Built my first system system using Intel AMT over the last week. It is an attempt as a really small, passive cooled (no fans) ESXi server. Its built on an Intel DQ77KB mini-ITX 1155 motherboard with a I3-3470T low power CPU. Except that I haven't actually got it running passive right now it turned out to be a really good build.
I noticed something about Intel's Management Engine (ME/AMT) that I found a bit disappointing when compared to IPMI 2.0. On most IPMI implementations you can specify a VLAN for the management traffic. This is especially important when management traffic and "normal" traffic share the same physical LAN interface. Can't do this on the Intel Management Engine...it runs untagged only.
Also, even when there is a shared NIC, IPMI uses an alternate MAC address for the management engine. Intel doesn't. So if the ME gets its IP address using DHCP you can't do a separate DHCP transaction for whatever actual service runs on that port unless you go into the OS and spoof the MAC.
All of this becomes a PITA when you run your management traffic segregated onto a separate LAN but don't want to hard-dedicate one of the two ports to system management traffic.
I did manage to solve this for this build by doing something really abnormal. For the connection to the management NIC (red NIC) is set my HP switch to send VLAN 200 (the management VLAN) untagged and set the normal "default" VLAN 1 to run tagged. This allowed me to get the AMT link onto the right subnet. But I still had to put the VMware management port onto the second NIC on VLAN200 due to the common MAC address and DHCP problems it creates.
Leaves me with VLAN 200 exposed on both NICs (a potential security issue) and a strange configuration of the VLAN tags on one line (a "error prone" configuration because simple mistakes lead to unexpected traffic on VLAN 200).
I could have solved the entire problem by dedicating "red" port to management traffic only and then using static IP configs for either the AMT or VMware management interface.
All would have been much simpler if Intel had just implemented VLAN on the management engine...
I noticed something about Intel's Management Engine (ME/AMT) that I found a bit disappointing when compared to IPMI 2.0. On most IPMI implementations you can specify a VLAN for the management traffic. This is especially important when management traffic and "normal" traffic share the same physical LAN interface. Can't do this on the Intel Management Engine...it runs untagged only.
Also, even when there is a shared NIC, IPMI uses an alternate MAC address for the management engine. Intel doesn't. So if the ME gets its IP address using DHCP you can't do a separate DHCP transaction for whatever actual service runs on that port unless you go into the OS and spoof the MAC.
All of this becomes a PITA when you run your management traffic segregated onto a separate LAN but don't want to hard-dedicate one of the two ports to system management traffic.
I did manage to solve this for this build by doing something really abnormal. For the connection to the management NIC (red NIC) is set my HP switch to send VLAN 200 (the management VLAN) untagged and set the normal "default" VLAN 1 to run tagged. This allowed me to get the AMT link onto the right subnet. But I still had to put the VMware management port onto the second NIC on VLAN200 due to the common MAC address and DHCP problems it creates.
Leaves me with VLAN 200 exposed on both NICs (a potential security issue) and a strange configuration of the VLAN tags on one line (a "error prone" configuration because simple mistakes lead to unexpected traffic on VLAN 200).
I could have solved the entire problem by dedicating "red" port to management traffic only and then using static IP configs for either the AMT or VMware management interface.
All would have been much simpler if Intel had just implemented VLAN on the management engine...