Securely Accessing EC2 Windows Instances via SSH Port Forwarding

Securely Accessing EC2 Windows Instances via SSH Port Forwarding

Takahiro Iwasa
Takahiro Iwasa
2 min read
EC2

This note describes how to securely access an EC2 Windows instance in a private subnet through a bastion host in a public subnet.

Important

This method secures only the connection between your PC and the bastion host. There is no encryption applied between the bastion host and the EC2 Windows instance.

Architecture Diagram

Building Backend

VPC

Create a private subnet in your VPC. If you already have one, you can skip this step.

Private Subnet

Create a route table and associate it with the private subnet.

Route Table Configuration

🔥 Caution

Ensure the internet gateway is removed from this route table, otherwise the internet gateway will make the subnet public.

If your EC2 Windows instance needs internet access, create a NAT gateway in a public subnet and attach it to the route table.

🔥 Caution

Running NAT gateway instances incurs additional costs.

NAT Gateway

SSH Bastion Host

  1. Launch an EC2 instance in the public subnet to serve as the bastion host.
  2. Configure the security group to allow inbound traffic on ports 22 (SSH) and 3389 (RDP).
💡 Tip

Assigning an Elastic IP (EIP) makes access to the bastion host easy.

EC2 Windows Instance

  1. Launch an EC2 Windows instance in the private subnet.
  2. Retrieve the remote desktop credentials using the Get Windows Password option in the EC2 dashboard.
  3. Restrict security group access to allow inbound traffic on ports 22 and 3389 only from the bastion host.

EC2 Windows Security Group

Testing the Connection

To establish a secure connection to the EC2 Windows instance, execute the following command from your terminal:

Terminal window
ssh -i <YOUR_PRIVATE_KEY> -L 13389:<YOUR_EC2_WINDOWS_IP>:3389 ec2-user@<YOUR_SSH_BASTION_IP>

This command forwards traffic from local port 13389 to the EC2 Windows instance in the private subnet via the bastion host.

Initiate a remote desktop session using localhost:13389.

Remote Desktop Connection

Takahiro Iwasa

Takahiro Iwasa

Software Developer
Involved in the requirements definition, design, and development of cloud-native applications using AWS. Japan AWS Top Engineers 2020-2023.