VMware vRealize Network Insight 6.9
Aria Operations for Networks 6.10.0
Aria Operations for Networks 6.11.0
Aria Operations for Networks 6.12.0
Aria Operations for Networks 6.12.1
Aria Operations for Networks 6.13.0
Aria Operations for Networks 6.14.0
Prerequisites
Note: Exceptions to this requirement can be a wildcard certificate. However, the Subject Alternative Name (SAN) should also include the Fully Qualified Domain Name of the appliance.
Generating a Certificate Signing Request (CSR):
1. Generate a key pair by running this command:
unalias openssl
openssl genrsa -out key_filename.key 2048
2. Use the key to generate a certificate signing request by running this command:
openssl req -new -key key_filename.key -out certificate_request.csr
3. Submit the CSR file to your Certificate Authority (CA) to obtain a signed certificate.
4. From your Certificate Authority, download the certificate and the complete issuing chain (one or more certificates). Download them in Base64 format as a PEM, and make sure the full certificate chain is present in customcert.crt
Validating the custom certificate files:
1. To verify file signature for correctness, execute the two below commands:
file customcert.crt
file customcert_privatekey.key
customcert
and customcert_privatekey
with the actual .crt
and .key
names. #file customcert.crt
customcert.crt: PEM certificate
#file customcert_privatekey.key
customcert_privatekey.key: PEM RSA private key - Correct
#file custcert.crt
custcert.crt: ASCII text - Incorrect
#file custcert_privatekey.key
custcert_privatekey.key: ASCII text
2. When the file is opened using any text editor, it should only have content similar to:
----- BEGIN RSA PRIVATE KEY-----
<payload>
-----END RSA PRIVIATE KEY-----
Installing a custom certificate:
custom-cert remove
Removed all custom certificates.
custom-cert copy --host <IP_of_SFTP_host> --user <user_of_SFTP_host> --port 22 --path </path/to/file>.crt
custom-cert copy --host <IP_of_SFTP_host> --user <user_of_SFTP_host> --port 22 --path </path/to/file>.key
custom-cert copy --host 10.1.1.1 --user adminxyz --port 22 --path /tmp/file.crt
custom-cert copy --host 10.1.1.1 --user adminxyz --port 22 --path /tmp/file.key
<user_of_SFTP_host>
password.copying...
successfully copied
custom-cert list
file.crt
file.key
custom-cert apply
Successfully applied new certificate. All active UI sessions have to be restarted.
Note: Passphrase protected keypair is not supported.
While replacing the certs, getting below error
"Failed to find the Key file"
1. The error occurred because vRNI cannot recognize normal key file and it has to convert the normal key file to RSA pem format using Openssl
# openssl rsa -in file.key -out newfile.key
2. Alternatively, fix the headers in the key file by running the following commands:
sed -i 's/-----BEGIN PRIVATE KEY-----/-----BEGIN RSA PRIVATE KEY-----/g' vrni_key.key
sed -i 's/-----END PRIVATE KEY-----/-----END RSA PRIVATE KEY-----/g' vrni_key.key