Recently Updated Pages
AWS (EC2) Security Groups
Knocknoc can easily connect to AWS using common utilities and IAM credentials, and update the all...
v8.5
Knocknoc 8.5 Knocknoc 8.5 delivers key improvements in usability, integrations, and security, ...
Custom Script
The "Custom Script" Knoc type is simply a script the agent can execute directly on the Agent mach...
IPsets with Shorewall
This is an example that lets you use Shorewall https://shorewall.org/index.html and IPsets to dyn...
IPSet (Linux Netfilter/IPTables)
IPSets are a powerful and highly efficient way of making a dynamic firewall on a normal Linux mac...
Agent installation
Agent requirements The agent will attempt to connect to your Knocknoc server using https on port...
Sophos (UTM)
The Sophos UTM device provides firewall and UTM capabilities. Note that this series of devices ar...
Sophos (SFOS/XGS)
The Sophos SFOS/XGS based devices provide advance firewall and UTM capabilities. This replaces th...
BYO PostgreSQL
Knocknoc server v8.5+ installs with a local installation of PostgreSQL by default. However, you m...
SAML with EntraID (Azure AD)
The following example assumes your Knocknoc instance is located at https://demo.knoc.cloud. Where...
SAML with Authentik
In this example our Authentik instance is hosted at https://auth.example.com/ and is running vers...
Auto-browse Knocs
The auto-browse option available within the Knoc configuration, automatically forwards the user a...
Licensing Knocknoc
Knocknoc licensing and pricing can be found on the Knocknoc website. Once you have obtained your...
How Knocknoc removes attack surface
Knocknoc enables you to remove the attack surface of systems, by enacting just-in-time network/ap...
Logging
Logging is important - we love logging. Because of this, we have included an easy to find, follo...
Palo Alto
Passive, Active or a combination Passive - Knocknoc's Allowlist features provides a passive inte...
v8.0
Knocknoc 8.0 Knocknoc 8.0 delivers a powerful set of updates, enhancing validation on connecting...
Click to grant/revoke
For additional security and temporal access control, Knoc's support a "click to grant" and "click...
VPNs, internal addresses and access
You may want to limit the ability to access a Knoc, depending on where your user is logging in to...
Knocknoc client (scriptable login)
To gain access to underlying networks and systems, end-users log in to Knocknoc interactively vi...