Some types of security scan tools may scan virtual machines (including appliances such as VCF Operations for Networks Collector nodes, among others), and these scans may produce alerts such as "X.509 Certificate Subject CN Does Not Match the Entity Name".
NOTE: VCF Operations for Networks was formerly named Aria Operations for Networks (AON), and prior to that was named vRealize Network Insight (vRNI).
VCF Operations for Networks
In the VCF Operations for Networks environment, the appliances are deployed with "default" SSL certificates.
In clustered deployments, and/or where multiple collector nodes have been deployed, the scan tool may produce the alert because the "default" certificate(s) would be based on the same generic hostname.
Other than seeking an exception from the security team for the Collector appliance IP addresses, there are two options that can be taken.
Option 1: Request a custom certificate for each Collector appliance from your CA (certificate authority) and then apply the delivered customer certificate to each Collector appliance.
Option 2: Generate and then apply a self-signed certificate for each Collector appliance.
Below are the steps for Option 2 (These must be performed on each Collector appliance).
openssl genrsa -out vnera.com.key 2048openssl req -new -key vnera.com.key -x509 -days 366 -sha256 -subj "/C=US/ST=CA/L=PA/O=VMware/OU=Arkin/CN=aria-networks-collector/[email protected]" -out vnera.com.crtssh -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null support@###.###.###.### 'sudo sed -i "/isThisProxy/,+4d" /home/ubuntu/cli/bin/recertify_host.sh /home/ubuntu/cli/bin/scplocal.sh'custom-cert listcustom-cert applysed -i 's/-----BEGIN PRIVATE KEY-----/-----BEGIN RSA PRIVATE KEY-----/g' vnera.com.keysed -i 's/-----END PRIVATE KEY-----/-----END RSA PRIVATE KEY-----/g' vnera.com.keycustom-cert apply command, after which you should see the message containing "Successfully applied new certificate"