


The subject's common name (CN) field in the X.509 certificate should be fixed to reflect the name of the entity presenting the certificate (e.g., the hostname). Subject Alternative Name x.x.x.x does not match target name specified in the site. Subject CN fw-xxxxxxxxxx VPN Certificate could not be resolved to an IP address via DNS lookup. Subject CN fw-xxxxxxxxxx VPN Certificate does not match target name specified in the site. The subject common name found in the X.509 certificate does not seem to match the scan target: X.509 Certificate Subject CN Does Not Match the Entity Name What is being presented is the Internal CA VPN certificate and wondering if there is an easy fix other possibly a re-SIC? This is not causing any issues with VPN tunnels. The firewall that was scanned (ie: 2.2.2.2) is showing the following in the certificate (ie:1.1.1.1) for Subject Alternate Name. It appears to be getting flagged because the IP address of the firewall was changed at some point and there is a mismatch. After performing an external vulnerability scan, the following vulnerability shows up.
