Azure Bastion is a new managed PaaS service that provides seamless RDP and SSH connectivity to your virtual machines over the Secure Sockets Layer (SSL). This is completed without any exposure of the public IPs on your virtual machines. Azure Bastion provisions directly in your Azure Virtual Network, providing bastion host or jump server as-a-service and integrated connectivity to all virtual machines in your virtual networking using RDP/SSH directly from and through your browser and the Azure portal experience.
For more information on Azure Bastion, check the docs.
Using the preview portal, we can deploy a Bastion host together with a new or existing Virtual Network.
Here’s a few screenshots of the Bastion and Virtual Network setup I have.
One thing to note is that, in order to deploy a Bastion host into an existing Virtual Network, that VNET needs to have a subnet called AzureBastionSubnet with atleast the /27 address space size.
Once we have the VNET and Bastion host provisioned, we can now deploy a Virtual Machine into the default subnet of the VNET we just created and connect to it on it’s private IP.
Ensure that there are no Public IPs, or inbound ports opened on the VM. Access to the VM will be governed by the Bastion host on private IPs.
Once the VM, is deployed, when we click ‘Connect”, we see a new option for connecting to the Virtual Machine. Provide the necessary details and ‘Connect’.
And we done!