We are starting to get questions on how to test CIRA, one of the new features in the Intel® AMT 5.0 SDK. Specifically, how to test it. I have included in this blog steps that I have documented on testing this feature (note that Ajith Illendula is the guy who designed the lab - but his gone. He just left for his Sabbatical and will not be back until January '09.) Although we do not include the source code for the MPS in the SDK, you can use the MPS sample which contains the binary in order to test it and see how it works.
In the example below, we used a Virtual Machine and so your environment settings might be different - you will need to set up your network according to your network requirements. Also we used a specific domain name - feel free to use whatever domain name you want (just replace "corpamt.com" below with whatever domain name you are using.)
You may be wondering, however, how to implement this in the real world (outside of the SDK.) I posted a blogawhile back where I tried to explain this. Basically, our non-enterprise AMT ISVs, will need to utilize the vPro Enabled Gateway available through the Intel Connect Service - that is, non-enterprise ISVs will not have the tools to write their own vPro Enabled Gateway (MPS). This is the "Remote PC Assist" model. In my blog I also have contact information that you can utilize for finding out more information.
Other things you may need to know - this Lab utilized the Soap UI tool - you don't have to use Soap UI, but it is really nice not to have to build this into an application - you can just go into the APIs according to the steps below and set up the requests for each API accordingly. Also you may need to download 3proxy - it's a free proxy tool. You don't have to use it - you can use your own, but it is the one that is referenced in this lab. You will also have to set up the config files in your MPS sample with the appropriate Management Console subscriber as well as the Server subscribers. The Readme file has instructions on how to do this and which config files need to be modified.
Oh... one more thing. As I mentioned, this lab uses SMB mode and manually installs certificates where they need to be. I'm thinking that if your systems are already provisioned in Enterprise TLS with Server authentication (ie, not Mutual) then you could skip the installation of the certificates below since the Enterprise provisioning process should already to that.
Acronyms:
- MPS - Manageability Presence Server (also referred to as the "vPro Enabled Gateway"
- SMB - Small Business Mode (Technically you are supposed to be in Enterprise mode but we got it to work in SMB by manually placing the certificates where they needed to be.)
- CIRA - Client Initiated Remote Access (Now referred to as "Fast Call for Help", "Remote PC Assist", "Remote Alerts", and "Remote Scheduled Maintenance")
CIRA LAB STEPS:
Creating a CIRA connection via an MPS server involves the following steps. These steps are further defined below.
- Step 1: Get MPS Up and Running
- Step 2: Configure AMT Client in SMB (Step 4)
- Step 3: Install Certificates onto the AMT Client
- Step 4: Add MPS Server, Remote Access Policy, Enable CIRA through OS and BIOS
- Step 5: Run MPS Notification Sample
- Step 6: Enable Environment Detection
- Step 7: Initiate CIRA Connection through Privacy Icon
- Step 8: Initiate CIRA Connection through BIOS
- Step 9: Connect to AMT Client using MPS as proxy and demonstrate GetEnvironmentDetection settings
Relevant APIs: (See the Network Interface guide in the SDK)
Realm | Relevant APIs |
SecurityAdministration |
|
RemoteAccessAdmin |
|
How to Create and Test a CIRA Connection:
System Prep | |
0 | Set the IP Address of the Host OS on the system that is hosting the MPS VM
Open DHCP Server in the MPS VM
Password for VM: p@ssw0rd |
Step 1: Get MPS Up and Running | |
1 |
|
How to Create and Test a CIRA Connection (Continued)
Step 2: Configure AMT Client in SMB | |
2 |
Again - use the host names/domain names for your environment. |
Step 3: Install Certificates onto the AMT Client | |
3 | NOTE: Provisioning in SMB mode required creating certificates and cutting and pasting the correct portions into the APIs below. The requests called CIRA Trusted Root,AMT TLS CIRA CERT, and CertStoreAddKey will not be in your environment - you will have to create it and paste the certificate portions into them.Installing the Root Certificate
Installing the Client Certificate and the Key
|
Step 4: Add MPS Server, Remote Access Policy, Enable CIRA through OS and BIOS | |
4 | Note: You will not have the MPS_DO requestin your Soap UI project - you will need to create a new request and put in the handle from the CertStoreAddCertificate request in the previous step.The UI Soap request has the Trigger set to 0 for "User Initiated" and same with the BIOS and OS soap reqeuests - set "source" to 2 for BIOS and 1 for OS
RemoteAccessPolicyTriggerType: 0 = User Initiated, 1 = Alert, 2 = Periodic, 3 = Home Provisioning |
How to Create and Test a CIRA Connection (Continued)
Step 5: Run MPS Notification Sample | |
5 |
Make sure privacy icon shows up (sometimes it doesn't show up)
|
Step 6: Enable Environment Detection | |
6 | Go back to SecurityAdministrationin the SoapUI (you will have to create a request that adds your specific domain instead of CORPAMT.com.)
|
Step 7: Initiate CIRA Connection through Privacy Icon When the connection is established we can | |
7 | Go back to the Client
|
Step 8: OR Initiate CIRA Connection through BIOS | |
8 | F2 - go into BIOS
|
Step 9: Connect to AMT Client using MPS as proxy and demonstrate GetEnvironmentDetection settings | |
9 | Go back to SecurityAdministration in the SoapUI
Then it will show the current Environment Detection Settings To demonstrate that we can now manage the Client:
|
Immagine icona:
