|
Dieses Gerät hat auch andere Anweisungen:
Anleitung Zusammenfassung
6 Delta Configurations ..............................................................................37
6.1 Infrastructure Considerations ....................................................................................... 37
6.2 Change Control Management ....................................................................................... 40
6.2.1 Defining and Applying a Delta Configuration ...................................................... 41
6.2.2 Changing Configuration Mode ............................................................................. 43
7 Configuration Maintenance ..................................................................44
8 Deployment Scenarios ...........................................................................46
8.1 Enterprise Wired Deployment ...................................................................................... 48
8.1.1 Overview ............................................................................................................... 48
8.1.2 Intel AMT Configuration Methods and Options ................................................... 48
8.2 Enterprise Wireless Deployment .................................................................................. 49
8.2.1 Overview ............................................................................................................... 49
8.2.2 Intel AMT Configuration Methods and Options ................................................... 50
8.3 Clients Outside the Enterprise ...................................................................................... 50
8.3.1 Overview ............................................................................................................... 50
8.3.2 Intel AMT Configuration Methods and Options ................................................... 50
8.4 Service Provider Deployment ...................................................................................... 51
8.4.1 Overview ............................................................................................................... 51
8.4.2 Intel AMT Configuration Methods and Options ................................................... 52
8.5 Permissions Required for ACUconfig and Accessing the RCS ................................... 52
A Appendix A: Common Configuration Options ..................................57
A.1 Defining the Intel AMT FQDN Source ........................................................................ 57
A.1.1Purpose of Intel AMT FQDN Value ........................................................................... 57
A.1.2Prerequisites to Determining Intel AMT FQDN Value ............................................... 57
A.1.3Defining, Applying, and Validating Intel AMT FQDN Value .................................... 58
A.2 Defining Access Authorization via Intel AMT ACL ................................................... 58
A.2.1Purpose of Intel AMT Access Control List ................................................................. 58
A.2.2Prerequisites in Determining Level of Authorization .................................................. 59
A.2.3Defining, Applying, and Validating Intel AMT ACLs ................................................ 60
A.3 Active Directory Integration ........................................................................................ 60
A.3.1Purpose of Active Directory Integration ..................................................................... 61
A.3.2Prerequisites and Dependencies for Active Directory Integration .............................. 61
A.3.3Defining, Applying, and Validating Intel AMT Value ................................................ 64
A.4 Transport Layer Security (TLS) ................................................................................... 66
A.4.1Purpose of TLS with Intel AMT Configuration .......................................................... 66
A.4.2Overview and Prerequisites for TLS ........................................................................... 67
A.4.3Environmental Preparations ........................................................................................ 67
A.4.3.1Enabling Web Enrollment for Microsoft Certificate Authority ................................ 68
A.4.3.2Granting Service Account Privileges to Microsoft Certificate Authority ................. 69
A.4.4Defining, Applying and Validating a TLS Profile Configuration ............................... 71
A.5 Wireless LAN .............................................................................................................. 73
A.5.1Purpose of Intel AMT over Wireless ........................................................................... 74
A.5.2Prerequisites for Intel AMT over Wireless .................................................................. 74
A.5.3Defining, Applying and Validating Intel AMT over Wireless Configuration ............. 74
A.6 Intel AMT Configuration Options Not Covered .......................................................... 77
iv
Intel® SCS Deployment Guide
...