
The solution also installs a self-signed SSL certificate and configures RD CAP and RD RAP policies. AWS Systems Manager to automate the deployment of the RD Gateway Auto Scaling group.

The only element that is missing is the Load Balancer. AWS Secrets Manager to securely store credentials used for accessing the RD Gateway instances. At the same time, our private subnets contain EC2 instances for the backend servers and the RDS databases.If more tiers are required, you can create additional private subnets with unique CIDR ranges. An empty application tier for instances in private subnets.To create an SSH tunnel, use Session Manager. SSH tunnels allow you to forward connections made to a local port to a remote machine through a secure channel. After deployment, you’ll modify the security group ingress rules to configure administrative access through TCP port 443 instead. Short description SSH tunneling, or SSH port forwarding, is a way to transport data over an encrypted SSH connection. A security group for Windows-based instances that will host the RD Gateway role, with an ingress rule permitting TCP port 3389 from your administrator IP address.

A Network Load Balancer to provide RDP access to the RD Gateway instances.Each instance is assigned an Elastic IP address so it’s reachable directly from the internet. In each public subnet, up to four RD Gateway instances in an Auto Scaling group to provide secure remote access to instances in the private subnets.Amazon uses bastions located in the perimeter network VPC (networking account), and you use your customer bastions, located in your Customer Bastions subnet in the shared services account. Managed network address translation (NAT) gateways to allow outbound internet access for resources in the private subnets.* You access your account instances by logging in to a bastion instance with your Active Directory (AD) credentials.This gateway is used by the RD Gateway instances to send and receive traffic.* An internet gateway to allow access to the internet.A VPC configured with public and private subnets according to AWS best practices, to provide you with your own virtual network on AWS.*.

