Skip to content

Commit b036d97

Browse files
author
Abdullah Bell
committed
Fix broken bookmark, alt text, and double spaces
1 parent 91b54af commit b036d97

2 files changed

Lines changed: 5 additions & 5 deletions

File tree

articles/bastion/bastion-connect-vm-rdp-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Before you begin, verify that you meet the following criteria:
3131
|---|---|---|
3232
| Azure portal (browser) | Basic | None |
3333
| Azure portal with custom ports | Standard | None |
34-
| IP-based connection | Standard | [IP-based connection](connect-ip-address.md#configure-bastion) enabled |
34+
| IP-based connection | Standard | [IP-based connection](connect-ip-address.md#sku-requirements) enabled |
3535
| Native client (RDP) | Standard | [Native client support](native-client.md) enabled |
3636

3737
* Users connecting via RDP must have rights on the target virtual machine. If the user isn't a local administrator, add them to the **Remote Desktop Users** group.

articles/bastion/connect-ip-address.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ ms.author: abell
1313

1414
# About Azure Bastion IP-based connection
1515

16-
IP-based connection lets you connect to your on-premises, non-Azure, and Azure virtual machines via Azure Bastion using a specified IP address. Unlike standard Bastion connections that use the Azure Resource Manager resource ID of a target virtual machine, IP-based connections target a virtual machine by its IP address. This makes it possible to connect to machines that aren't registered as Azure resources, such as on-premises servers or VMs running in other cloud environments.
16+
IP-based connection lets you connect to your on-premises, non-Azure, and Azure virtual machines via Azure Bastion using a specified IP address. Unlike standard Bastion connections that use the Azure Resource Manager resource ID of a target virtual machine, IP-based connections target a virtual machine by its IP address. This makes it possible to connect to machines that aren't registered as Azure resources, such as on-premises servers or VMs running in other cloud environments.
1717

1818
## Architecture
1919

20-
The following diagram shows the IP-based connection architecture. Azure Bastion, deployed in its virtual network, connects to a target virtual machine using the virtual machine's IP address over an ExpressRoute circuit or VPN site-to-site connection. The connection doesn't require the target virtual machine to have a public IP address or to be an Azure resource.
20+
The following diagram shows the IP-based connection architecture. Azure Bastion, deployed in its virtual network, connects to a target virtual machine using the virtual machine's IP address over an ExpressRoute circuit or VPN site-to-site connection. The connection doesn't require the target virtual machine to have a public IP address or to be an Azure resource.
2121

22-
:::image type="content" source="./media/connect-ip-address/architecture.png" alt-text="Screenshot of IP-based connections work over Azure ExpressRoute private peering or VPN site-to-site connections, extending Azure Bastion's secure connectivity beyond Azure-hosted workloads." lightbox="./media/connect-ip-address/architecture.png":::
22+
:::image type="content" source="./media/connect-ip-address/architecture.png" alt-text="Diagram that shows how IP-based connections work over Azure ExpressRoute private peering or VPN site-to-site connections, extending Azure Bastion secure connectivity beyond Azure-hosted workloads." lightbox="./media/connect-ip-address/architecture.png":::
2323

2424
In this scenario:
2525
* Azure Bastion routes the RDP or SSH traffic through the ExpressRoute or VPN connection to reach the target virtual machine at the specified IP address.
@@ -56,7 +56,7 @@ For information about SKU capabilities, see [Choose the right Azure Bastion SKU]
5656

5757
* **Microsoft Entra ID authentication:** Microsoft Entra authentication isn't supported for RDP connections via IP address. Microsoft Entra authentication is supported for SSH connections via native client. For more information, see [Microsoft Entra ID authentication](bastion-entra-id-authentication.md).
5858

59-
* **Custom ports and protocols:** Custom ports and protocols aren't currently supported when connecting to a virtual machine via native client with IP-based connections.
59+
* **Custom ports and protocols:** Custom ports and protocols aren't currently supported when connecting to a virtual machine via native client with IP-based connections.
6060

6161
* **UDR:** User-defined routes (UDR) aren't supported on the Bastion subnet, including with IP-based connections.
6262

0 commit comments

Comments
 (0)