In order to simplify and streamline applying HTTPS/SSL to DX NetOps Network Flow Analysis and Application Delivery Analysis, the DX NetOps Support team wrote the ApplyHTTPS tool. The tool features multiple options to help get DX NetOps NFA or Application Delivery Analysis secured. You can download the ApplyHTTPS.zip file from this document. Please review the options below and see the additional notes for troubleshooting.
Latest Version: ApplyHTTPS 24.3.3 (November 22, 2024)
**For NFA versions 23.3.2+ you will have to provide a friendly DNS name / FQDN when prompted. This name you provide MUST be found in the certificate's Common Name or Subject Alternative Name**
**We now have a parameters.config file included which we can custom set the Default Web Site name, IIS, OData, Jetty SSO ports, and a SOAP HTTPS option if you don't use the defaults.
**You can now build certificate keystores and certificate requests (to be signed) with SAN's right from this tool with options 5 and 6.
**No longer supports NFA 9.3.3 to 9.3.7.
**For ADA versions 11.2+ you will have to provide a password to access the super database. The tool assumes the database user is "super".**
If you need help generating a signed certificate, please see: NFA HTTPS: How to generate and apply signed certificates
Network Flow Analysis 9.3.8 - 24.3.2
Application Delivery Analysis 11.0 to 11.2.1.27
To minimize the time it takes to manually set up SSL for IIS, Jetty SSO, Jetty RIB, OData, and SOAP Internal Services. (OData for NFA 21.2.4+ / SOAP for NFA 23.3.2+)
ApplyHTTPS.exe must be ran AS AN ADMINISTRATOR.
Using the tool:
1. Option 1: Apply HTTPS. This option was written to help users apply HTTPS to a server which has never seen an HTTPS setup before as well as an NFA server which has just been upgraded and had it's HTTPS settings overwritten.
What does the tool actually do after you select your option to apply HTTPS?
Above is an example of choosing a self-signed single certificate from the Windows Personal Store. I will break down what each step does into more detail.
Other options of the tool:
Option 2: Simply set NFA to use the default HTTP configurations for IIS, Jetty SSO, OData, and Jetty RIB servers.
Above is an example of choosing option 2 "HTTP Mode". I will break down what each step does into more detail.
Option 3: Import certs for LDAPS / SMTPS / or a Cert Authority cert update only.
This option can be used for importing new certificates into the Java CACERTS truststore. This can be used if you are updating a Certificate Authority certificate for LDAPS or SMTPS. This could also be helpful if you are trying to renew a Certificate Authority certificate with Java CACERTS for Jetty SSO or Jetty RIB. This option will also import it into the Windows Trust root certificate truststore.
Option 4: Set RIB/OData HTTPS Flag
This option simply sets a flag for the next time you run ApplyHTTPS option (1). This will set up RIB and OData HTTPS if it was not set up prior. This option is not needed if RIB/OData is already using HTTPS. Please make sure the root and intermediate certificates that are used for the NFA Server are imported into the Java CACERTS truststore on the NetOps Portal. You will have to make sure both the web site and data source are set for HTTPS/443 in NetOps Portal > Administration > Data Sources > Data Sources > Edit NFA.
Option 5 : Create a new signed certificate request and keystore
This new option is here to help make it easier to create new signed certificate requests. The tool will create an installdir\NFA\certs\ApplyHTTPS folder and drop a keystore file and CSR file when you complete the required steps. You can now provide your csr file to your certificate authority to be signed. Once they provide you a file back you can use option 6 to complete the keystore creation.
Option 6: Complete a signed certificate request
Use this option to import the signed certificate your certificate authority provided after using Option 5. The accepted formations are DER / Base 64 encoded PEM/CER/CRT files. Once the certificate is imported into your keystore file, you can use your pfx keystore file to apply to NFA. Use HTTPS option 1 (PFX option) or import to IIS and use the option 2 (IIS Import option).
Parameters.config:
If you use different ports for the IIS HTTP/HTTPS web site, SSO HTTPS, or OData you can set those defaults here. Please keep in mind, if you download a new version of this tool, you will have to update these parameters again. Another option is to disable SOAP HTTPS. We don't recommend that as it would keep port 80 active on the server for internal traffic.