Unable to connect in Client Control Mode (CCM) or Admin Control Mode (ACM) via Client Initiated Remote Access (CIRA).
Note | The only way to see the TLS PKI screen is after doing a full un-provision via EMA, ACUConfig, or directly in Intel® Management BIOS Extension (Intel® MEBX). It can be found in the Remote Setup and Configuration tab in Intel MEBX. |
This must be set to get CIRA mode.
The DNS suffix needs to be the same as the provisioning cert. Also, you can do an ipconfig /all and verify the DNS suffix on the physical Ethernet interface.
Setting up Intel AMT initially requires being on a wired interface before wireless is supported when activating in Admin Control Mode.
Intel AMT CIRA makes use of the Intel AMT feature environment detection. When the endpoint system’s network domain matches the configured CIRA domain, Intel AMT will not start the CIRA connection. To force Intel AMT to always open a CIRA tunnel, enter a fake domain suffix in the CIRA intranet suffix field under General settings when creating your Intel AMT profile. This fake domain suffix should be complex enough to prevent anyone from guessing it and therefore using it to prevent a CIRA connection and open local management ports.
Note | After all this, we can start seeing what Platform Manager is telling us when the user tries to connect. It will need to log in to the user's Intel® Endpoint Management Assistant (Intel® EMA) server and pull up the Platform Manager and log in with the Global Admin. |