Documente online.
Zona de administrare documente. Fisierele tale
Am uitat parola x Creaza cont nou
 HomeExploreaza
upload
Upload




Intel AMT Switchbox guide

computers




Intel AMT Switchbox guide

Last updated: September 24, 2007

Table of Contents

OVERVIEW

LIST OF FEATURES

Switchbox Status:

User Accounts:

Managed Computers:

Network Discovery:

Redirections (Telnet SOL, Local IDER, Passthru SOL & IDER): 

Logging & Intel AMT Interceptor: 

File Downloader & Disk Images: 

Power-State Monitoring:

Certificate configuration:

HOW IT WORKS?

USAGE SCENARIOS

KNOWN LIMITATIONS

CAVEAT

CONFIGURATION FILES

switchbox.config

mappings.txt:

redirectimages.txt:

SOME URIs:

APPENDIX

How to setup Switchbox on a Linksys router? 

How to configure Switchbox in TLS mode with a Correct Certificate?

How to perform Local IDER on a Unix based system? 

Intel AMT Switchbox guide

OVERVIEW

Intel AMT Switchbox is a Software Tool that connects to and manages Intel AMT machines on a network. It is built in C and runs on Windows, UNIX and MIPS platforms (Routers). An IAMT management console like Intel AMT Commander or a Web Browser (Internet Explorer 7 and 6, Firefox 2.0 and 1.5) or Telnet can connect to Intel AMT Switchbox in TLS or non-TLS mode, authenticate once, and manage all of the Intel AMT machines that are under the control of this Switchbox.

Working of Switchbox

LIST OF FEATURES

These are the list of features, one can access while accessing switchbox from a browser:

Switchbox Status:

This shows the current status and details of Switchbox like:

  • IP-addresses of Switchbox related to the sub-networks the switchbox belongs to (On a router, this will be the WAN, LAN and Wireless ip-address)
  • current time on Switchbox
  • the user accessing this info
  • name of the Switchbox
  • total disk space, free space
  • switchbox version
  • telnet-port

User Accounts:

This allows add/delete switchbox users with different access-rights.

Managed Computers:

This feature allows a user to manage/control a list of Intel AMT machines on a network.

  • It also allows to IDER from an ISO and floppy image stored on a switchbox to an affected system and monitors redirections from various Management Consoles to a particular system.
  • It also allows sending Remote Control commands like reboot, reboot + SOL, etc to an AMT system.
  • A user can add/delete AMT system entries; each entry consisting a Hostname/IP, description and username-password to authenticate and connect to the Intel AMT machine. Alternatively, user can directly add the entries discovered in Network Discovery. When a system is added, switchbox generates a random ID for that system. This ID is used by the Management Consoles for all future communication to that system via Switchbox.
  • Switchbox also monitors the power-state of all the AMT systems in its managed computers list and stores their power-states history for last 7 days (no of days to store can be configured).

Network Discovery:

This feature is used to discover the Intel AMT machines in a sub-network specified by an IP range. Once Network Discovery is started, user can perform other tasks while the Network Discovery runs in background. User can directly add the computers discovered to the Manage Computers list by clicking on the computer hostnames/ips discovered.

Redirections (Telnet SOL, Local IDER, Passthru SOL & IDER):

Switchbox facilitates Telnet SOL, Local IDE-Redirection with a locally stored cdrom and floppy image and Pass-through SOL & IDER from a Console machine running Intel AMT Commander.

To Telnet SOL to Switchbox, a user should telnet to port 16990 or the TelnetRedirectPort value in switchbox.config. Once connected, user will be asked switchbox-username, switchbox-password and the AMT ID to which he wants to SOL/IDER to.

To enable Local IDER, we use a compile time flag. To do Local IDER to an AMT system, a user should goto Switchbox's Managed Computer webpage for that AMT system, select the images from the dropdowns and start IDER. A user can stop the redirection sessions on the same page by clicking on the trash icons for that sessions. Currently, the pre-built linux and mips executable do not have Local IDER enabled, since .iso files cannot be IDER properly on unix-based systems.

Logging & Intel AMT Interceptor:

Switchbox logs all the important events in events.log file. These log file can also be viewed in Switchbox webpage under Event Log link. Old entries from the Log are flushed automatically when it reaches a pre-set threshold size. Alternatively, user is allowed to delete this log. User can also enable/disable logging to save space by setting the EventsLog key in switchbox.config.

Switchbox also can send various types of debug messages over a telnet session. You can telnet to Switchbox using Intel AMT Interceptor to the TelnetSOL port, set the debug message types you will like to receive and hit connect.

This cool feature can intercept all the HTTP requests/responses including SOAP requests/responses, SOL/IDER messages and other helpful debug trace messages.

File Downloader & Disk Images:

This feature allows a user to upload images (floppy image or cdrom iso) on switchbox for redirection purpose. Switchbox has its own little file-downloader which can download an image from a web-link (this downloader does not work via a proxy server or from links that require authentication). A user can enter the link and the name it wants to give the file and select the type of redirection image.

This feature is disabled if Local IDER is disabled in switchbox.config.

Power-State Monitoring:

Switchbox monitors the power-state of its managed computers periodically and maintains the power-state history for each machine for last 7 days.

Certificate configuration:

To operate Switchbox in TLS mode, a Server-side Certificate needs to be configured in Switchbox. We have explained more on Certificate configuration in the Appendix section: "How to configure Switchbox in TLS mode with a Correct Certificate?"

HOW IT WORKS?

  • When a user clicks/connects to any Machine ID in the list, Intel AMT Switchbox gets the machine details (IP address/hostname, username and password) from its mappings table, authenticates to the Intel AMT machine and then forwards the traffic from the Intel AMT machine to the Management Console/ Web browser through it and vice-versa. Since Switchbox takes care of authenticating to the Intel AMT machine, the Switchbox user need not worry about authenticating to every Intel AMT machine it wants to control. The sessions are ended gracefully when the Management Console or the AMT machine disconnects.
  • In addition to clicking on the AMT ID to connect to the system, a user can connect to an Intel AMT machine directly if he knows its AMT ID.

Enter the AMT ID in the username field prompted for the Switchbox login as follows:

    • Username field = <Switchbox username>:<AMT ID>
    • Password field = <Switchbox password>

and the user will be connected to that Intel AMT Machine directly.

Using the same way, if a user connects directly to an Intel AMT Machine through Intel AMT Commander, then he can perform and SOL and IDE-R similar to how he can perform it directly using Intel AMT Commander.

USAGE SCENARIOS

Intel AMT Switchbox can be used in a home, SOHO, enterprise, embedded and service provider network:

  • In a router. It would accept management connections from outside or initiate management connections when something goes wrong. It would act as an authentication bridge and would monitor watchdog agents, events, power states, etc. Depending on policy, Switchbox can do a few things. Will support WOL, etc.
  • In a NAS box. Same as router, but it also manages "Recovery OS's" and can to IDE-R to an IAMT machine on its own or at the command of a management console. This is nice since you can pre-load the NAS box with a recovery OS and make use of it when needed. IDE-R over this internet is really slow.
  • On the NAS, it can be use to restore a computer after a hard disk swap.
  • On a computer. In the enterprise environment, it can be used monitor all the computers on a site; it can also be used to do IDE-R much faster if the management console is off-site.
  • At the service provider site. Switchbox is the connection collector for attaching service requests to management consoles.

KNOWN LIMITATIONS

  • Switchbox html pages use AJAX, so the browsers connecting to Switchbox need to have Javascript + XML support.
  • User is expected to request the URIs in the format shown below. Since error-checking is not done thoroughly on the URI requested, an invalid URI may crash the program.
  • Currently, through Intel AMT Commander console a user can SOL and IDE-R to only 1 Intel AMT machine. This is due to the limitation of IDE-Redirect library that comes with the Intel AMT SDK.
  • Currently Local Redirect functionality is disabled in the pre-built switchbox executables for Linux and MIPS, since Intel AMT Redirection library is unable to redirect from .iso files (It can only redirect via physical CDROMs). We have raised this issue with the AMT SDK team. If you are fine with only the .img file redirection, please let me know and I shall work with you to generate a static library version of Intel AMT Redirection Library for your platform.

CAVEAT

  • The Linux executable of Switchbox that we supply with Intel AMT Switchbox in Intel AMT DTK is tested for Fedora core 6 platform. Its highly recommended that you should build switchbox from its source code for your platform, if its different then fedora core 6.

CONFIGURATION FILES

switchbox.config:

To configure Intel AMT Switchbox

Sample file:

# This is a comment

# Port on which Intel AMT Switchbox accepts connections

# Note that if Switchbox is in TLS mode, the https server will run on

#Port + 1, i.e. in the following case, the https server will run on port 16993

Port=16992 

# Intel AMT Switchbox unique ID

UUID=00005628-9576-738b-000000007bd9

# Redirect Port for SOL-Redirect and IDE-R

RedirectPort=16994

# Redirect Port for Telnet Passthrough SOL

TelnetSOLPort=16990

#To disable/enable logging

Logging=1

# admin password

user.admin=<admin-password>

# Additional users

user.<username1>=<password1>

user.<username2>=<password2>

user.<username3>=<password3>

#ImageLocation is the absolute directory path, where images for Local IDER are stored

ImageLocation=c work\PublicRelease\images\

mappings.txt:

Each line in this file of the below format represents data about a managed AMT computer:

<amt-unique-id>:<amt hostname/ip>:<amt username>:<amt password>:<desc>:<Everything here onwards is related to power-history for that system and is generated by Switchbox>

eg

556051:amtmachine.switchbox.intel.com:16992:admin:intelAMT@123:Intel(R) Active Management Technology 2.0.5:0:1190648479:4:

If you are adding an entry manually into this file, you need to enter only till the <desc> part, i.e. if you were to add the above e.g. manually then you shall only add

556051:amtmachine.switchbox.intel.com:16992:admin:intelAMT@123:Intel(R) Active Management Technology 2.0.5

redirectimages.txt: To store the names of the floppy and cdrom images for Local IDER. These images should be in the 'ImageLocation' directory configured in switchbox.config.

Entries are of format:

<Image-type - floppy/cdrom><-><image-name><-><image-desc>

e.g. floppy:fmsdos.img:Basic floppy image

SOME URIs:

  • Intel AMT Switchbox homepage: https://<Switchbox-IP>:<Port>

https://192.168.4.3:16992 or https://192.168.4.3:16993

  • MachineID to AMT machine Mappings:
    • Get mappings table in XML format:

https://192.168.4.3:16992/getmappings

    • Add entry to mappings:

https://192.168.4.3:16992/addmapping?326128=192.168.5.80:16992:admin:intelAMT@123:Intel(R) Active Management Technology 2.1.0

    • Delete entry from mappings:

https://192.168.4.3:16992/deletemapping?326128

  • Get switchbox.config (without any user accounts) in XML format:

https://192.168.4.3:16992/getinfo

  • Useraccounts:
    • Get users list in XML format

https://192.168.4.3:16992/getusers

    • Add user

https://192.168.4.3:16992/adduser?guest=pass1234

    • Delete user

https://192.168.4.3:16992/deleteuser?guest

  • Network Discovery:
    • Start network discovery

https://192.168.4.3:16992/ netdiscstart?start=192.168.5.80&end=192.168.5.90

    • Stop network discovery

https://192.168.4.3:16992/netdiscstop

    • Get network discovery results

https://192.168.4.3:16992/netdiscinfo

  • Logs:
    • Get Event Log:

https://192.168.4.3:16992/geteventlog

    • Delete Event Log:

https://192.168.4.3:16992/deleteeventlog

  • Redirections:
    • Get Redirection sessions info:

https://192.168.4.3:16992/getredirections

    • Start Local redirect session:

https://192.168.4.3:16992/startlocalredirection?amtID=<AMT-ID>&floppy=<image-name>&cdrom=<image-name>

    • Stop redirect sessions:

https://192.168.4.3:16992/stopredirection? <AMT-ID>:<Redirection-type>

    • Get images available for local redirection:

https://192.168.4.3:16992/getimages

  • Power:
    • Get power-history of switchbox managed systems:

https://192.168.4.3:16993/getpower

APPENDIX

How to setup Switchbox on a Linksys router?

"switchbox_mips" in the "Intel AMT Switchbox" folder is the binary for MIPS (Linksys router).

We are using Linksys WRTSL54GS ver 1.1 to run switchbox, since it provides good amount of RAM and disk space and USB support (you can plugin USB drive of 1GB for additional space) compared to other Linksys versions.

To configure the Router, connect your PC to any LAN ports of the router.

We flashed the router with the firmware "dd-wrt.v23_nokaid_generic.bin" since it allows SSH service. Default username/password for this firmware is root/admin for SSH and web-access. If it does not work, hard-reset the router once and try it again.

After flashing with the new firmware,

o       Goto Router homepage Administration Services; Turn on the sshd service. "Save settings" at the bottom of the page.

o       Goto the Router homepage Administration Management; Under JFFS2 support, enable JFFS2 and enable "Clean JFFS2". Then, hit "Save settings" at the bottom of the page. This should clean and format the JFFS2 (user-modifiable disk space) on router.

You can now SSH to the router with username= "root" and password = "admin", using a SSH client like putty

Copy the "Intel AMT Switchbox" folder to /jffs directory on the router; using SCP with a tool like WinSCP. Since the folder also contains some .exe, .dll and similar non-MIPS files related to windows platform, delete them before copying to router to save space. Also delete the .iso and .img files, since the router does not support Local Redirect currently.

To start the switchbox automatically whenever the router starts, create a file /jffs/etc/config/switchbox.startup (make sure you run chmod +x switchbox.startup) with the following lines

bin/sh

cd /jffs/Intel\ AMT\ Switchbox/

switchbox_mips &

Alternatively you can goto router's webpage Administration Commands

Enter the above 3 lines in the text-area and click "Save Startup"

Reboot the router. Enjoy your Switchbox!

By default, Switchbox is in TLS mode. To access its homepage, type

https://<switchbox-ip OR hostname>:16993

o       To run Switchbox in non-TLS mode: Configure the 'Port' in Switchbox.config as 16992

https://<switchbox-ip OR hostname>:16992

How to configure Switchbox in TLS mode with a Correct Certificate?

When you install Switchbox for the 1st time and configure it to use TLS mode, it's certificate cannot be verified by Commander or other Consoles connecting to it since its Certificate Authority is not trusted and also since the Switchbox default certificate bears the hostname "127.0.0.1", which is not what the Consoles use to connect to Switchbox. When the Switchbox certificate cannot be verified by the Consoles, a red circular icon appears on switchbox IP to indicate this error. In case of Commander, it also disables the "Take Control" option, when you connect to any of the Managed AMT machines under Switchbox; for security purpose.

To configure a Switchbox with a proper certificate, the console machine needs to have a trusted root certificate and have Intel AMT Commander issue a new certificate to Switchbox using this trusted root certificate.

To generate a trusted root certificate on the Console machine using Intel AMT Director, please follow these steps:

o       Open Intel AMT Director

o       Click on "Certificate Manager" option.

o       Click on "Create Root Certificate" button: here you can give a "Common name" and "Organization name" of your choice and make sure that the checkbox for "After creation, make this a trusted certificate" is enabled.

o       Click "Generate. You will get a Security warning about "Do you want to install this certificate? click Yes.

o       Close Director.

Now to issue a new certificate to Switchbox using Intel AMT Commander, follow these steps:

o       Open Commander

o       Connect to Switchbox; make sure that the red circular icon is still there on switchbox IP.

o       Click on Settings tab on the right side panel

o       Click on the 'x' button next to the 127.0.0.1 hostname.

o       From the dropdown of Issuer Certificate, select the root certificate that you just generated using Director. Select the Key size.

o       And click on OK.

o       This will upload a new certificate on Switchbox and will reset the Connection in Commander.

o       Connect to Switchbox after 5 seconds; you should now see a blue icon in place of the red circular icon (showing that the Switchbox Certificate can now be verified) and should also be able to "Take Control" of your AMT machines under Switchbox now.

You can use the same root certificate to issue certificates to many Switchboxes.

How to perform Local IDER on a Unix based system?

In Switchbox, a compile-time flag "LOCAL_REDIRECT_ENABLED" is set to enable Local IDER. We have kept it as a compile-time option since, on Unix based systems, enabling it also requires dynamically linking with libssl, libcrypto and libstdc++, which are not available by default on some embedded systems and also statically linking with Intel AMT Redirection Library (imrsdk), which is not available for all systems.

Once switchbox is built, the .iso file and the .img file which a user wants to use for Local IDER purpose has to be mounted to some directory on the system (Note that this is a requirement of the Intel AMT Redirection Library that we use for Local Redirection in Switchbox) as:

mount -o loop sample.iso /mnt/cdrom

mount -o loop sample.img /mnt/floppy

Make sure, there is an entry in redirectionimages.txt for these images. Then select these images on the Managed Computer webpage for that system and Start Local IDER.


Document Info


Accesari: 1184
Apreciat: hand-up

Comenteaza documentul:

Nu esti inregistrat
Trebuie sa fii utilizator inregistrat pentru a putea comenta


Creaza cont nou

A fost util?

Daca documentul a fost util si crezi ca merita
sa adaugi un link catre el la tine in site


in pagina web a site-ului tau.




eCoduri.com - coduri postale, contabile, CAEN sau bancare

Politica de confidentialitate | Termenii si conditii de utilizare




Copyright © Contact (SCRIGROUP Int. 2024 )