How Knocknoc Works
Keep ports closed and services hidden until users log in. Knocknoc dynamically updates access controls, eliminating attack surfaces while keeping your existing architecture intact.
SSH
Knocknoc dynamically adds user IPs to your IPTables/IPSet allow list ā only after central authentication. Enjoy zero network exposure with just-in-time firewall control tied to MFA or your identity platform.
Hosted Apps
Eliminate direct internet access for legacy or high-risk systems. Knocknoc securely exposes them only after login, with options for layer-7 filtering or complete firewall-based access control.
Low Latency Access
Access services directly without VPNs or extra routing. Once authenticated, user IPs are allowed, enabling direct connections without centralized dependence or client configuration.
VPN & Firewall Devices
Secure management interfaces or protect VPN services from brute-force. Knocknoc reduces exposure to zero-day attacks by requiring central login before network exposure.
Features of Knocknoc

Simplify access control for your networks.
- Not a VPN, Not a Proxy: A unique approach to network control infrastructureānovel, elegant, and highly effective.
- Use Your Existing Infrastructure: No additional devices, routes or latency; complete control over direct network access without relying on VPN-like services.
- Timed Access Control: Grant access only when users are authenticated and within predefined timeframes, access management made simple.
Leverage advanced authentication to strengthen security.
- Zero Trust: Ensure no one gains access without authentication. Knocknoc simplifies the zero-trust modelājust āKnoc first.ā
- Enhanced Security: Zero your attack surface and eliminate brute force attempts with cutting-edge authentication processes.
- Authenticated Integration: Compatible with platforms like Okta, Entra, Google, Jumpcloud, or as a standalone system, with built-in MFA for added protection.


Simple to deploy, effortless to use.
- Seamless Integration: Easily add SAML and MFA to non-native applications like SSH and raw video feedsāno added costs, all included.
- Visibility and Audit Trail: Full visibility into authenticated users, access windows, and durations with a robust activity audit trail.
- Highly extensibile: Integrate authorized logins with ACLs, transforming Identity Groups into ACLs across your systems.
How Knocknoc Eliminates Attack Surfaces
Knocknoc redefines security by dynamically implementing just-in-time network and application allow-listing. It doesnāt just mitigate risksāit makes attack surfaces disappear.
Knocknoc operates flexibly. It can dynamically orchestrate network access controls (e.g., managing firewall rules in real-time without exposing target machines) or function as an identity-aware gateway. You can choose the configuration that fits your needsāor combine both for maximum impact.
Hereās how it works: when a user successfully logs in via Knocknoc’s centralized portal, the system dynamically provisions their IP address to the network’s access control layer. Knocknoc isnāt a proxy or VPNāitās a control layer that you can host yourself or let us host for you. It supports all major access control systems, from commercial firewalls to public cloud providers, even offering custom scripting capabilities for unique setups.
Take a typical SSH bastion host:
- Without Knocknoc: SSH is exposed to the entire internet, allowing any IP to probe the port, exposing the network and service stack to potential attacks.
- With Knocknoc: An agent dynamically opens the SSH port only for the authenticated user’s IP addressāafter theyāve logged into the Knocknoc portal. Until then, no port or service is visible, effectively removing the attack surface.
But Knocknoc doesnāt stop there. If you need to shield VPN services on devices like Fortinet, Palo Alto, or Ivanti, Knocknoc can orchestrate their protection, removing them entirely from the internet until authenticated access is granted. Todayās attack surfaces are potential vulnerabilities for tomorrowās zero-day exploitsāKnocknoc ensures they never see the light of day.
Ready to dive deeper? Read our documentation here.
Does Knocknoc Replace My VPN?
It can, but why not have both? Knocknoc goes beyond VPN functionality while also operating alongside one.
In many cases, Knocknoc complements your existing VPN. While traditional VPNs often secure internal resources for staff, site-to-site connectivity, or administrative workloads like non-HTTP protocols, VPNs remain exposed to the internet. Knocknoc changes that. By orchestrating access, it ensures your VPN isnāt exposed until users first authenticate through the Knocknoc portal, dramatically reducing its attack surface, removing brute-force or attacks using stolen credentials, or vulnerabilities in the VPN software itself .
Knocknoc also shines where VPNs fall short. Itās ideal for contractors, third parties, those outside your standard operating environment, or scenarios requiring faster, more direct access to resources ā like dev/test environments, legacy or custom web apps. Moving these behind a VPN is often too complex, so they stay exposed. Knocknoc provides the security you need without the hassle.
Unlike many VPN and ZTNA solutions, Knocknoc doesnāt require a client installation, keys or VPN configurations, making it far more approachable to users and diverse environments. Plus, it doesnāt broker or touch your network traffic, ensuring low latency and high security. No added complexity. No risk of third-party traffic observation. Just direct, secure access.
How Do I Deploy Knocknoc?
1
Deploy Your Knocknoc Server
2
Install Knocknoc Agents
Once your server is running, deploy one or more Knocknoc agents. These agents connect to the server, receive instructions to allow or deny IP addresses (both IPv4 and IPv6), and enforce access rules for backends within their reach based on user mappings.
3
Define Your Backends
- Linux Firewalls: e.g., ipset, iptables, UFW, Shorewall, etc.
- Firewall Appliances: Fortinet, Palo Alto, SonicWall, Ivanti, etc
- Reverse Proxies: HAProxy, Nginx
- Cloud ACLs: e.g., AWS Security Groups, Entra Conditional Access
- Many more options
Need something more flexible? Knocknoc has you covered with a āscriptā backend. This enables you to create custom integrations, such as controlling network interfaces, managing services like hostapd, enabling/disabling serial interfaces, or anything else you can think of.