Recently Updated Pages
Moving from SQLite to PostgreSQL
If you installed Knocknoc Server before version 8.5 (September 2025), your instance is likely usi...
AWS WAF Ipset
Below is a concise guide for a sysadmin (or developer) to set up and configure AWS WAF with a cus...
VPN and ransomware
Use case: Removing VPN ransomware risk from stolen credentials A mid-size business relied on Inte...
Channels and Beta
If you're after the very latest features or changes, and you know what you're doing - below is ho...
Package Repository Key expired
Debian distros (Ubuntu etc) If you are getting this error: Failed to fetch https://packages.knock...
Allowlist/EDL access
Allowlists or External Dynamic Lists (EDLs) served from Knocknoc require a secret for access, alo...
Local Authentication (MFA included)
Knocknoc supports local users in addition to SAML/LDAP. Simply add a user, with a username and pa...
Redirecting Users
Knocknoc supports two ways to redirect the user to a specific site from the Knocknoc Dashboard. T...
Click to grant/revoke
For additional security and temporal access control, Knocs support a "click to grant" and "click ...
Grant duration
Users are assigned a default "grant period" (in minutes), either within Knocknoc for local users,...
Sophos (SFOS/XGS)
The Sophos SFOS/XGS based devices provide advanced firewall and UTM capabilities. This replaces t...
Remote desktop, simple small business example
A small business sought a cost-effective, secure remote access solution for their remote desktop ...
IPsets with UFW
This is an example that lets you use UFW (https://wiki.ubuntu.com/UncomplicatedFirewall) and IPse...
Apache Webserver
Apache 2.4 and above have slightly different ACL syntax, so this page covers how you can use Knoc...
Admins
Admins in Knocknoc can login to /admin on their Knocknoc server, however they can't be granted AC...
Logging
Logging is important - we love logging. Because of this, we have included an easy to find, follow...
Agent installation
The Orchestration Agent runs on a server to control network access for users on their behalf. Thi...
Knocknoc client (scriptable login)
To gain access to underlying networks and systems, end-usersĀ log in to Knocknoc interactively vi...
Grant and revoke process
The granting and revoking of access by Knocknoc occurs on a number of events, including: User lo...
Additional client IP addresses
Capturing additional client IP addresses A client may exhibit behaviour where multiple IP address...