A security method that is used to authenticate a valid user and open a TCP/IP port to accept incoming packets.  Firewalls accept or deny packets before any user authentication is performed.  As a result, an attacker can gain entrance through the firewall.  With port knocking, a "secret" authentication sequence is required in order to gain access in the first place.
Log the Failures
A port knocking connection is made by executing a series of connection attempts to specific port numbers that are always kept closed.  The failed attempts are logged at the firewall, and a separate application monitors the failures.  When the monitor finds a sequence of failed attempts that matches the secret port sequence; for example: 103, 103, 100, 101, 103 (the "secret knock"), it opens the port and accepts the packets.  See 
TCP/IP port and 
port filtering.