Intel® Setup and Configuration Software (Intel® SCS) Deployment Guide
Total Page:16
File Type:pdf, Size:1020Kb
Intel® Setup and Configuration Software (Intel® SCS) Deployment Guide Version 8.0 Document Release Date: May 2, 2012 Document Version: 1.1 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY E STOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm. Intel® Active Management Technology requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup & configuration.n. For For more information, visit http://www.intel.com/technology/platform-technology/intel-amt. Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro. Systems using Client Initiated Remote Access require wired LAN connectivity and may not be available in public hot spots or "click to accept" locations. For more information on CIRA, visit http://software.intel.com/en-us/articles/fast-call-for-help-overview. Intel, the Intel logo, and Intel vPro, are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Copyright © 2012, Intel Corporation. All rights reserved. ii 1 Introduction ............................................................................................5 2 Intel® AMT Overview ...........................................................................6 2.12.1 Intel® SCS Overview................................................................................................... 6 2.22.2 Infrastructure Starting State ......................................................................................... 7 3 Intel AMT Discovery .............................................................................9 3.13.1 Purposes and Prerequisites ........................................................................................... 9 3.23.2 Local Query of Intel AMT Status................................................................................. 10 3.33.3 Local SystemDiscovery of Intel AMT ......................................................................... 10 4 Deciding on a Configuration Path ........................................................12 4.14.1 Why is Setup and Configuration Necessary? ............................................................... 12 4.24.2 Configuration Process Overview.................................................................................. 13 4.34.3 Configuration Methods ................................................................................................ 14 4.44.4 Domain User Account .................................................................................................. 15 4.54.5 Install the Intel SCS Server Components ..................................................................... 15 5 Configuration Options ...........................................................................17 5.15.1 Host-Based Configuration ............................................................................................ 17 5.1.1Create Intel AMT Configuration Profile ............................................................... 17 5.1.2Export the Profile and Run the ACUConfig Utility .............................................. 19 5.25.2 SMB/Manual Configuration ......................................................................................... 20 5.35.3 Remote Configuration Using PKI ................................................................................ 22 5.3.1Configure Certificates for Intel AMT ................................................................... 22 5.3.1.1 Task: Get SSL Certificate for Remote Intel AMT Configuration.......... 22 5.3.1.2 Task: Export SSL Certificate for Remote Intel AMT Configuration...... 29 5.3.1.3 Task: Import SSL Certificate for Remote Intel AMT Configuration to User Certificate Store ..................................................................................... 31 5.3.2Create and Apply Configuration Profile via Remote Configuration using PKI .... 34 5.45.4 Verify the Setup and Configuration ............................................................................. 36 iii 6 Delta Configurations ..............................................................................37 6.16.1 Infrastructure Considerations ....................................................................................... 37 6.26.2 Change Control Management........... ............................................................................ 4040 6.2.1Defining and Applying a Delta Configuration ...................................................... 41 6.2.2Changing Configuration Mode ............................................................................. 43 7 Configuration Maintenance ..................................................................44 8 Deployment Scenarios ...........................................................................46 8.18.1 Enterprise Wired Deployment ...................................................................................... 48 8.1.1Overview ............................................................................................................... 4848 8.1.2Intel AMT Configuration Methods and Options ................................................... 48 8.28.2 Enterprise Wireless Deployment .................................................................................. 49 8.2.1Overview ............................................................................................................... 4949 8.2.2Intel AMT Configuration Methods and Options ................................................... 50 8.38.3 Clients Outside the Enterprise ...................................................................................... 50 8.3.1Overview ............................................................................................................... 5050 8.3.2Intel AMT Configuration Methods and Options ................................................... 50 8.48.4 Service Provider Deployment ...................................................................................... 51 8.4.1Overview ............................................................................................................... 5151 8.4.2Intel AMT Configuration Methods and Options ................................................... 52 8.58.5 Permissions Required for ACUconfig and Accessing the RCS ................................... 52 A Appendix A: Common Configuration Options ..................................57 A.1 Defining the Intel AMT FQDN Source ........................................................................ 57 A.1.1Purpose of Intel AMT FQDN Value ........................................................................... 57 A.1.2Prerequisites to Determining Intel AMT FQDN Value ............................................... 57 A.1.3Defining, Applying, and Validating Intel AMT FQDN Value .................................... 58 A.2 Defining Access Authorization via Intel AMT ACL ................................................... 58 A.2.1Purpose of Intel AMT Access Control List ................................................................. 58 A.2.2Prerequisites in Determining Level of Authorization .................................................. 59 A.2.3Defining, Applying, and Validating Intel AMT ACLs ................................................ 60 A.3 Active Directory Integration .......................................................................................