Skip to main content
All CollectionsConnectorsVulcan Connectors
Vulcan Gateway - Technical Deep Dive
Vulcan Gateway - Technical Deep Dive
Updated over 3 months ago

Brief:

Vulcan gateway is an on-prem component that allows the Vulcan platform to connect to connectors which have restrictive access controls without the need to open TCP connections.


Deep Dive:

In order to create a seamless connection between Vulcan SaaS offering, and on prem connectors, Vulcan utilized a small on-prem component called the Vulcan Gateway.
It is a small Ubuntu linux virtual machine in an OVA format - which knows to look for configuration about the connectors it needs to connect to from the Vulcan Platfrom. Once the configuration is loaded, it opens a reverse SSH tunnel to the TCP connector that the connector uses on the one hand, and on the other hand to a dedicated Vulcan server that acts as proxy for the Vulcan platform to use.

  1. Whenever a gateway server is configured in the UI, a random ID will be generated for it.

2. The OVA will use that ID, and try and download a JSON file – constructed from all the connectors configured for that specific ID. That Json can be pulled using any browser in order to inspect its content using:

https://gatewayconfig.vulcancyber.com/api/asset_manager/vulcangateway/get_config/<ID>/

This is an API gateway, that maps the request to an S3 Bucket, which is created / updated anytime someone makes a relevant change from the Vulcan UI.

3. After downloading the file, the OVA, will parse all the relevant IP addresses & ports, and will try to open the relevant tunnel for each.

4. The tunnel is opened using a dedicated random port – which is unique globally to that specific connector – and against the dedicated gateway server (gateway.vulcancyber.com, port 1939)

5. On the Vulcan Platform Side, the platform will know to replace the IP & Port that the user put in the UI, with the correct ones in the generated in the JSON.


Communication Methods

Purpose

source

destination

Protocol

port

Web Management interface

Client Browser (any)

HTTP/S

443

Gateway config file

OVA

HTTP/S

443

Tunnel to Vulcan

OVA

gateway.vulcancyber.com

SSH

1939

Tunnel to connector

OVA

Internal Connector IP

TCP

Internal Connector Port

Decomissioning Note


Upon expiration of the license, there will be no substantial alterations from an operational standpoint. As the OVA (On-premises Virtual Appliance) does not store any data and merely serves as a communication intermediary, its functionality remains unaltered. Vulcan, the associated cloud service, will cease to receive new data streams, as data polling is exclusively initiated from the cloud service itself. Moreover, it is imperative to note that the OVA does not retain any proprietary business logic, further ensuring continuity of existing operations.

Gateway VM Communication

The Gateway VM is a crucial component of the Vulcan system, responsible for managing communication between the Gateway server and the on-prem tool. In this article, we will discuss the various aspects of how the Gateway VM communicates with these components.

Checking for Instructions

Every 60 minutes, the Gateway VM checks for an instruction JSON file from the Gateway server. This communication occurs through port 443, which is a secure and commonly used port for web traffic. The instruction file contains commands and updates for the Gateway VM to execute.

Command Processing

Upon receiving the instruction file, the Gateway VM processes the commands and identifies any changes since the last probe. It then sets up or removes SSH tunnels accordingly. This process ensures that the Gateway VM is always up-to-date and able to handle any changes in the system.

On-Prem Tool Connection

The Gateway VM also establishes a daily connection to the on-prem tool. This connection is established at a configurable time through the web interface, making it easy for users to customize the timing according to their needs.

SSH Tunnel Configuration

The SSH tunnel is a secure and encrypted connection between the Gateway VM and the Vulcan servers. It uses port 1939 for outbound communication and port 443 for inbound communication, depending on the connector configuration. This ensures that all communication between the Gateway VM and the Vulcan servers is secure and protected.

Data Handling

The Gateway VM does not store any business logic or customer data at any time. All data is securely transmitted and stored on the Vulcan servers, ensuring the highest level of data protection for our users.

Did this answer your question?