Bastion Hosts in VPC Private Subnets | Teradata Vantage on AWS (DIY) - Bastion Hosts in VPC Private Subnets - Teradata Vantage on AWS

Teradata Vantageā„¢ on AWS (DIY) Installation and Administration Guide

Product
Teradata Vantage on AWS
Release Number
Q2 2020
Published
April 2020
Language
English (United States)
Last Update
2020-05-01
dita:mapPath
grn1554394452559.ditamap
dita:ditavalPath
mmb1554489626757.ditaval
dita:id
B035-2800
Product Category
Cloud
Bastion hosts allow you to securely connect to EC2 instances running in VPC private subnets without exposing them to the Internet. A bastion host is set up in the public subnet and acts as a proxy/jump server and it should be configured with a high level of security. Consult your security administrator for configuring a bastion host.

VPC subnets connected through a bastion host.

To connect to EC2 instances in VPC private subnets securely, use SSH agent forwarding. SSH agent forwarding improves security by not exposing the management ports of your EC2 instances to the Internet or to other subnets in your VPC. For information on how to configure SSH agent forwarding, see https://aws.amazon.com/blogs/security/.