Skip to content

Commit 46f1147

Browse files
asudbringCopilot
andcommitted
Add Bastion Developer for secure VM access, replace RDP
Co-authored-by: Copilot <[email protected]>
1 parent e5fc8c9 commit 46f1147

1 file changed

Lines changed: 46 additions & 12 deletions

File tree

articles/route-server/peer-route-server-with-virtual-appliance.md

Lines changed: 46 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: duongau
55
ms.author: duau
66
ms.service: azure-route-server
77
ms.topic: tutorial
8-
ms.date: 09/17/2025
8+
ms.date: 07/11/2025
99
ms.custom: sfi-image-nochange
1010

1111
---
@@ -21,6 +21,7 @@ In this tutorial, you learn how to:
2121
> [!div class="checklist"]
2222
> * Deploy an Azure Route Server in a virtual network
2323
> * Create and configure a Windows Server virtual machine as an NVA
24+
> * Deploy Azure Bastion for secure VM access
2425
> * Configure BGP routing on the network virtual appliance
2526
> * Establish BGP peering between Route Server and the NVA
2627
> * Verify route learning and propagation
@@ -119,29 +120,62 @@ Create a Windows Server VM in the virtual network you created earlier to act as
119120
| -------- | ----- |
120121
| Virtual network | Select **myVirtualNetwork**. |
121122
| Subnet | Select **mySubnet (10.0.0.0/24)**. |
122-
| Public IP | Leave as default. |
123-
| NIC network security group | Select **Basic**. |
124-
| Public inbound ports | Select **Allow selected ports**. |
125-
| Select inbound ports | Select **RDP (3389)**. |
126-
127-
> [!CAUTION]
128-
> Leaving the RDP port open to the internet isn't recommended. Restrict access to the RDP port to a specific IP address or range of IP addresses. For production environments, it's recommended to block internet access to the RDP port and use [Azure Bastion](../bastion/bastion-overview.md?toc=/azure/route-server/toc.json) to securely connect to your virtual machine from the Azure portal.
123+
| Public IP | Select **None**. |
124+
| NIC network security group | Select **Advanced**. |
125+
| Configure network security group | Select **Create new**.</br> In **Name** enter **nsg-nva**.</br> Select **OK**. |
129126

130127
1. Select **Review + create** and then **Create** after validation passes.
131128

129+
### Deploy Azure Bastion
130+
131+
Azure Bastion uses your browser to connect to VMs in your virtual network over Secure Shell (SSH) or Remote Desktop Protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](../bastion/bastion-overview.md?toc=/azure/route-server/toc.json).
132+
133+
>[!NOTE]
134+
>[!INCLUDE [Pricing](~/reusable-content/ce-skilling/azure/includes/bastion-pricing.md)]
135+
136+
1. In the search box at the top of the portal, enter **Bastion**. Select **Bastions** in the search results.
137+
138+
1. Select **+ Create**.
139+
140+
1. In the **Basics** tab of **Create a Bastion**, enter, or select the following information:
141+
142+
| Setting | Value |
143+
|---|---|
144+
| **Project details** | |
145+
| Subscription | Select your subscription. |
146+
| Resource group | Select **myResourceGroup**. |
147+
| **Instance details** | |
148+
| Name | Enter **bastion**. |
149+
| Region | Select **East US**. |
150+
| Tier | Select **Developer**. |
151+
| **Configure virtual networks** | |
152+
| Virtual network | Select **myVirtualNetwork**. |
153+
154+
1. Select **Review + create**.
155+
156+
1. Select **Create**.
157+
132158
### Configure BGP on the virtual machine
133159

134160
In this section, you configure BGP settings on the VM so it can function as an NVA and exchange routes with the Route Server.
135161

136162
> [!IMPORTANT]
137163
> The Routing and Remote Access Service (RRAS) isn't supported in Azure for production use. However, in this tutorial, it's used to simulate an NVA and demonstrate how to establish BGP peering with Route Server. For production environments, use supported network virtual appliances from Azure Marketplace. For more information, see [Remote access overview](/windows-server/remote/remote-access/remote-access).
138-
1. Go to **myNVA** virtual machine and select **Connect**.
164+
1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines** in the search results.
165+
166+
1. Select **myNVA**.
167+
168+
1. Select **Connect** then **Connect via Bastion** in the **Overview** section.
139169

140-
1. On the **Connect** page, select **Download RDP file** under **Native RDP**.
170+
1. In the **Bastion** connection page, enter or select the following information:
141171

142-
1. Open the downloaded file.
172+
| Setting | Value |
173+
| ------- | ----- |
174+
| Authentication Type | Select **Password**. |
175+
| Username | Enter the username you created. |
176+
| Password | Enter the password you created. |
143177

144-
1. Select **Connect** and then enter the username and password that you created in the previous steps. Accept the certificate if prompted.
178+
1. Select **Connect**.
145179

146180
1. Run PowerShell as an administrator.
147181

0 commit comments

Comments
 (0)