Bastion Host

Bastion Host Definition
A bastion host is a protected server used to control how people outside of a private network can access it. Organizations use it so internal systems don't have to be exposed directly to external traffic. A bastion host is more tightly secured than a standard internal server because it can be reached from outside the network.
A bastion host may be used as a jump host for remote administration, but the terms aren’t always the same. Bastion hosts can also support exposed services such as mail relay, DNS, web proxy, or other controlled entry points, depending on the network design. The key idea is that the bastion host is deliberately hardened and limited to approved functions, reducing direct exposure of internal systems.
How a Bastion Host Works
A user first connects to the bastion host instead of connecting to an internal system directly. The bastion host checks whether that user is allowed to sign in. This can involve approved IP addresses, login credentials, SSH keys, or multi-factor authentication.
After the user is verified, the bastion host allows access only to the systems or services the organization permits. This limits what each user can reach inside the network. In many setups, admins can also log sessions, track login attempts, and review activity for security purposes.
Types of Bastion Hosts
- Single-homed bastion host: Connects to the internal network and relies on a firewall or router to handle outside traffic.
- Dual-homed bastion host: Uses two network interfaces, with one connected to the outside network and the other connected to the internal network.
- Screened bastion host: Sits behind a screening router or firewall that filters traffic before it reaches the host.
- Cloud-based bastion host: Runs in the cloud to help control remote access to private resources.
Benefits of Bastion Hosts
- Controlled access point: Centralizes remote access through a single entry point, making it easier to manage and monitor connections.
- Reduced attack surface: Limits direct exposure of internal systems by placing them behind a secured gateway.
- Stronger access control: Enables strict authentication, authorization, and logging for users connecting to the network.
- Improved monitoring and auditing: Allows administrators to track access activity and detect suspicious behavior more easily.
Bastion Host vs Jump Server vs Firewall
| Bastion Host | Jump Server | Firewall | |
| Main role | Controls remote entry to a private network | Lets users reach another system indirectly | Filters network traffic |
| Direct user login | Yes | Yes | No |
| Internet-facing | Often | Sometimes | Sometimes |
| Main focus | Secure entry point | Intermediate access point | Traffic control |
Read More
FAQ
A bastion host is often used for admin tasks that should stay off the public internet. Teams may use one to update private servers, troubleshoot restricted systems, or access backup tools and internal development environments.
A bastion host is usually placed at the edge of a private network, often in a DMZ or another isolated network segment. In cloud setups, it may sit in a public subnet while the systems behind it stay in private subnets.
Both help with remote access, but in different ways. A bastion host acts as a specific entry point to selected systems inside a network. A VPN creates an encrypted connection between a user’s device and the network itself. In most cases, a VPN gives broader access, while a bastion host is used to limit access more tightly.
No. A bastion host and a firewall have separate roles, so one doesn't fully replace the other. A firewall controls which traffic can enter or leave a network based on rules. A bastion host controls how approved users reach certain internal systems.
No. SSH is common, but it’s not required. Some bastion hosts use RDP or other remote access tools instead. The right option depends on the systems being managed.