AvantGuard - DNSFilter icon

AvantGuard - DNSFilter

AvantGuard - DNSFilter

Actions277

Overview

This node operation fetches aggregated traffic report statistics related to total applications and networks. It is designed to retrieve detailed network traffic data filtered by various criteria such as user agents, application categories, networks, organizations, and time ranges. This node is useful for network administrators or security analysts who want to analyze network usage patterns, monitor application traffic, or generate security reports based on traffic data.

Practical examples include:

  • Generating a report of all blocked application traffic within a specific organization over the past week.
  • Filtering traffic stats by certain user agents or MAC addresses to identify unusual activity.
  • Obtaining allowed traffic statistics for specific application categories during business hours.

Properties

Name Meaning
Additional Query Parameters Optional filters to refine the traffic report query. Includes:
- Agent Ids: Comma separated list of user agent UUIDs (defaults to all)
- Agent Types: Comma separated list of user agent types (defaults to all)
- Application Category Ids: Comma separated list of application category IDs (defaults to all)
- Application Ids: Comma separated list of application IDs (defaults to all)
- Collection Ids: Comma separated list of collection IDs (defaults to all)
- From: Report UTC lower limit datetime in ISO format (defaults to current UTC minus 1 day)
- Mac Addresses: Comma separated list of MAC addresses without colons (defaults to all)
- Name: Filter networks whose name contains this value
- Nat Ips: Comma separated list of NAT IPs (valid integers 101 to 106, defaults to all)
- Network Ids: Comma separated list of network IDs (defaults to all)
- Organization Ids: Comma separated list of organization IDs (defaults to user org ID)
- Private Ip: Private LAN IP
- Private Ip From: Private LAN IP range lower limit
- Private Ip To: Private LAN IP range upper limit
- Security Report: Boolean to filter threats report (true/false), if empty returns both
- Source: Traffic source filter with options: All, Networks, Agents, Proxies (defaults to All)
- To: Report UTC upper limit datetime in ISO format (defaults to current UTC)
- Type: Type of report with options: All, Allowed, Blocked (defaults to All)
- User Ids: Comma separated list of local user IDs (defaults to all)

Output

The node outputs JSON data containing the aggregated traffic report statistics based on the applied filters. The structure typically includes metrics about total applications and networks traffic, such as counts of allowed or blocked traffic, categorized by the specified parameters.

If binary data output is supported, it would represent raw report files or downloadable content, but this is not indicated in the provided code or properties.

Dependencies

  • Requires an API key credential for authentication to the external traffic reporting service.
  • The node uses a base URL endpoint https://api.dnsfilter.com for making requests.
  • Proper configuration of the API key credential in n8n is necessary for successful execution.

Troubleshooting

  • Common issues:
    • Invalid date formats for "From" and "To" parameters may cause the API to reject the request or return no data.
    • Providing incorrect or non-existent IDs (e.g., agent_ids, network_ids) will result in empty or partial results.
    • Missing or invalid API key credential will cause authentication errors.
  • Error messages:
    • Authentication failures usually indicate missing or invalid API credentials; verify and reconfigure the API key.
    • Validation errors on query parameters suggest checking the formatting and allowed values, especially for date/time and comma-separated lists.
    • Network or connectivity errors require checking internet access and API endpoint availability.

Links and References

Discussion