How Knocknoc Works

Keep ports closed and services hidden until users log in. Knocknoc dynamically updates access controls, eliminating attack surfaces while keeping your existing architecture intact.

SSH

Knocknoc dynamically adds user IPs to your IPTables/IPSet allow list ā€” only after central authentication. Enjoy zero network exposure with just-in-time firewall control tied to MFA or your identity platform.

Hosted Apps

Eliminate direct internet access for legacy or high-risk systems. Knocknoc securely exposes them only after login, with options for layer-7 filtering or complete firewall-based access control.

Low Latency Access

Access services directly without VPNs or extra routing. Once authenticated, user IPs are allowed, enabling direct connections without centralized dependence or client configuration.

VPN & Firewall Devices

Secure management interfaces or protect VPN services from brute-force. Knocknoc reduces exposure to zero-day attacks by requiring central login before network exposure.

Features of Knocknoc

knocknochome How it Works

Simplify access control for your networks.

Leverage advanced authentication to strengthen security.

turnback How it Works
knocknocadmin How it Works

Simple to deploy, effortless to use.

How Knocknoc Eliminates Attack Surfaces

Knocknoc redefines security by dynamically implementing just-in-time network and application allow-listing. It doesnā€™t just mitigate risksā€”it makes attack surfaces disappear.

Knocknoc operates flexibly. It can dynamically orchestrate network access controls (e.g., managing firewall rules in real-time without exposing target machines) or function as an identity-aware gateway. You can choose the configuration that fits your needsā€”or combine both for maximum impact.

Hereā€™s how it works: when a user successfully logs in via Knocknoc’s centralized portal, the system dynamically provisions their IP address to the network’s access control layer. Knocknoc isnā€™t a proxy or VPNā€”itā€™s a control layer that you can host yourself or let us host for you. It supports all major access control systems, from commercial firewalls to public cloud providers, even offering custom scripting capabilities for unique setups.

Take a typical SSH bastion host:

  • Without Knocknoc: SSH is exposed to the entire internet, allowing any IP to probe the port, exposing the network and service stack to potential attacks.
  • With Knocknoc: An agent dynamically opens the SSH port only for the authenticated user’s IP addressā€”after theyā€™ve logged into the Knocknoc portal. Until then, no port or service is visible, effectively removing the attack surface.

But Knocknoc doesnā€™t stop there. If you need to shield VPN services on devices like Fortinet, Palo Alto, or Ivanti, Knocknoc can orchestrate their protection, removing them entirely from the internet until authenticated access is granted. Todayā€™s attack surfaces are potential vulnerabilities for tomorrowā€™s zero-day exploitsā€”Knocknoc ensures they never see the light of day.

Ready to dive deeper? Read our documentation here.

Does Knocknoc Replace My VPN?

It can, but why not have both? Knocknoc goes beyond VPN functionality while also operating alongside one.

In many cases, Knocknoc complements your existing VPN. While traditional VPNs often secure internal resources for staff, site-to-site connectivity, or administrative workloads like non-HTTP protocols, VPNs remain exposed to the internet. Knocknoc changes that. By orchestrating access, it ensures your VPN isnā€™t exposed until users first authenticate through the Knocknoc portal, dramatically reducing its attack surface, removing brute-force or attacks using stolen credentials, or vulnerabilities in the VPN software itself .

Knocknoc also shines where VPNs fall short. Itā€™s ideal for contractors, third parties, those outside your standard operating environment, or scenarios requiring faster, more direct access to resources ā€” like dev/test environments, legacy or custom web apps. Moving these behind a VPN is often too complex, so they stay exposed. Knocknoc provides the security you need without the hassle.

Unlike many VPN and ZTNA solutions, Knocknoc doesnā€™t require a client installation, keys or VPN configurations, making it far more approachable to users and diverse environments. Plus, it doesnā€™t broker or touch your network traffic, ensuring low latency and high security. No added complexity. No risk of third-party traffic observation. Just direct, secure access.

How Do I Deploy Knocknoc?

1

Deploy Your Knocknoc Server

Begin by setting up the Knocknoc server, which serves as the central hub for both users and admins. It provides the web interface, integrates with your identity provider. Knocknoc can be deployed on-premise within your network/hosted infrastructure or in our managed cloud.

2

Install Knocknoc Agents

Once your server is running, deploy one or more Knocknoc agents. These agents connect to the server, receive instructions to allow or deny IP addresses (both IPv4 and IPv6), and enforce access rules for backends within their reach based on user mappings.

3

Define Your Backends

  • Linux Firewalls: e.g., ipset, iptables, UFW, Shorewall, etc.
  • Firewall Appliances: Fortinet, Palo Alto, SonicWall, Ivanti, etc
  • Reverse Proxies: HAProxy, Nginx
  • Cloud ACLs: e.g., AWS Security Groups, Entra Conditional Access
  • Many more options

Need something more flexible? Knocknoc has you covered with a ā€œscriptā€ backend. This enables you to create custom integrations, such as controlling network interfaces, managing services like hostapd, enabling/disabling serial interfaces, or anything else you can think of.