Skip to main content

Allowlist (EDLs)

The Allowlist backend makes a list of active IP address grants available via the Knocknoc server API. This allows integration with appliances or clients that can be configured to poll a URL without the need for a Knocknoc agent to be deployed. This is sometimes known as "External Dynamic List" feature within firewalls.

Devices supporting EDLs (+ many others)

When to use an EDL?

EDLs are an easy way to passively integrate Knocknoc, however have some drawbacks.

On one hand they are an efficient way to add thousands of IP addresses to a consuming firewall device, on the other, the polling period can be minutes resulting in a poor user experience. This can be improved by utilizing the "passive+" mode within Knocknoc, which Palo Alto supports - read more here.

Pros
  • Any device that can poll for a list of IP addresses can integrate with Knocknoc - a good solution for unidirectional network environments or assets deep in an organisation.
  • Does not require a Knocknoc Agent to be installed whatsoever.
  • Many thousands of IP addresses can be managed with little impact on the orchestrated firewall.
Cons
  • Polling is typically time-based not event based, this may see a user waiting for access after logging in - depending on the poll interval supported by the infrastructure or appliance. 
  • Slow user login experience, given the above.
  • Doesn't benefit from "User ID" and other active capabilities the firewall may offer.

See below on how these can be incorporated into major vendors via external lists:

Other platforms are supported, however talk to us about our native/API integrations as these offer many benefits over the time-based polling approach.

Improving the EDL user-experience with "Passive+" mode

Knocknoc supports two modes of EDLs, Passive and Passive+.

Passive publishes the EDL for consumption, with the timing of consumption entirely up to the firewall's scheduled polling frequency.

Passive+ publishes the EDL, but also interactively hits an API on the firewall device requesting the EDL be refreshed. This shortens the time between publishing and consumption, resulting in a faster user/grant experience whilst still benefiting from the EDL approach.

Overall process

  1. Configure the Knocknoc Server: Set up a Passive Knoc.
  2. EDL Configuration: Configure the device to point the EDL to the Knocknoc distribution server.
  3. Security Policy Rule: Create a policy referencing the dynamic address and other relevant parameters to suit your intended firewall policy.

Knoc configuration

Create a Knoc under Firewalls/Appliances. Select Passive. Note that no Agent is required for this configuration as the Server is publishing/hosting the Allowlist.

Screenshot 2025-04-10 at 15.26.51.png

Select the method you'd like to use to protect your EDL. The two options are:

  1. Secret based - This requires a specific secret or key to be present when reading the EDL, as well as only allowing IP access control.
  2. IP based - This method ONLY restricts access to the EDL based on IP address. Only choose this option if you know what you're doing.

image.png

Be mindful of the IP address restrictions, by default it will allow the entire IPv4/IPv6 Internet.

At this point you may choose to encrypt the secret by pressing the yellow lock symbol image.png . This will make the secret unrecoverable, so ensure you have stored the secret securely if you do this.

image.png

You now need the unique and random URI published per-Knoc, to be added to the consuming firewall/system.

Copy/paste the URL from the popup in the previous step, or by navigating to Knocs > *Your Knoc* > EDL Security.

Screenshot 2026-03-19 at 13.56.39.png

Testing the EDL

You can test the EDL including authentication using Curl as outlined at Knocs > *Your Knoc* > EDL Security.

Screenshot 2026-03-19 at 14.00.58.png

Note that some vendors/platforms built-in testing functionality does not use the authentication information if provided (including Palo Alto), so you will always get an error. It is recommended you use the curl command above or other testing tool such as Postman that supports authentication.

User experience and EDLs

When your user logs in they will see "Published" alongside the relevant access item. This means their IP address or access information has been "published" and is awaiting consumption by the relevant firewall/system.

Once the firewall/system polls or "reads" the EDL, the state will change from Published to Read, signalling to the user their access has been established on the relevant back-end environment.

image.png image.png

Allowlist / EDL Security

EDLs are published for consumption on the Knocknoc server.

To access the EDL contents you must:

  1. Know the EDL UUID and randomly-generated path/location, and
  2. Provide a valid secret within the authentication header that matches the particular EDL (if the EDL was created with a secret), and
  3. Be in the IP source-address allowlist, configured for that EDL secret within Knocknoc.

Note that IP restrictions can be adjusted at Knocs > *Your Knoc* > EDL Security for a specific EDL.

Screenshot 2026-03-19 at 14.05.47.png