Bastion Hosts in VPC Private Subnets | Teradata Vantage on AWS (DIY) - Bastion Hosts in VPC Private Subnets - Teradata Vantage on AWS

Teradata Vantageā„¢ on AWS (DIY) Installation and Administration Guide

Product
Teradata Vantage on AWS
Release Number
2.3
Published
April 2022
Language
English (United States)
Last Update
2022-04-18
dita:mapPath
zra1648797736961.ditamap
dita:ditavalPath
nat1649317391363.ditaval
dita:id
B035-2800
lifecycle
previous
Product Category
Cloud
Bastion hosts allow you to securely connect to EC2 instances running in VPC private subnets without exposing them to the Internet. A bastion host is set up in the public subnet and acts as a proxy/jump server and it should be configured with a high level of security. Consult your security administrator for configuring a bastion host.

VPC subnets connected through a bastion host.

To connect to EC2 instances in VPC private subnets securely, use SSH agent forwarding. SSH agent forwarding improves security by not exposing the management ports of your EC2 instances to the Internet or to other subnets in your VPC. For information on how to configure SSH agent forwarding, see https://aws.amazon.com/blogs/security/.