AMTRedirection Application

The sample is located in the RedirectionSamplesModule_<version>.zip file.

The AMTRedirection sample application requires that Microsoft Visual Studio be installed on your machine – or, at minimum, the Microsoft Visual C++ Redistributables Package. Both are available from the Microsoft website.

The sample enables a user to execute the functions supported by the redirection library. The sample reads an ini File for initial settings. The file it looks for is MC_RedTool.ini. When the sample starts successfully, it displays the following menu:

C:\views\Bin>AMTRedirection.exe -user admin -pass Admin!98 -host

a: Open SOL Session

b: Close SOL Session

c: Open Storage Redirection (IDE-R/USB-R) Session

d: Close Storage Redirection (IDE-R/USB-R) Session

e: Regular boot

f: SOL boot

g: SOL boot to BIOS setup

h: Storage Redirection (IDE-R/USB-R) Floppy boot

i: Storage Redirection (IDE-R/USB-R) CD boot

j: SOL + Storage Redirection (IDE-R/USB-R) Floppy boot

k: SOL + Storage Redirection (IDE-R/USB-R) CD boot

m: enable Redirection listener

n: disable Redirection listener

l: Display Menu Option

x: Exit


choose an option>|


AMTRedirection.exe [-krb] [-user <username> -pass <password>] [-cert <name>]
– host <target> [-tls [-CACert <CACertFilePath> -PrivateCert <privateCertFilePath> -privateCertPass <privateCertPassword>] | [-MA –commonName <CommonName>]]
[-proxy <proxy> -proxyUserName <proxyUserName> -proxyPass <proxyPassword>]
[-proxySocks <proxySocks> -proxySocksUserName <proxySocksUserName> -proxySocksPass <proxySocksPassword>]





The user is a Kerberos user and has a corresponding ACL entry in the Intel AMT device.

[-user <username> -pass <password>]

Username and password in an ACL entry.

[-cert <name>]

Path to a client certificate when TLS mutual authentication is required.

-host <target>

The IP address or FQDN of the target Intel AMT device


Use TLS during communication.  The certificates can be loaded from either files or the Microsoft® certificates store:

   When loading certificates from files, also -CACert <CACertFilePath> command should be called for TLS –server authentication and -CACert <CACertFilePath> -PrivateCert <privateCertFilePath> -privateCertPass <privateCertPassword> command should be called for mutual authentication.

   When loading certificates from store, nothing else should be called for TLS - server authentication and –MA command should be called for mutual authentication.

If -MA –commonName <CommonName> command is called, the client certificates its subject:CN matches to the  <commonName> parameter will be chosen.



The proxy parameters are used when the sample will connect to the Intel AMT device via an MPS.

Copyright © 2006-2022, Intel Corporation. All rights reserved.