Skip to content

Commit 8d1f887

Browse files
authored
Merge pull request #165086 from MicrosoftDocs/release-preview-bastionsku
Release preview bastionsku--Scheduled release at 10AM of 7/12
2 parents 0159468 + ca1c0da commit 8d1f887

27 files changed

+383
-62
lines changed

articles/bastion/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@
2121
href: work-remotely-support.md
2222
- name: Bastion FAQ
2323
href: bastion-faq.md
24+
- name: Configuration settings
25+
href: configuration-settings.md
2426
- name: Bastion and VNet peering
2527
href: vnet-peering.md
2628
- name: Security
@@ -43,6 +45,10 @@
4345
href: bastion-connect-vm-ssh.md
4446
- name: RDP (Windows)
4547
href: bastion-connect-vm-rdp.md
48+
- name: Upgrade a SKU
49+
href: upgrade-sku.md
50+
- name: Configure host scaling
51+
href: configure-host-scaling.md
4652
- name: Connect to a virtual machine scale set
4753
href: bastion-connect-vm-scale-set.md
4854
- name: Connect to DevTest Labs virtual machines
@@ -79,6 +85,8 @@
7985
href: https://azure.microsoft.com/roadmap/?category=networking
8086
- name: Blog
8187
href: https://azure.microsoft.com/blog/topics/networking
88+
- name: Pricing
89+
href: https://azure.microsoft.com/pricing/details/azure-bastion
8290
- name: Microsoft Q&A question page
8391
href: /answers/topics/azure-virtual-network.html
8492
- name: Preview SLA

articles/bastion/bastion-create-host-powershell.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: bastion
88
ms.topic: how-to
9-
ms.date: 10/14/2020
9+
ms.date: 07/12/2021
1010
ms.author: cherylmc
1111
# Customer intent: As someone with a networking background, I want to create an Azure Bastion host.
1212

@@ -16,23 +16,29 @@ ms.author: cherylmc
1616

1717
This article shows you how to create an Azure Bastion host using PowerShell. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all of the VMs in the same virtual network. Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine.
1818

19-
Optionally, you can create an Azure Bastion host by using the [Azure portal](./tutorial-create-host-portal.md).
19+
Optionally, you can create an Azure Bastion host by using the following methods:
20+
* [Azure portal](./tutorial-create-host-portal.md)
21+
* [Azure CLI](create-host-cli.md)
22+
23+
[!INCLUDE [Note about SKU limitations for preview.](../../includes/bastion-preview-sku-note.md)]
2024

2125
## Prerequisites
2226

2327
Verify that you have an Azure subscription. If you don't already have an Azure subscription, you can activate your [MSDN subscriber benefits](https://azure.microsoft.com/pricing/member-offers/msdn-benefits-details) or sign up for a [free account](https://azure.microsoft.com/pricing/free-trial).
2428

2529
[!INCLUDE [PowerShell](../../includes/vpn-gateway-cloud-shell-powershell-about.md)]
2630

27-
>[!NOTE]
28-
>The use of Azure Bastion with Azure Private DNS Zones is not supported at this time. Before you begin, please make sure that the virtual network where you plan to deploy your Bastion resource is not linked to a private DNS zone.
31+
> [!NOTE]
32+
> The use of Azure Bastion with Azure Private DNS Zones is not supported at this time. Before you begin, please make sure that the virtual network where you plan to deploy your Bastion resource is not linked to a private DNS zone.
2933
>
3034
3135
## <a name="createhost"></a>Create a bastion host
3236

3337
This section helps you create a new Azure Bastion resource using Azure PowerShell.
3438

35-
1. Create a virtual network and an Azure Bastion subnet. You must create the Azure Bastion subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger subnet (/27, /26, and so on). Create the **AzureBastionSubnet** without any route tables or delegations. If you use Network Security Groups on the **AzureBastionSubnet**, refer to the [Work with NSGs](bastion-nsg.md) article.
39+
1. Create a virtual network and an Azure Bastion subnet. You must create the Azure Bastion subnet using the name value **AzureBastionSubnet**. This value lets Azure know which subnet to deploy the Bastion resources to. This is different than a VPN gateway subnet.
40+
41+
[!INCLUDE [Note about BastionSubnet size.](../../includes/bastion-subnet-size.md)]
3642

3743
```azurepowershell-interactive
3844
$subnetName = "AzureBastionSubnet"

articles/bastion/bastion-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: bastion
88
ms.topic: conceptual
9-
ms.date: 06/22/2021
9+
ms.date: 07/12/2021
1010
ms.author: cherylmc
1111
---
1212
# Azure Bastion FAQ

articles/bastion/bastion-overview.md

Lines changed: 31 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: cherylmc
77

88
ms.service: bastion
99
ms.topic: overview
10-
ms.date: 06/22/2021
10+
ms.date: 07/12/2021
1111
ms.author: cherylmc
1212

1313
---
@@ -17,13 +17,32 @@ Azure Bastion is a service you deploy that lets you connect to a virtual machine
1717

1818
Bastion provides secure RDP and SSH connectivity to all of the VMs in the virtual network in which it is provisioned. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world, while still providing secure access using RDP/SSH.
1919

20-
## Architecture
20+
:::image type="content" source="./media/bastion-overview/architecture.png" alt-text="Diagram showing Azure Bastion architecture.":::
2121

22-
Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine. Once you provision an Azure Bastion service in your virtual network, the RDP/SSH experience is available to all your VMs in the same virtual network.
22+
## <a name="key"></a>Key benefits
23+
24+
* **RDP and SSH directly in Azure portal:** You can get to the RDP and SSH session directly in the Azure portal using a single click seamless experience.
25+
* **Remote Session over TLS and firewall traversal for RDP/SSH:** Azure Bastion uses an HTML5 based web client that is automatically streamed to your local device. You get your RDP/SSH session over TLS on port 443, enabling you to traverse corporate firewalls securely.
26+
* **No Public IP required on the Azure VM:** Azure Bastion opens the RDP/SSH connection to your Azure virtual machine using private IP on your VM. You don't need a public IP on your virtual machine.
27+
* **No hassle of managing NSGs:** Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity. You don't need to apply any NSGs to the Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. This removes the hassle of managing NSGs each time you need to securely connect to your virtual machines.
28+
* **Protection against port scanning:** Because you do not need to expose your virtual machines to the public Internet, your VMs are protected against port scanning by rogue and malicious users located outside your virtual network.
29+
* **Protect against zero-day exploits. Hardening in one place only:** Azure Bastion is a fully platform-managed PaaS service. Because it sits at the perimeter of your virtual network, you don’t need to worry about hardening each of the virtual machines in your virtual network. The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up to date for you.
30+
31+
## <a name="sku"></a>SKUs
32+
33+
Azure Bastion has two available SKUs, Basic and Standard. The Standard SKU is currently in Preview. For more information, including how to upgrade a SKU, see the [Configuration settings](configuration-settings.md#skus) article.
34+
35+
The following table shows features and corresponding SKUs.
36+
37+
[!INCLUDE [Azure Bastion SKUs](../../includes/bastion-sku.md)]
38+
39+
## <a name="architecture"></a>Architecture
40+
41+
Azure Bastion is deployed to a virtual network and supports virtual network peering. Specifically, Azure Bastion manages RDP/SSH connectivity to VMs created in the local or peered virtual networks.
2342

2443
RDP and SSH are some of the fundamental means through which you can connect to your workloads running in Azure. Exposing RDP/SSH ports over the Internet isn't desired and is seen as a significant threat surface. This is often due to protocol vulnerabilities. To contain this threat surface, you can deploy bastion hosts (also known as jump-servers) at the public side of your perimeter network. Bastion host servers are designed and configured to withstand attacks. Bastion servers also provide RDP and SSH connectivity to the workloads sitting behind the bastion, as well as further inside the network.
2544

26-
![Azure Bastion Architecture](./media/bastion-overview/architecture.png)
45+
:::image type="content" source="./media/bastion-overview/architecture.png" alt-text="Diagram showing the Azure Bastion architecture.":::
2746

2847
This figure shows the architecture of an Azure Bastion deployment. In this diagram:
2948

@@ -33,22 +52,21 @@ This figure shows the architecture of an Azure Bastion deployment. In this diagr
3352
* With a single click, the RDP/SSH session opens in the browser.
3453
* No public IP is required on the Azure VM.
3554

36-
## Key features
55+
## <a name="host-scaling"></a>Host scaling
3756

38-
The following features are available:
57+
Azure Bastion supports manual host scaling. You can configure the number of host instances (scale units) in order to manage the number of concurrent RDP/SSH connections that Azure Bastion can support. Increasing the number of host instances lets Azure Bastion manage more concurrent sessions. Decreasing the number of instances decreases the number of concurrent supported sessions. Azure Bastion supports up to 50 host instances. This feature is available for the Azure Bastion Standard SKU only.
3958

40-
* **RDP and SSH directly in Azure portal:** You can directly get to the RDP and SSH session directly in the Azure portal using a single click seamless experience.
41-
* **Remote Session over TLS and firewall traversal for RDP/SSH:** Azure Bastion uses an HTML5 based web client that is automatically streamed to your local device, so that you get your RDP/SSH session over TLS on port 443 enabling you to traverse corporate firewalls securely.
42-
* **No Public IP required on the Azure VM:** Azure Bastion opens the RDP/SSH connection to your Azure virtual machine using private IP on your VM. You don't need a public IP on your virtual machine.
43-
* **No hassle of managing NSGs:** Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity. You don't need to apply any NSGs on Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. This removes the hassle of managing NSGs each time you need to securely connect to your virtual machines.
44-
* **Protection against port scanning:** Because you do not need to expose your virtual machines to public Internet, your VMs are protected against port scanning by rogue and malicious users located outside your virtual network.
45-
* **Protect against zero-day exploits. Hardening in one place only:** Azure Bastion is a fully platform-managed PaaS service. Because it sits at the perimeter of your virtual network, you don’t need to worry about hardening each of the virtual machines in your virtual network. The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up to date for you.
59+
For more information, see the [Configuration settings](configuration-settings.md#instance) article.
60+
61+
## <a name="pricing"></a>Pricing
62+
63+
Azure Bastion pricing involves a combination of hourly pricing based on SKU, scale units, and data transfer rates. Pricing information can be found on the [Pricing](https://azure.microsoft.com/pricing/details/azure-bastion) page.
4664

4765
## <a name="new"></a>What's new?
4866

4967
Subscribe to the RSS feed and view the latest Azure Bastion feature updates on the [Azure Updates](https://azure.microsoft.com/updates/?category=networking&query=Azure%20Bastion) page.
5068

51-
## FAQ
69+
## Bastion FAQ
5270

5371
For frequently asked questions, see the Bastion [FAQ](bastion-faq.md).
5472

articles/bastion/bastion-vm-full-screen.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ author: cherylmc
66

77
ms.service: bastion
88
ms.topic: how-to
9-
ms.date: 02/03/2020
9+
ms.date: 07/12/2021
1010
ms.author: cherylmc
1111
# Customer intent: I want to manage my VM experience using Azure Bastion.
1212

1313
---
1414

15-
# Change to full screen view for a vm session: Azure Bastion
15+
# Change to full screen view for a VM session: Azure Bastion
1616

1717
This article helps you change the virtual machine view to full screen and back in your browser. Before you work with a VM, make sure you have followed the steps to [Create a Bastion host](./tutorial-create-host-portal.md). Then, connect to the VM that you want to work with using either [RDP](bastion-connect-vm-rdp.md) or [SSH](bastion-connect-vm-ssh.md).
1818

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: 'About Azure Bastion configuration settings'
3+
description: Learn about the available configuration settings for Azure Bastion.
4+
services: bastion
5+
author: cherylmc
6+
7+
ms.service: bastion
8+
ms.topic: conceptual
9+
ms.date: 07/12/2021
10+
ms.author: cherylmc
11+
12+
---
13+
14+
# About Bastion configuration settings
15+
16+
The sections in this article discuss the resources and settings for Azure Bastion.
17+
18+
## <a name="skus"></a>SKUs
19+
20+
A SKU is also known as a Tier. Azure Bastion supports two SKU types: Basic and Standard. The SKU is configured in the Azure portal during the workflow when you configure Bastion. You can [upgrade a Basic SKU to a Standard SKU](#upgradesku).
21+
22+
* The **Basic SKU** provides base functionality, enabling Azure Bastion to manage RDP/SSH connectivity to Virtual Machines (VMs) without exposing public IP addresses on the target application VMs.
23+
* The **Standard SKU** is in **Preview**. The Standard SKU enables premium features that allow Azure Bastion to manage remote connectivity at a larger scale.
24+
25+
The following table shows features and corresponding SKUs.
26+
27+
[!INCLUDE [Azure Bastion SKUs](../../includes/bastion-sku.md)]
28+
29+
### Configuration methods
30+
31+
During Preview, you must use the Azure portal if you want to specify the Standard SKU. If you use the Azure CLI or Azure PowerShell to configure Bastion, the SKU can't be specified and defaults to the Basic SKU.
32+
33+
| Method | Value | Links |
34+
| --- | --- | --- |
35+
| Azure portal | Tier - Basic or <br>Standard (Preview) | [Quickstart - Configure Bastion from VM settings](quickstart-host-portal.md)<br>[Tutorial - Configure Bastion](tutorial-create-host-portal.md) |
36+
| Azure PowerShell | Basic only - no settings |[Configure Bastion - PowerShell](bastion-create-host-powershell.md) |
37+
| Azure CLI | Basic only - no settings | [Configure Bastion - CLI](create-host-cli.md) |
38+
39+
### <a name="upgradesku"></a>Upgrade a SKU
40+
41+
Azure Bastion supports upgrading from a Basic to a Standard SKU. However, downgrading from Standard to Basic is not supported. To downgrade, you must delete and recreate Azure Bastion. The Standard SKU is in Preview.
42+
43+
#### Configuration methods
44+
45+
You can configure this setting using the following method:
46+
47+
| Method | Value | Links |
48+
| --- | --- | --- |
49+
| Azure portal |Tier | [Upgrade a SKU - Preview](upgrade-sku.md)|
50+
51+
## <a name="instance"></a>Instances and host scaling (Preview)
52+
53+
An instance is an optimized Azure VM that is created when you configure Azure Bastion. It's fully managed by Azure and runs all of the processes needed for Azure Bastion. An instance is also referred to as a scale unit. You connect to client VMs via an Azure Bastion instance. When you configure Azure Bastion using the Basic SKU, two instances are created. If you use the Standard SKU, you can specify the number of instances. This is called **host scaling**.
54+
55+
Each instance can support 10-12 concurrent RDP/SSH connections. The number of connections per instances depends on what actions you are taking when connected to the client VM. For example, if you are doing something data intensive, it creates a larger load for the instance to process. Once the concurrent sessions are exceeded, an additional scale unit (instance) is required.
56+
57+
Instances are created in the AzureBastionSubnet. For host scaling, the AzureBastionSubnet should be /26 or larger. Using a smaller subnet limits the number of instances you can create. For more information about the AzureBastionSubnet, see the [subnets](#subnet) section in this article.
58+
59+
### Configuration methods
60+
61+
You can configure this setting using the following method:
62+
63+
| Method | Value | Links |
64+
| --- | --- | --- |
65+
| Azure portal |Instance count | [Configure host scaling - Preview](configure-host-scaling.md)|
66+
67+
68+
## <a name="subnet"></a>Azure Bastion subnet
69+
70+
Azure Bastion requires a dedicated subnet: **AzureBastionSubnet**. This subnet needs to be created in the same Virtual Network that Azure Bastion is deployed to. The subnet must have the following configuration:
71+
72+
* Subnet name must be *AzureBastionSubnet*.
73+
* Subnet size must be /27 or larger (/26, /25 etc.).
74+
* For host scaling, a /26 or larger subnet is recommended. Using a smaller subnet space limits the number of scale units. For more information, see the [Host scaling](#instance) section of this article.
75+
* The subnet must be in the same VNet and resource group as the bastion host.
76+
* The subnet cannot contain additional resources.
77+
78+
### Configuration methods
79+
80+
You can configure this setting using the following methods:
81+
82+
| Method | Value | Links |
83+
| --- | --- |--- |
84+
| Azure portal | Subnet |[Quickstart - Configure Bastion from VM settings](quickstart-host-portal.md)<br>[Tutorial - Configure Bastion](tutorial-create-host-portal.md)|
85+
| Azure PowerShell | -subnetName|[cmdlet](/powershell/module/az.network/new-azbastion#parameters) |
86+
| Azure CLI | --subnet-name | [command](/cli/azure/network/vnet#az_network_vnet_create) |
87+
88+
## <a name="public-ip"></a>Public IP address
89+
90+
Azure Bastion requires a Public IP address. The Public IP must have the following configuration:
91+
92+
* The Public IP address SKU must be **Standard**.
93+
* The Public IP address assignment/allocation method must be **Static**.
94+
* The Public IP address name is the resource name by which you want to refer to this public IP address.
95+
* You can choose to use a public IP address that you already created, as long as it meets the criteria required by Azure Bastion and is not already in use.
96+
97+
### Configuration methods
98+
99+
You can configure this setting using the following methods:
100+
101+
| Method | Value | Links |
102+
| --- | --- |--- |
103+
| Azure portal | Public IP address |[Azure portal](https://portal.azure.com)|
104+
| Azure PowerShell | -PublicIpAddress| [cmdlet](/powershell/module/az.network/new-azbastion#parameters) |
105+
| Azure CLI | --public-ip create |[command](/cli/azure/network/public-ip)
106+
|
107+
108+
## Next steps
109+
110+
For frequently asked questions, see the [Azure Bastion FAQ](bastion-faq.md).
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
title: 'Add scale units for host scaling'
3+
titleSuffix: Azure Bastion
4+
description: Learn how to add additional instances (scale units) to Azure Bastion.
5+
services: bastion
6+
author: cherylmc
7+
8+
ms.service: bastion
9+
ms.topic: how-to
10+
ms.date: 07/12/2021
11+
ms.author: cherylmc
12+
# Customer intent: As someone with a networking background, I want to configure host scaling.
13+
14+
---
15+
16+
# Configure host scaling (Preview)
17+
18+
This article helps you add additional scale units (instances) to Azure Bastion in order to accommodate additional concurrent client connections. During Preview, this setting can be configured in the Azure portal only. For more information about host scaling, see [Configuration settings](configuration-settings.md#instance).
19+
20+
## Configuration steps
21+
22+
1. In the Azure portal, navigate to your Bastion host.
23+
1. Host scaling instance count requires Standard tier. On the **Configuration** page, for **Tier**, verify the tier is **Standard**. If the tier is Basic, select **Standard** from the dropdown.
24+
25+
:::image type="content" source="./media/configure-host-scaling/select-sku.png" alt-text="Screenshot of Select Tier." lightbox="./media/configure-host-scaling/select-sku.png":::
26+
1. To configure scaling, adjust the instance count. Each instance is a scale unit.
27+
28+
:::image type="content" source="./media/configure-host-scaling/instance-count.png" alt-text="Screenshot of Instance count slider." lightbox="./media/configure-host-scaling/instance-count.png":::
29+
1. Click **Apply** to apply changes.
30+
31+
## Next steps
32+
33+
* Read the [Bastion FAQ](bastion-faq.md) for additional information.

0 commit comments

Comments
 (0)