

Figure 1 below shows the AWS EC2 Console GUI for creating a WinRDGateway security group using an example IP address of 192.168.0.0/24. In order to allow access for initial configuration of the RD Gateway, you must create a temporary Amazon VPC or EC2 security group rule for this instance to accept RDP (TCP/3389) connections from your current IP address. Make a note of the elastic IP address of this instance, as you’ll need it later.
#BASTION EC2 WINDOWS#
To set up RD Gateway, first use the EC2 Quick Launch Wizard in the AWS Management Console to launch a Windows Server 2008 R2 instance into a public subnet of your VPC or EC2-Classic environment. RD Gateway is a component of the Microsoft Remote Desktop Services server role that can be added to any Windows Server instance. Create a Windows EC2 instance and configure its security group rule

#BASTION EC2 UPDATE#
Update () To help you quickly deploy an environment that leverages the Microsoft Remote Desktop Gateway, we’ve released a Quick Start that includes a Reference Deployment guide and an AWS CloudFormation template that will create a fully functioning Remote Desktop Gateway deployment in your account. Verify you can connect to your Windows instances through RD Gateway.Reconfigure security groups on the RD Gateway instance and all other Windows server instances to control which connections are allowed.
#BASTION EC2 INSTALL#
#BASTION EC2 HOW TO#
Future posts from Ryan will describe how to configure a bastion in front of your Linux EC2 instances. This week’s guest blogger, Ryan Holland, AWS Solutions Architect, describes how to configure a bastion in front of your Windows EC2 instances to proxy administrative requests to your instances. A bastion is a special purpose server instance that is designed to be the primary access point from the Internet and acts as a proxy to your other EC2 instances. A best practice in this area is to use a bastion.

Depending on where your administrators connect to your instances from, you may consider enforcing stronger network-based access controls. As the number of EC2 instances in your AWS environment grows, so too does the number of administrative access points to those instances.
