Accept inbound traffic on the Secure Agent machine so that cluster nodes can communicate with the Secure Agent. Some mapping functionality requires cluster nodes to access the Secure Agent, such as the Sequence Generator transformation, certain Data Quality transformations, and data adapters that encrypt and decrypt data.
Complete the following tasks:
Add an inbound rule to the security group that is attached to the Secure Agent machine.