I have one of those notorious public websites for my company running on a third-party host that has the same domain name as our internal Active Directory domain network. So that our internal users can browse to that site, we have long had an internal A record for "www" that points to the external website's static IP address. That used to work. But now, if an internal user types "www.my-company.com", the browser throws an error "NET:ERR_CERT_COMMON_NAME_INVALID", crosses out the "https: in the URL, and prevents access to the site. The "advanced" error message says "This server couldn't prove that it's my-company.com; its security certificate is from .my-company.com. This may be caused by a misconfiguration or an attacker intercepting your connection."
I'm baffled. If I do an nslookup to internal DNS on "www.my-company.com", it correctly returns the website's public IP address. If the HTTPS wants a certificate, why is it not getting the certificate from the public site, rather than our internal domain server? Clearly, I don't understand something fundamental!