Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

17 total results found

User Guide

User Guide

Welcome to the Knocknoc User Guide. This will cover basic operations including logging in, logging out and troubleshooting. If you're looking for information on installing or administering Knocknoc, please check out the Admin Guide. Logging Into Knocknoc Kn...

Use Cases (overview)

Admin Guide Use Cases

Knocknoc use cases Knocknoc is extremely versatile and can enable just in time network access control and solve many use cases across various industries and technologies. SSH Bastion hosts: Network based IP allowlisting: add MFA, link in your IdP, remove t...

Server Installation

Admin Guide Setup Guides

For the admin who knows what they need and needs a fast way to get it, you can use this command to setup and install your Knocknoc server very quickly.  curl -sSL https://packages.knocknoc.io/setup/setup_knocknoc.sh | bash  The installer runs on Debian, Ubun...

Agent Installation

Admin Guide Setup Guides

For the admin who know what they need, and needs a fast way to get it, you can use this command to setup and install knocknoc-agent very quickly. Browse to https://YourKnocknoc.url/admin and login with the knocknoc-admin user. Click on Agents then Create A...

Web applications (layer-7 filtering)

Admin Guide Use Cases

There are various options for protecting your web application using Knocknoc Local Linux firewall orchestration on the host (eg: using IPSets) In-line firewall/control device orchestration (Fortigate, etc), via an adjacent Knocknoc Agent deployment HAprox...

HAProxy

Admin Guide Backends

HAProxy is a fantastic reverse proxy with a massive amount of features. Knocknoc has supported HAProxy for years, and integrates with it natively. HAProxy can be a little confusing at first due to its wide array of options and implementations, but for now we'l...

AWS (EC2) Security Groups

Admin Guide Backends

Knocknoc can easily connect to AWS using common utilities and IAM credentials, and update the allowed IP dynamically. The agent ships with a script built in for this already, which requires credentials placed where the agent can read them.  Backend for AWS Se...

Script Any Arbitrary Backend

Admin Guide Backends

The "script" backend type is simply a script the agent can execute that takes a fixed set of arguments. Action: add (to grant access), del(to revoke access) or flush(to empty/reset the whole ACL); ACL (or "set name"): the name of the ACL for validation, or...

IPSet (Linux Netfilter/IPTables)

Admin Guide Backends

IPsets are a powerful and highly efficient way of making a dynamic firewall on a normal Linux machine. A native feature of the Netfilter code, an IPset is an in-memory list of IPs, that can be referenced in any fireawall rules. Knocknoc can add and remove IPs...

VOIP

Admin Guide Use Cases

Having roaming users be able to use a handset from home, and protect your PABX from brute force attacks and other threats is a great feature of Knocknoc. Users are able to have a handset on their home internet connection, and just login for the day, and their ...

AWS Infrastructure

Admin Guide Use Cases

Knocknoc ships with a script for updating security groups in AWS. Checkout the backend documentation here: https://docs.knocknoc.io/books/admin-guide/page/aws-ec2-security-groups This includes an IAM role for updating the security group.  This approach allow...

Video

Admin Guide Use Cases

Streaming low-latency video is a challenge for firewalls and VPNs, and Knocknoc is an excellent solution. The ipset backend script is a great tool to allow things like SRT or RTMP to select IPs.  The Knocknoc demo includes an RTMP example, where the backend ...

Remote Desktop, simple small business example

Admin Guide Use Cases

A small business sought a cost-effective, secure remote access solution for their remote desktop servers.They relied on a Linux-based edge firewall, using port forwarding to direct RDP traffic to internal machines. Although they utilized high, non-standard por...

SSH

Admin Guide Use Cases

Use Case: Eliminating SSH Attack Surface in a Distributed Environment A large distributed enterprise needed to eliminate the attack surface of its Internet-facing SSH servers - without adding latency, changing its network architecture, or compromising on secu...

v6.0.0

Changelog and Roadmap

We're excited to announce the release of Knocknoc 6, a major leap forward in attack surface reduction, implemented at speed. This release brings a host of new features and improvements that make Knocknoc even more efficient, user-friendly, and adaptable withi...

Allowlist

Admin Guide Backends

The Allowlist backend makes a list of active IP address grants available via the Knocknoc server API. This allows integration with appliances or clients that can be configured to poll a URL without the need for a Knocknoc agent to be deployed. This is sometime...

SAML with Keycloak

Admin Guide Authentication

Keycloak supports multiple authentication realms, so you must first select the appropriate realm for your organisation. Do not make any of the below changes in the Keycloak/master realm. In this example our realm is called "Acme" and Keycloak is hosted at htt...