NFA HTTPS: How to generate and apply signed certificates manually
book
Article ID: 278395
calendar_today
Updated On:
Products
CA Network Flow Analysis (NetQos / NFA)
Issue/Introduction
This document will walk through the recommended way to generate a signed certificate and how to apply them to the Network Flow Analysis component of DX NetOps manually.
ApplyHTTPS can now do all of the below steps automatically in ApplyHTTPS 23.3.8+ with options 5 and 6.
Environment
Windows Server 2012+ NFA 9.3.3+
Resolution
Open a command prompt on the NFA Console Server as an administrator from a folder called certs on root of you application drive. We will use the 'D' drive as an example.
Provide the nfaCertRequest.csr file to your certificate / security team.
Download the signed certificate from your security team. Also ask them or download the full chain of certificates which include a root and all intermediate certificates.
They should give you: 1 x signed server cert files with a .PEM/.CRT/.CER extension. 1 x root certificate with a .PEM/.CRT/.CER extension. 1 (or more) x intermediate / issuing certificate with a .PEM/.CRT/.CER extension.
Import the root certificate into your Java CACERTS truststore:
Open IIS and on the left side pane, select the server name option under, "Start Page".
In the middle of the IIS window you can search for and double click on the "Server Certificates" feature.
On the right side pane select, "Import", and select the D:/certs/keystore.pfx file. Enter the "changeit" password we earlier used to generate the keystore. Leave 'Personal Store' selected.
Download the latest NFA: ApplyHTTPS Tool from the bottoms of the linked doc and:
Download / copy to NFA Console and extract and run ApplyHTTPS.exe as admin. Select option (4) and then enter if you want to setup RIB/OData HTTPS. This requires the root and intermediate certificates to be installed in the NetOps Portal Java CACERTS truststore.
Select option (1) for HTTPS
Select option (2) for IIS option.
Select option (1) for Personal Store (assuming that is where you imported it to)
Select the right certificate and let the tool run.