Connecting to a private network
To connect to an application on a private network, configure a private network connection in IBM® App Connect Enterprise as a Service. A private network agent encrypts data and sends it over the public internet.
About this task
When you create flows in IBM App Connect Enterprise as a Service, you might need to connect to software-as-a-service (SaaS) applications that are also cloud-based, or to application endpoints in your network. Similarly, you might deploy an IBM App Connect Enterprise Toolkit flow to App Connect Enterprise as a Service where the Toolkit flow connects to on-premises applications. To connect App Connect Enterprise as a Service securely to the applications in your network, you configure a private network connection by using a private network agent. The private network agent encrypts data and sends it over the public internet.
If you're deploying a Toolkit flow to App Connect
Enterprise as a Service, you set up
secure connectivity by configuring port forwarding. Port forwarding directs connections
from a local port to the remote port (and host) in the private network. To configure port forwarding
for your Toolkit flow, you must add a Private network agent configuration when you
deploy the flow. The deployed flow uses the Private network agent configuration to
connect to your on-premises applications.
On a paid VPC hours plan, you can also use AWS PrivateLink to create a private network connection between App Connect Enterprise as a Service and a Virtual Private Cloud in your Amazon Web Services (AWS) account without using the internet. AWS PrivateLink doesn't encrypt data, but connects to services on AWS without the use of public IP addresses or the internet. For more information, see Connecting to AWS services with AWS PrivateLink.
You enable access to a private network by using a switch server to route data, and a secure agent to connect to endpoints on the private network. The switch server runs in your IBM App Connect Enterprise as a Service instance. You can either download a secure agent to your computer, or you can configure an integration server in App Connect Enterprise as a secure agent. The following instructions describe these two methods of connecting to applications on a private network.
Configuring a private network connection by downloading a secure agent
About this task
To use a private network agent to connect to an application that is running on your network, you download an App Connect secure agent and a configuration file (switchclient.json). After you configure the switchclient.json file with connection details for your on-premises endpoints, you start the secure agent. When the connection is established, you specify the name of the private network connection when you connect to your endpoints in IBM App Connect Enterprise as a Service. You can use the same account (and the same private network connection) in multiple flows. You can also create multiple private network connections.
Procedure
To configure a private network connection, complete the following steps.
Results

Configuring a private network connection for a Toolkit flow by using an integration server
About this task
Private network agent configuration provides connectivity details that enable port
forwarding from a deployed Toolkit integration to the remote port and host of an application in a
private network. These instructions assume that you already imported your Toolkit flow in a BAR file
to your IBM App Connect Enterprise as a Service instance. For examples of how to configure port
forwarding for Toolkit flows, see the following tutorials:
Procedure
Results
Your deployed flow uses the private network connection to connect securely to endpoint applications in the private network.
- Used by
- You can see a list of the applications or runtimes that are using each private network
connection. Applications or endpoints in a private network and integrations that are deployed to
integration runtimes can use a private network connection. If a private network connection isn't
used by any applications or runtimes, the used-by value is not in use. For listed
applications and runtimes, click the information icon
to see details of the applications or
deployments that are using your connections. The hostname and port number is shown for each
application. The applications are also categorized as registered, not
registered, or not stored. To determine these categories, application accounts
with a completed Private network connection field are compared with the
endpoints in the switchclient.json file that is connected to the switch server. - If an endpoint is listed in the switchclient.json file and is used by an account, it is listed as registered.
- If an endpoint is used by an account but isn't listed in the switchclient.json file, it is listed as not registered.
- If an endpoint is listed in the switchclient.json file but isn't used by any accounts, it is listed as not stored.
- Status
- The status of a private network connection can be active or inactive.
A private network connection is active when both of the following conditions are met:
- The connection is being used by a connected on-premises secure agent.
- The list of accounts that are using the private network connection matches the list of endpoints in the switchclient.json file for the on-premises secure agent.
If you suspect that the data in the table is out of date, click Refresh
table
.
and click
for the private network
connection, click
in the
next to the new private network connection, then click