-faq.md) for additional information.
83
+
84
+
* To use Network Security Groups with the Azure Bastion subnet, see [Work with NSGs](bastion-nsg.md).
Copy file name to clipboardExpand all lines: articles/bastion/bastion-create-host-powershell.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,17 @@ author: cherylmc
6
6
7
7
ms.service: bastion
8
8
ms.topic: conceptual
9
-
ms.date: 10/14/2019
9
+
ms.date: 02/03/2020
10
10
ms.author: cherylmc
11
11
# Customer intent: As someone with a networking background, I want to create an Azure Bastion host.
12
12
13
13
---
14
14
15
15
# Create an Azure Bastion host using Azure PowerShell
16
16
17
-
This article shows you how to create an Azure Bastion host. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all your VMs in the same virtual network. This deployment is per virtual network, not per subscription/account or virtual machine.
17
+
This article shows you how to create an Azure Bastion host using PowerShell. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all of the VMs in the same virtual network. Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine.
18
+
19
+
Optionally, you can create an Azure Bastion host by using the [Azure portal](bastion-create-host-portal.md).
18
20
19
21
## Before you begin
20
22
@@ -26,7 +28,7 @@ Verify that you have an Azure subscription. If you don't already have an Azure s
26
28
27
29
This section helps you create a new Azure Bastion resource using Azure PowerShell.
28
30
29
-
1. Create a virtual network and an Azure Bastion subnet. You must create the Azure Bastion subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a Gateway subnet. You must use a subnet of at least a /27 or larger subnet (/27, /26, and so on). Create the **AzureBastionSubnet** without any route tables or delegations. When you use Network Security Groups on the **AzureBastionSubnet**, refer to [Work with NSGs](bastion-nsg.md).
31
+
1. Create a virtual network and an Azure Bastion subnet. You must create the Azure Bastion subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger subnet (/27, /26, and so on). Create the **AzureBastionSubnet** without any route tables or delegations. If you use Network Security Groups on the **AzureBastionSubnet**, refer to the [Work with NSGs](bastion-nsg.md) article.
30
32
31
33
```azurepowershell-interactive
32
34
$subnetName = "AzureBastionSubnet"
@@ -40,12 +42,14 @@ This section helps you create a new Azure Bastion resource using Azure PowerShel
3. Create a new Azure Bastion resource in the AzureBastionSubnet of your virtual network. It takes about 5 mins for the Bastion resource to be created and deployed.
45
+
3. Create a new Azure Bastion resource in the AzureBastionSubnet of your virtual network. It takes about 5 minutes for the Bastion resource to create and deploy.
Copy file name to clipboardExpand all lines: articles/bastion/bastion-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,11 @@ ms.author: cherylmc
15
15
16
16
The Azure Bastion service is a new fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly in the Azure portal over SSL. When you connect via Azure Bastion, your virtual machines do not need a public IP address.
17
17
18
-
Bastion provides secure RDP and SSH connectivity to all VMs in the virtual network in which it is provisioned. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world while still providing secure access using RDP/SSH. With Azure Bastion, you connect to the virtual machine directly from the Azure portal. You don't need an additional client, agent, or piece of software.
18
+
Bastion provides secure RDP and SSH connectivity to all of the VMs in the virtual network in which it is provisioned. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world, while still providing secure access using RDP/SSH. With Azure Bastion, you connect to the virtual machine directly from the Azure portal. You don't need an additional client, agent, or piece of software.
19
19
20
20
## Architecture
21
21
22
-
Azure Bastion is deployed in your virtual network and, once deployed, it provides the secure RDP/SSH experience for all the virtual machines in your virtual network. Once you provision an Azure Bastion service in your virtual network, the RDP/SSH experience is available to all your VMs in the same virtual network. The deployment is per virtual network, not per subscription/account or virtual machine.
22
+
Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine. Once you provision an Azure Bastion service in your virtual network, the RDP/SSH experience is available to all your VMs in the same virtual network.
23
23
24
24
RDP and SSH are some of the fundamental means through which you can connect to your workloads running in Azure. Exposing RDP/SSH ports over the Internet isn't desired and is seen as a significant threat surface. This is often due to protocol vulnerabilities. To contain this threat surface, you can deploy bastion hosts (also known as jump-servers) at the public side of your perimeter network. Bastion host servers are designed and configured to withstand attacks. Bastion servers also provide RDP and SSH connectivity to the workloads sitting behind the bastion, as well as further inside the network.
25
25
@@ -42,7 +42,7 @@ The following features are available:
42
42
***No Public IP required on the Azure VM:** Azure Bastion opens the RDP/SSH connection to your Azure virtual machine using private IP on your VM. You don't need a public IP on your virtual machine.
43
43
***No hassle of managing NSGs:** Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity. You don't need to apply any NSGs on Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. This removes the hassle of managing NSGs each time you need to securely connect to your virtual machines.
44
44
***Protection against port scanning:** Because you do not need to expose your virtual machines to public Internet, your VMs are protected against port scanning by rogue and malicious users located outside your virtual network.
45
-
***Protect against zero-day exploits. Hardening in one place only:** Azure Bastion is a fully platform-managed PaaS service. Because it sits at the perimeter of your virtual network, you don’t need to worry about hardening each of the virtual machines in your virtual network. The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up-to-date for you.
45
+
***Protect against zero-day exploits. Hardening in one place only:** Azure Bastion is a fully platform-managed PaaS service. Because it sits at the perimeter of your virtual network, you don’t need to worry about hardening each of the virtual machines in your virtual network. The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up to date for you.
Copy file name to clipboardExpand all lines: includes/bastion-faq-include.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
author: cherylmc
6
6
ms.service: bastion
7
7
ms.topic: include
8
-
ms.date: 12/17/2019
8
+
ms.date: 02/03/2020
9
9
ms.author: cherylmc
10
10
ms.custom: include file
11
11
---
@@ -17,7 +17,7 @@
17
17
18
18
### <aname="publicip"></a>Do I need a public IP on my virtual machine?
19
19
20
-
You do NOT need a public IP on the Azure Virtual Machine that you are connecting to with the Azure Bastion service. The Bastion service will open the RDP/SSH session/connection to your virtual machine over the private IP of your virtual machine, within your virtual network.
20
+
When you connect to a VM using Azure Bastion, you do NOT need a public IP on the Azure Virtual Machine that you are connecting to. The Bastion service will open the RDP/SSH session/connection to your virtual machine over the private IP of your virtual machine, within your virtual network.
21
21
22
22
### Is IPv6 supported?
23
23
@@ -29,7 +29,7 @@ You do not need an RDP or SSH client to access the RDP/SSH to your Azure virtual
29
29
30
30
### <aname="agent"></a>Do I need an agent running in the Azure virtual machine?
31
31
32
-
You don't need to install an agent or any software on your browser or on your Azure virtual machine. The Bastion service is agentless and does not require any additional software for RDP/SSH.
32
+
You don't need to install an agent or any software on your browser or your Azure virtual machine. The Bastion service is agentless and does not require any additional software for RDP/SSH.
33
33
34
34
### <aname="browsers"></a>Which browsers are supported?
35
35
@@ -58,7 +58,7 @@ Azure Bastion currently supports en-us-qwerty keyboard layout inside the VM. Su
58
58
### <aname="udr"></a>Is user-defined routing (UDR) supported on an Azure Bastion subnet?
59
59
60
60
No. UDR is not supported on an Azure Bastion subnet.
61
-
For scenarios that include both Azure Bastion and Azure Firewall/Network Virtual Appliance (NVA) in the same virtual network, you don’t need to force traffic from an Azure Bastion subnet to Azure Firewall because the communication between Azure Bastion and your VMs is private. For more details, see [Accessing VMs behind Azure Firewall with Bastion](https://azure.microsoft.com/blog/accessing-virtual-machines-behind-azure-firewall-with-azure-bastion/).
61
+
For scenarios that include both Azure Bastion and Azure Firewall/Network Virtual Appliance (NVA) in the same virtual network, you don’t need to force traffic from an Azure Bastion subnet to Azure Firewall because the communication between Azure Bastion and your VMs is private. For more information, see [Accessing VMs behind Azure Firewall with Bastion](https://azure.microsoft.com/blog/accessing-virtual-machines-behind-azure-firewall-with-azure-bastion/).
62
62
63
63
### <aname="filetransfer"></a>Is file-transfer supported with Azure Bastion RDP session?
0 commit comments