Network Security

Network configuration and access control.


Private Network Deployment

Knot is designed for trusted environments. Deploy on private networks with access via VPN.

Recommendations:

  • Run knot servers on private network segments
  • Use VPN for remote developer access
  • Implement network segmentation
  • Use firewall rules to restrict access to knot ports

Public Exposure

If exposing knot to the internet:

  • Enable two-factor authentication (required)
  • Use strong passwords
  • Implement IP rate limiting
  • Monitor authentication logs
  • Consider additional authentication layers (SSO, OAuth)

Tunnel Server Security

The tunnel server exposes services publicly:

  • Run tunnel server on separate port from main interface
  • Only expose tunnel port to internet
  • Monitor tunnel usage and connections
  • Implement rate limiting on tunnel port
  • Use HTTPS for all tunnel traffic

Firewall Configuration

Restrict access to knot ports:

Internal network:

  • Port 3000: Web interface (allow from VPN)
  • Port 3010: Agent connections (allow from container network)

Public internet (if needed):

  • Port 3001: Tunnel server only

Block all other ports from public access.


Container Network Isolation

Isolate container networks:

  • Use separate networks for different environments
  • Implement network policies
  • Restrict container-to-container communication
  • Monitor network traffic