Bastion Host

Bastion Host is a special-purpose internet-accessible server that accepts SSH connections for the purpose of accessing internal machines and resources. Specifically designed and configured to withstand attacks, the server generally hosts a single application or process, for example, a proxy server or load balancer, and all other services are removed or limited to reduce the threat to the server. Typically, a user connects to the bastion first, then makes another SSH connection to the final destination, often called a “jump”. Bastion servers are sometimes called “jump hosts” or “jump servers.”

Related Terms

Access Tier

An Access Tier is an identity-aware proxy and gateway that mediates access into a private network segment within ...

Banyan Threat Protection

Banyan Threat Protection is a section within the ITP Policy page, in which an admin can block threats from end ...

Content Filtering

Content Filtering is a section within the ITP Policy page, in which an admin can block categories of domains and ...

Data Plane

The Data Plane is a part of a network through which user packets are transmitted. It is a theoretical term used to ...

Distributed Access Tier

Distributed Access Tier is an Identity-Aware Proxy that mediates access into a private network segment within ...

Federated Security

Federated Security allows for clean separation between the service a client is accessing and the associated ...

Hybrid Cloud Security

Hybrid Cloud Security refers to a mixed computing, storage, and services environment made up of on-premises ...

Identity Provider (IdP)

An Identity Provider (IdP) is tasked with verifying users’ identities and communicating with the service provider ...

Infrastructure as a Service (IaaS)

This is a type of cloud computing service, also known as public cloud, that offers essential compute, storage, and ...

Infrastructure as a Service (IaaS)

IaaS is a type of cloud computing service, also known as public cloud, that offers essential compute, storage, and ...

Infrastructure as Code (IaC)

Infrastructure as Code (IaC) is the process of managing and provisioning computer data centers through ...

Internet Threat Protection (ITP)

Internet Threat Protection is a key Banyan feature that allows us to evaluate which URLs (being searched by end ...