- Basics
- About Knox
- Knox licenses
- Knox white paper
- Sign up for Samsung Knox
- Latest release notes
- General Knox FAQ
- General Knox KBAs
- Submit a support ticket
- User Acceptance Testing
- For IT admins
- Knox Admin Portal
- Knox Suite
- Knox Platform for Enterprise
- Introduction
- How-to videos
- Before you begin
- Get started with UEMs
- Introduction
- Blackberry UEM
- Citrix Endpoint Management
- FAMOC
- IBM MaaS360
- Microsoft Intune
- MobileIron Cloud
- MobileIron Core
- Samsung Knox Manage
- SOTI MobiControl
- VMware Workspace ONE UEM
- Knox Service Plugin
- Release notes
- Migrate to Android 11
- FAQs
- Troubleshoot
- KBAs
- Knox Mobile Enrollment
- Knox Configure
- Mobile
- Wearables
- Shared Device
- FAQ
- KBAs
- Knox Capture
- Introduction
- How it works
- How-to videos
- IT admins: Get started
- Getting started with Knox Capture
- Step 1: Launch Knox Capture
- Step 2: Create a scanning profile
- Step 3: Select apps and activities
- Step 4: Configure the scanner
- Step 5: Set keystroke output rules
- Step 6: Test apps in your configuration
- Step 7: Share your configuration
- Step 8: Deploy Knox Capture in Managed mode
- End users: Get started
- Features
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox Asset Intelligence
- Knox Manage
- Introduction
- How-to videos
- Get started
- Video: Getting started with Knox Manage
- Integration with Managed Service Provider
- Access Knox Manage
- Configure basic environments
- Create user accounts
- Create groups
- Create organization
- Set up devices and profiles
- Create a new profile
- Assign profiles to groups and organizations
- Enroll devices
- Shared Android device quickstart
- Non-shared Android device enrollment quickstart
- Android Management API device enrollment quickstart
- Apple User Enrollment quickstart
- View device information
- Apply profiles to organizations
- Set up Knox Manage deployment with a Knox Suite license
- Manage Chromebooks
- Manage Android devices with the Android Management API
- Manage Shared iPads
- Configure
- Licenses
- Organization
- Users
- Sync user information
- Groups
- Devices
- Content
- Applications
- Profile
- Knox E-FOTA
- Certificates
- Advanced settings
- Monitor
- Kiosk devices
- Knox Remote Support
- Active Directory
- Microsoft Exchange
- Mobile Admin
- Appendix
- Release notes
- Features
- FAQ
- KBAs
- Knox E-FOTA
- Introduction
- How-to videos
- Get started
- Features
- EMM integration
- Appendix
- Release notes
- FAQ
- KBAs
- Troubleshoot
- Knox E-FOTA On-Premises
- Legacy Knox E-FOTA products
- Knox Guard
- Introduction
- How-to video
- Get started
- Using Knox Guard
- Dashboard
- Manage devices
- Device management
- Accept or reject devices
- Upload devices
- Delete devices
- Complete device management
- Send notifications
- Enable or disable SIM control
- Download devices as CSV
- View device log
- View device deletion log
- Start and stop blinking reminder
- Lock and unlock devices
- Update lock message
- Send relock timestamp
- Turn on/off relock reminder
- Manage policies
- Manage licenses
- Manage resellers
- Manage admins and roles
- Activity log
- Knox Deployment App
- Release notes
- FAQ
- KBAs
- Support
- Knox Guard REST API
- Samsung Care+ for Business
- For Knox Partners
- Knox Deployment Program
- Knox MSP Program
Firewall
Set up basic firewall
-
Under Firewall configuration profiles, enter a profile name. For
example
Firewall_config1
. - Under Allow rules > Allow rule, fill out the required information for the data you want to allow through the firewall, for example, any connection originating from your enterprise intranet.
-
Under Deny rules > Deny rule, fill out the required
information for the data you want to block through the firewall, for
example, popular social media sites.NOTE—To ensure devices are not locked out of your network, give the following apps explicit allow rules. You must always set these allow rule exceptions if you are using DENY ALL rules.
- UEM Agent package—Contact your UEM for details.
- KSP package—
com.samsung.android.knox.kpu
- Google services—
com.android.vending, com.google.android.gms
- In your UEM, save the configuration.
- Under Firewall policy, turn on Enable Firewall controls.
-
Under Name of firewall configuration to user, enter the name of
the profile you want to use. In this example we use the profile we
created previously, namely,
Firewall_config1
. - In your UEM, save the profile and push it to a device.
Industry example
This example shows you how to configure a firewall that only allows traffic through for your UEM agent and internal intranet.
-
Under Firewall configuration profiles, enter a profile name. For
example,
Firewall_internalOnly
. - Under Allow rules > Allow rule, fill out the required information to allow traffic for your UEM agent.
- Under Allow rules > Allow rule, fill out the required information to allow traffic for intranet.
- Test to make sure the previous configurations are working before you proceed to the next step.
-
Under Deny rules > Deny rule, under
Hostname (IP or IP range) type
*
to use a wild card to block all other incoming traffic. - In your UEM, save the profile and push it to a device.