Airgap for ECS
Introduction
The add-on solution for Data Security for ECS offers maximum data protection with an automated cyber vault. This solution provides Enterprise Airgap capabilities, ensuring secure data isolation and automated synchronization for your ECS environment. It fully integrates with existing ECS infrastructure, simplifying compliance with the NIST cybersecurity framework.
The Enterprise Airgap for ECS automates data synchronization using a containerized ECS Sync, providing high throughput and scalability. The Vault agent manages job scheduling directly, eliminating the need for complex out-of-band setups.
Data Security Compliance with NIST Key Framework Attributes
| Framework Attribute | How Data Security Complies | Compliance Status |
|---|---|---|
| Identify | Threat identified by user name and IP address | Compliant |
| Protect | Stops the threat with user lockout in real time | Compliant |
| Detect | User behavior-based, tripwire, and well-known extension detection | Compliant |
| Respond | Alerting email, syslog, and automated snapshot creation | Compliant |
| Recover | Object level tracking and recovery from bucket versions | Compliant |
Key Features
- S3 to S3 Airgap Support: Supports secure replication between S3 buckets.
- Inside-the-Vault Automation: Provides seamless automation capabilities within the vault environment.
- Enterprise Airgap: Hardened solution with in-band management, offering complete automation from a VM inside the vault.
- Smart Airgap Technology: Synchronizes data only when safe, reducing risks. Scheduling is managed by the Vault agent for reliable control.
- Per S3 Bucket Level Replication: Supports granular replication at the individual bucket level.
- Data Immutability: Uses ECS object lock and bucket versioning to protect data from unauthorized modifications.
- Rapid Recovery: The ECS cluster in the vault provides an immutable data copy at petabyte scale, ensuring integrity during recovery.
- Many-to-One Protection: Allows you to consolidate multiple source ECS clusters into a single ECS Vault cluster.
- IAM User Lockout: Locks out IAM users to prevent unauthorized actions.
- Job History and Reports: Access detailed job history and airgap reports through the user interface. Reports can also be emailed on a schedule.
- In-Band Management and Alerts: Monitor Vault storage capacity, hardware, and space availability with managed alerts.
Pre-Requisites
The following table outlines the different requirements for AirGap to work correctly on ECS.
| Category | Details |
|---|---|
| Server Requirements | Dell Server model PowerEdge R450 with VMware 7.x, RAID 1 SSD 800GB, 128GB RAM, dual 10G NIC, dual socket (48 threads), 128GB RAM (Cart #3000111987102). Support Options: - 3-year support NBD OR - Pro-deploy plus |
| Vault ECS | Sized to the quantity of data needed for vault protection. |
| Optional Equipment | Production Network: - Ethernet switch or Firewall to connect Vault Agent Host. Vault Network: - Ethernet switch to connect Vault Agent Host to private network connected to the Vault ECS cluster. |
| Load Balancer | Progress Kemp LoadMaster. Installation service required. |
| Dell Services | - Physical installation of Dell Server host. - ECS Vault cluster + Hardening configuration. |
| Superna Services | - Airgap Design and Implementation Service. - Ransomware Defender for ECS Installation, Configuration, and Knowledge Transfer. |
| Scalability | 1, 3, or 6 Vault Agent VMs in a cluster for high availability and high-throughput object-to-object async copying. |
| Software | - Ransomware Defender for ECS. - Enterprise Airgap. |
Performance Considerations
-
Get Up-to-Date Performance Estimates
For the latest performance metrics, refer to ECSSync's performance page: General Performance Metrics.
-
Recommendations and Best Practices
-
Use five job definitions per Airgap ECSSync instance for optimal performance.
-
Throughput rates per ECSSync instance are detailed in the link above. Enterprise Airgap can scale from 3 to 99 instances as needed.
-
Load Balancer Support
If you have a load balancer in front of your ECS, configure its IP during the "Add Managed Device" step. To access this option, navigate to Eyeglass Menu -> Add Managed Device -> ECS. This links the load balancer's IP to your ECS and ensures that airgap jobs managed by the vault agent connect to the correct ECS cluster.

Deployment Diagram
Configuration
-
Follow the Installation Guide for Ransomware Defender for ECS
Ransomware Defender for ECS. -
Deploy Dell Vault Hardware
Deploy the Dell Vault hardware with VMware pre-installed. -
Deploy Enterprise Vault Agent ECA Cluster
Deploy the Enterprise Vault Agent ECA cluster to the vault hardware. Refer to the guide for details. -
Configure Firewall Settings
Configure the firewall as specified in the port table in the "Firewall Requirements" section. -
Install Enterprise Airgap License Key Install the Enterprise Airgap license key in Eyeglass using the License Manager.
-
Access License Manager
- Go to Eyeglass Main Menu -> License Management.
- Navigate to: License Management > Manage Licenses > Browse.
- Upload the zipped file downloaded in the previous step.
tipFor more information, see Register Superna License
-
-
Set Up Eyeglass IP Address and )API Token on Vault Agent
-
Set Up Eyeglass
- Open the main menu in Eyeglass and select "Eyeglass REST API."
- Create a new token, name it "vault," and copy the token. Use this value where "yyyyyy" is required.
tipfor more information regarding "Eyeglass REST API", see "Token Generation and Authentication".
-
Configure Vault Agent
-
Log in to the vault agent as
ecaadmin. -
Open Configuration File
-
Run the following command to open the configuration file:
nano /opt/superna/eca/eca-env-common.conf
-
-
Add Eyeglass Location
-
Add the Eyeglass location:
export EYEGLASS_LOCATION=x.x.x.x
-
-
Add Eyeglass API Token
-
Add the Eyeglass API token:
export EYEGLASS_API_TOKEN=yyyyyy
-
-
Enable Object Services for Enterprise Airgap
-
Enable Object Services for Enterprise Airgap:
export ECS_SYNC_CFG=true
-
-
Save and Exit Configuration
- Save and exit the configuration file using
control + x.
- Save and exit the configuration file using
-
Restart ECA Cluster
-
Restart the ECA cluster:
ecactl cluster down
ecactl cluster up
-
-
-
-
Follow These Steps to Configure the Vault Agent
-
Add ECS Clusters to the Vault Agent
-
Run the following command to add ECS clusters to the vault agent:
ecactl ecs add --host x.x.x.x --user <user> -
Enter the IP address of the management interface and the service account user. Refer to the Eyeglass Service Account Minimum Privileges for details.
-
Repeat the process for each managed production and vault ECS cluster.
-
Verify Configuration
-
To verify the added clusters, run:
ecactl ecs list
-
-
-
One-Time ECS Sync Instance Configuration
-
Access the ECS Sync UI:
https://x.x.x.x/ecssyncui -
Login Credentials
- Log in with
ecaadminand the default password3y3gl4ss.
- Log in with
-
Configure Path and Email Address
- Click the Config tab and enter the config path
/opt/emc/ecs-sync/configand provide an email address
noteThis email will not be used for any alerting but is required as an input
- Click the Config tab and enter the config path
-
Update Sync Settings
- Uncheck the option labeled "Auto Archive: automatically archive completed syncs."
-
Configure ECS Sync Jobs
- Access ECS Sync UI
-
Access the ECS Sync UI:
https://x.x.x.x/ecssyncuiinfoEach vault agent has an ecssync container, enter the ip address of each instance to add jobs to the copy engine
-
Login Credentials
- Log in using
ecaadminand the default password3y3gl4ss.
noteAlways change the default password. Follow the steps provided in the ECA Cluster Operational Procedures guide for details.
- Log in using
-
Add Jobs
- See detailed steps below for adding jobs in the "How to Create ECSSync Jobs" section.
-
Save Jobs
- Save the job configurations after making changes.
-
- Access ECS Sync UI
-
Add ECSSync Jobs to Vault Agent
Add ECSSync jobs to the vault agent for management and integration with Eyeglass.-
List Configured Jobs
ecactl ecssync listjobsThis command lists all configured jobs.
-
Add Job to Managed List
ecactl ecssync addjob --job xxxx
infoReplace
xxxxwith the job name from the list. This adds the job to the managed job list. -
-
Push ECS Job Definitions to Eyeglass
- Register Jobs
-
Push all defined and added jobs to the vault agent for management, monitoring, and scheduling in Eyeglass.
ecactl ecssync updatejobs
-
- Register Jobs
-
Log in to Eyeglass
- Open Airgap Icon
- Access ECS Sync Config Tab
- The newly added jobs should appear automatically and show a status of "Not Scheduled."
- Enable Ransomware Defender Airgap Control
- Click the checkbox to enable Ransomware Defender Smart Airgap control and set the schedule for each ECS Sync job listed.
- Save Changes
- Click "Save" after making any changes to a policy.
- Set the schedule and save
- Repeat for each policy that displays not scheduled.
-
-
Open Jobs Icon to Enable the Job
- Click the jobs icon to enable the job.
- The default state is disabled, and no sync jobs will run until enabled.
-
Verify Vault Agent Schedule Change
-
Log in to the vault agent.
-
Run the command to list schedules:
ecactl ecssync schedules -
The schedule should be displayed for each policy configuration.
-
-
Test a Sync Job
-
Start a Job from Vault Agent CLI
-
Run the following command to force start a job:
ecactl ecssync startjob --job xxxxReplace
xxxxwith the name of the policy configured, which you can verify by running:ecactl ecssync checkjobs -
Verify Job Status in ECS Sync GUI
- Once the sync job has been started from the command line, you can verify the status directly in the ECS Sync GUI.
- Navigate to the "Status" tab in the ECS Sync UI.
- Look for the "Active Operations" section, where you will see the job listed along with its progress details.
- The job should display a progress bar indicating the completion percentage. It will show "100% Complete" once the job finishes successfully.
- Verify that there are no errors reported under the job entry. The "ETA" and "data transfer rate" will also be displayed for additional context.
noteDo not archive jobs. They are managed by the Vault Agent, and archiving them manually can disrupt job management.
- List All Jobs
- List all configured and active jobs in the Vault Agent for monitoring and review.
-
-
-
-
Done
Pre and Post-Script Hooks for ECS AirGap
This section explains how ECS AirGap uses pre- and post-scripts to provide an additional layer of network isolation for the Vault Agent by programmatically enabling and disabling network interfaces.
How the Network Isolation Works
Network Topology
The standard deployment uses a Vault Agent VM with two interfaces:
[PROD ECS] ----- [FIREWALL] ----- <eth1>[VAULT_AGENT]<eth0> ----- [VAULT ECS]
eth1is the external interface.eth0is the internal interface.
When opening or closing the Vault, ECS AirGap interacts only with the external interface.
Vault State Behavior
- When the Vault is closed,
eth1is disabled. - When the Vault is open,
eth1is enabled. - When the Vault is closed, the ECS source cannot be accessed by
ecssync, and replication does not occur.
Enabling the Feature
To activate this functionality, set the following variables in eca-env-common.conf:
export EVA_NTW_USE_SCRIPTS=true
export EVA_NTW_SCRIPTS_HOST_INT_IP=<internal-ip-address>
Where <internal-ip-address> is the IP assigned to the internal interface (eth0).
Script Files Used
The following files control network operations.
Interface Configuration
File: /opt/superna/eca/scripts/network-scripts/iface.config
Add the interface name that must be enabled or disabled:
eth1
Pre-Script (Open Vault)
File: /opt/superna/eca/scripts/network-scripts/pre-script.sh
This script enables the external interface and is automatically called before any operation that requires network connectivity.
Post-Script (Close Vault)
File: /opt/superna/eca/scripts/network-scripts/post-script.sh
This script disables the external interface after all operations finish.
Custom Script Locations
Customers can define custom paths for the scripts in eca-env-common.conf:
export EVA_NTW_SCRIPT_PRE="/opt/superna/eca/scripts/network-scripts/pre-script.sh"
export EVA_NTW_SCRIPT_POST="/opt/superna/eca/scripts/network-scripts/post-script.sh"
The directory must also contain the iface.config file.
If custom paths are used, upgrade processes will not overwrite these files. However, cluster startup will require a password so the sudoers file can be updated with the new paths.
When the Scripts Run
Automatic Execution
Pre- and post-scripts are triggered automatically before or after operations that require the Vault to be open:
- Running an ecssync job
- Sending jobs to Eyeglass
- Sending alerts from Vault ECS to Eyeglass
- Retrieving schedules from Eyeglass UI
- Uploading Vault Agent logs to Eyeglass
Manual Testing
You can test the scripts by running any command that requires the Vault to be opened:
ecactl ecssync startjob --job <jobName>
ecactl ecssync updatejobs --force true
ecactl ecs pushalerts
ecactl ecssync schedules
ecactl ecssync pushvaultagentlogs
Operations That Do Not Trigger Scripts
The following commands do not interact with networking:
- Add, clone, remove, or list jobs
checkjobs- Add, remove, or list ECS Vault
Operation Tracking Logic
ECS AirGap tracks running operations that require the Vault to remain open.
- The pre-script is skipped if the Vault is already open.
- The post-script runs only after the final active operation completes.
- This prevents unnecessary interface toggling.
Maintenance Window
A maintenance window keeps the network open for a defined time period even if no jobs are running.
Open Vault for a Fixed Interval:
ecactl ecssync openvault --interval 10
Check Vault Status:
ecactl ecssync checkopen
This displays:
- Remaining maintenance window time
- Active operations that require the Vault to stay open