QuotaGuard and n8n Integration Guide

    QuotaGuard and n8n Integration Guide

    QuotaGuard Static IPs allow your n8n workflows to send outbound HTTP requests through a load-balanced pair of static IP addresses. Once configured, you can use QuotaGuard’s IPs to connect to firewalled APIs, enterprise databases, and services that require IP allowlisting.

    You do not need QuotaGuard for internal n8n operations or connections to services that don’t require IP whitelisting. QuotaGuard is specifically for reaching external services that block requests from unknown IP addresses.

    Why n8n Workflows Get Blocked

    When you run a workflow on n8n Cloud or a self-hosted instance on a cloud provider, your outbound traffic comes from shared, rotating IP addresses. These IPs are often flagged by:

    • Enterprise firewalls and WAFs (Cloudflare, Akamai)
    • Corporate APIs with IP allowlisting requirements
    • Google Workspace Context-Aware Access policies
    • Financial services and healthcare APIs with strict access controls
    • Database providers like MongoDB Atlas or Amazon RDS

    The result is 403 Forbidden or ECONNREFUSED errors that have nothing to do with your workflow logic. Your API keys are valid. Your code is correct. The target service is simply blocking cloud IP ranges.

    QuotaGuard gives your n8n workflows a fixed, verifiable identity that partners can add to their firewall allowlists once.

    Getting Started

    After creating a QuotaGuard account, you will be redirected to your dashboard where you can find your proxy credentials and static IP addresses.

    Choose the right proxy region: Select a QuotaGuard region close to your n8n deployment to minimize latency:

    n8n Hosting LocationRecommended QuotaGuard Region
    US (AWS, DigitalOcean)US-East
    EuropeEU
    Asia-PacificAP-Southeast or AP-Northeast

    Your proxy URL will look like this:

    http://username:password@us-east-static-01.quotaguard.com:9293
    

    This URL contains your credentials and the proxy hostname. You’ll use this to route n8n requests through your static IPs.

    Finding Your Static IPs: Your two static IPs are displayed in the QuotaGuard dashboard. Both IPs are active simultaneously for high availability. Add both to any firewall allowlists you’re configuring on the target service side.

    Configuring n8n

    n8n supports proxy configuration at multiple levels depending on your deployment type and needs.

    The simplest approach is configuring the proxy directly in individual HTTP Request nodes. This works for both n8n Cloud and self-hosted instances.

    Step 1: Open your HTTP Request node in the n8n workflow editor.

    Step 2: Click Add Option at the bottom of the node configuration panel.

    Step 3: Select Proxy from the options list.

    Step 4: Enter your QuotaGuard proxy URL:

    http://username:password@us-east-static-01.quotaguard.com:9293
    

    Step 5: Execute your workflow. All requests from this node will now route through your static IP.

    This method is ideal when:

    • You’re using n8n Cloud
    • You only need static IPs for specific API calls
    • Different nodes need different proxy configurations

    Option 2: n8n Credentials (Reusable Proxy Configuration)

    For workflows where multiple HTTP Request nodes need the same proxy, you can store your QuotaGuard credentials as an n8n credential and reference it across nodes.

    Step 1: Go to Settings > Credentials in your n8n instance.

    Step 2: Click Add Credential and select HTTP Request.

    Step 3: Configure the credential with your proxy details. In the Additional Options, enable Proxy and enter your QuotaGuard URL.

    Step 4: In your HTTP Request nodes, select this credential instead of entering the proxy URL manually each time.

    Option 3: Global Environment Variables (Self-Hosted Only)

    For self-hosted n8n instances, you can configure the proxy globally so all outbound HTTP requests route through QuotaGuard automatically.

    Docker Compose:

    Add these environment variables to your docker-compose.yml:

    version: '3'
    services:
      n8n:
        image: n8nio/n8n
        environment:
          - HTTP_PROXY=http://username:password@us-east-static-01.quotaguard.com:9293
          - HTTPS_PROXY=http://username:password@us-east-static-01.quotaguard.com:9293
          - NO_PROXY=localhost,127.0.0.1
        # ... rest of your configuration
    

    npm/Node.js Installation:

    Set the environment variables before starting n8n:

    export HTTP_PROXY="http://username:password@us-east-static-01.quotaguard.com:9293"
    export HTTPS_PROXY="http://username:password@us-east-static-01.quotaguard.com:9293"
    export NO_PROXY="localhost,127.0.0.1"
    n8n start
    

    Important: The NO_PROXY variable prevents internal n8n traffic from routing through the proxy. Without it, internal health checks and local connections may fail.

    Option 4: n8n Desktop App

    The n8n desktop application supports proxy configuration through the HTTP Request node options (Option 1 above). You can also run a local tunnel using QuotaGuard’s qgtunnel wrapper for development testing.

    For desktop testing with the proxy:

    1. Configure the proxy in your HTTP Request node as described in Option 1
    2. Or set system-wide proxy environment variables before launching the desktop app

    Database Connections (SOCKS5)

    For non-HTTP protocols like PostgreSQL, MySQL, or MongoDB connections from n8n, use QuotaGuard’s SOCKS5 proxy with QGTunnel.

    When to Use SOCKS5

    Standard HTTP proxies only handle HTTP/HTTPS traffic. If your n8n workflow uses:

    • PostgreSQL node
    • MySQL node
    • MongoDB node
    • SSH node
    • FTP node
    • Any raw TCP connection

    You’ll need SOCKS5 proxying.

    Setting Up QGTunnel for Self-Hosted n8n

    Step 1: Download QGTunnel to your n8n server:

    curl https://s3.amazonaws.com/quotaguard/qgtunnel-latest.tar.gz | tar xz
    

    Step 2: Configure your tunnel in the QuotaGuard dashboard:

    Navigate to Settings > Setup > Tunnel > Create Tunnel.

    Example PostgreSQL configuration:

    SettingValue
    Remote Destinationtcp://your-database.example.com:5432
    Local Port5432
    Transparenttrue
    Encryptedfalse

    Step 3: Start n8n with QGTunnel:

    bin/qgtunnel n8n start
    

    Or in Docker Compose:

    version: '3'
    services:
      n8n:
        image: n8nio/n8n
        entrypoint: ["/app/bin/qgtunnel", "n8n"]
        environment:
          - QUOTAGUARDSTATIC_URL=http://username:password@us-east-static-01.quotaguard.com:9293
        volumes:
          - ./bin:/app/bin
          - ./vendor:/app/vendor
    

    With transparent mode enabled, your n8n database nodes can connect to the original hostname while traffic routes through the tunnel transparently.

    n8n Cloud Database Limitations

    n8n Cloud does not support QGTunnel or SOCKS5 proxy configuration. If you need static IPs for database connections on n8n Cloud, consider:

    1. Using a self-hosted n8n instance with QGTunnel
    2. Creating an API wrapper service that proxies database queries through HTTP
    3. Using cloud database providers that support VPC peering instead of IP allowlisting

    Common Use Cases

    Connecting to Firewalled APIs

    Many enterprise APIs require IP allowlisting. Configure the proxy in your HTTP Request node, then provide your QuotaGuard static IPs to the API provider for their allowlist.

    Google Workspace Context-Aware Access

    If your organization uses Google Workspace with Context-Aware Access policies, n8n Cloud requests may be blocked because they come from unauthorized IPs. Route your Google API requests through QuotaGuard, then add your static IPs to the Context-Aware Access policy.

    Webhook Receivers with IP Restrictions

    Some services only accept webhooks from known IP addresses. Configure your outbound webhook calls through QuotaGuard, then add your static IPs to the destination service’s allowlist.

    Avoiding Rate Limiting by Cloud IP Reputation

    Cloud provider IP ranges are sometimes rate-limited more aggressively because they’re associated with automated traffic. QuotaGuard’s dedicated static IPs have a cleaner reputation profile.

    Testing Your Implementation

    Create a simple workflow to verify your proxy configuration:

    Step 1: Add an HTTP Request node.

    Step 2: Set the URL to:

    https://ip.quotaguard.com
    

    Step 3: Configure the proxy option with your QuotaGuard URL.

    Step 4: Execute the workflow.

    Expected response:

    {"ip":"52.34.188.175"}
    

    The returned IP should match one of your two static IPs shown in the QuotaGuard dashboard. Run the workflow multiple times to see both IPs in action (load-balanced).

    Workflow Testing Example

    Here’s a complete test workflow structure:

    1. Manual Trigger - Start the workflow manually
    2. HTTP Request - Call https://ip.quotaguard.com with proxy configured
    3. Set - Extract the IP from the response
    4. IF - Check if the IP matches your expected QuotaGuard IPs

    This gives you a reusable workflow to verify proxy configuration is working.

    Latency Considerations

    Using QuotaGuard adds a network hop to your requests:

    ConfigurationAdded Latency
    Same region (n8n US + QuotaGuard US-East)10-20ms
    Cross-region50-100ms

    For high-volume or latency-sensitive workflows, select a QuotaGuard region that matches your n8n hosting location.

    Troubleshooting

    403 Forbidden Errors

    If you’re still seeing 403 errors after configuring the proxy:

    1. Verify the proxy is active: Test with ip.quotaguard.com to confirm traffic routes through QuotaGuard
    2. Check the destination allowlist: Ensure both of your QuotaGuard static IPs are added to the target service’s firewall
    3. Confirm authentication: Double-check your proxy URL credentials are correct

    See our detailed guide: How to Fix 403 Forbidden Errors in n8n HTTP Request Nodes

    407 Proxy Authentication Required

    Your proxy credentials are incorrect. Verify your username:password in the proxy URL matches your QuotaGuard dashboard credentials.

    Connection Timeout

    1. Check that your n8n instance can reach external networks
    2. Verify the QuotaGuard proxy hostname is correct
    3. Ensure no firewall rules are blocking outbound connections to port 9293

    Wrong IP Address in Response

    The proxy URL may not be configured correctly in your HTTP Request node:

    1. Check that you entered the full URL including the protocol (http://)
    2. Verify the proxy option is enabled in the node
    3. Try creating a new HTTP Request node with fresh configuration

    n8n Cloud Proxy Not Working

    n8n Cloud supports proxy configuration only at the HTTP Request node level (Option 1). Global environment variables are not available on n8n Cloud.

    If the node-level proxy isn’t working:

    1. Ensure you’re configuring the Proxy option, not Headers
    2. Double-check the URL format includes credentials
    3. Test with a simple ip.quotaguard.com call first

    Nodes Other Than HTTP Request

    Most n8n app nodes (Slack, Gmail, Salesforce, etc.) make HTTP requests internally but don’t expose proxy configuration. For these nodes:

    • Self-hosted: Use global environment variables (Option 3) to proxy all traffic
    • n8n Cloud: These nodes cannot be proxied. Contact the service provider to discuss IP allowlisting options or consider using the HTTP Request node with the service’s raw API instead

    QuotaGuard Static vs QuotaGuard Shield

    QuotaGuard offers two products for static IPs:

    FeatureQuotaGuard StaticQuotaGuard Shield
    ProtocolHTTP/SOCKS5HTTPS/SOCKS5 over TLS
    EncryptionStandard proxySSL Passthrough (E2EE)
    Best forGeneral API accessHIPAA, PCI-DSS, regulated data
    Starting price$19/month$69/month

    For most n8n workflows, QuotaGuard Static provides everything you need. Choose Shield if you’re handling protected health information (PHI), payment card data, or have specific compliance requirements.


    Ready to Get Started?

    Get in touch or create a free trial account.

    Get QuotaGuard for n8n

    Read: How to Fix 403 Forbidden Errors in n8n

    View n8n Integration Features


    Ready to Get Started?

    Get in touch or create a free trial account