Software Security Letter

FCC ID: B94-HNQ20PDCP2

Cover Letter(s)

Download: PDF
FCCID_4439115

TheinformationprovidedinthisdocumentappliestothefollowingIntelWirelessAdapterModules.

Model      FCCID


 B94-HNQ20PDCP2
            466X - HNQ20PDCP2




SoftwareSecurityDescription–KDB594280D02v01r03SectionII

General Description

1. Describe how any software/firmware update will be       7KHUHLVQRGRZQORDGDEOHVRIWZDUHSURYLGHGE\WKH
obtained, downloaded, and installed. Software that is      PDQXIDFWXUHUWKDWFDQPRGLI\FULWLFDOUDGLRWUDQVPLWWHU
accessed through manufacturer’s website or device’s        SDUDPHWHUV$OOFULWLFDOSDUDPHWHUVDUHSURJUDPPHGLQ
management system, must describe the different levels      273PHPRU\DWWKHIDFWRU\DQGFDQQRWEHPRGLILHGRU
of security as appropriate.                                RYHUULGGHQE\WKLUGSDUWLHV

2. Describe the rf parameters that are modified by any     7KHUHDUHQRUISDUDPHWHUVWKDWFDQEHPRGLILHG$OOUI
software/firmware without any hardware changes. Are        SDUDPHWHUVDUHSURJUDPPHGLQ273PHPRU\DWWKH
these parameters in some way limited, such that, it will   IDFWRU\DQGFDQQRWEHPRGLILHGRURYHUULGGHQE\WKLUG
not exceed the authorized RF characteristics?              SDUWLHV

3. Describe in detail the authentication protocols that 7KHILUPZDUHLVSURJUDPPHGDWWKHIDFWRU\DQGFDQQRW
are in place to ensure that the source of the RF related EHPRGLILHGE\WKLUGSDUWLHV
software/firmware is legitimate. Describe in detail how
the software is protected against modification.

4. Describe in detail any encryption methods used to       7KHILUPZDUHLVSURJUDPPHGDWWKHIDFWRU\DQGFDQQRW
support the use of legitimate RF                           EHPRGLILHGE\WKLUGSDUWLHVWKHUHIRUHQRHQFU\SWLRQLV
relatedsoftware/firmware.                                  QHFHVVDU\

5. For a device that can be configured as a master and 7KLVLVDFOLHQWPRGXOHRQO\
client (with active or passive scanning), explain how the
device ensures compliance for each mode? In particular
if the device acts as master in some band of operation
and client in another; how is compliance ensured in
each band of operation?



Third Party Access Control

1. Explain if any third parties have the capability to     7KLUGSDUWLHVGRQRWWKHFDSDELOLW\WRRSHUDWHLQDQ\
operate a US sold device on any other regulatory           PDQQHUWKDWLVYLRODWLRQRIWKHFHUWLILFDWLRQLQWKH86
domain, frequencies, or in any manner that is in


violation of the device’s authorization if activated in the
U.S..

2. Describe, if the device permits third party software or 5)SDUDPHWHUVDUHSURJUDPPHGLQWR273PHPRU\DWWKH
firmwareinstallation, what mechanisms are provided by IDFWRU\DQGFDQQRWEHUHSURJUDPPHGRUUHIODVKHGE\
the manufacturer to permit integration of such             WKLUGSDUWLHV
functions while ensuring that the RF parameters of the
device cannot be operated outside its authorization for
operation in the U.S. In the description include what
controls and/or agreements are in place with providers
of third party functionality to ensure the devices’
underlying RF parameters are unchanged and how the
manufacturer verifies the functionality.

3. For Certified Transmitter modular devices, describe        7KHUHDUHQRUISDUDPHWHUVWKDWFDQEHPRGLILHG$OOUI
how the module grantee ensures that hosts                     SDUDPHWHUVDUHSURJUDPPHGLQ273PHPRU\DWWKH
manufactures fully comply with these software security        IDFWRU\DQGFDQQRWEHPRGLILHGRURYHUULGGHQE\WKLUG
requirements for U NII devices. If the module is              SDUWLHV7KHPRGXOHLVQRWFRQWUROOHGE\GULYHUVRIWZDUH
controlled through driver software loaded in the host,        RQWKHKRVWDQGFDQQRWRYHUULGHFULWLFDOUISDUDPHWHUV
describe how the drivers are controlled and managed           VWRUHGLQPRGXOH273PHPRU\
such that the modular transmitter parameters are not
modified outside the grant of authorization.



SOFTWARECONFIGURATIONDESCRIPTION–KDB594280D02v01r02SectionIII

USER CONFIGURATION GUIDE

1. Describe the user configurations permitted through 1R8,SURYLGHG
the UI. If different levels of access are permitted for
professional installers, system integrators or end users,
describe the differences.

   a) What parameters are viewable and configurable by 1RQH
different parties?

  b) What parameters are accessible or modifiable to          1RQH
the professional installer or system integrator?

     i) Are the parameters in some way limited, so that 7KHPRGXOHPLFURFRGHUHDGVWKHSDUDPHWHUVIURPWKH
the installers will not enter parameters that exceed    PRGXOH273PHPRU\7KHVHSDUDPHWHUVFDQQRWEH
those authorized?                                      PRGLILHGRURYHUULGGHQE\VZGULYHUV

     ii) What controls exist that the user cannot operate 'HIDXOWPRGHLVDOZD\V)&&FRPSOLDQW2WKHUFRXQWU\
the device outside its authorization in the U.S.?        PRGHVFDQQRWEHDFWLYDWHGZLWKRXWUHFHLYLQJWKUHH
                                                          LQGHSHQGHQWFRXQWU\FRGHVIURPGLIIHUHQW$3VRWKHUZLVH
                                                          UHPDLQVLQ)&&GHIDXOWPRGH DOZD\V)&&FRPSOLDQW 

  c) What parameters are accessible or modifiable by          1RQH
the end user?

     i) Are the parameters in some way limited, so that 7KHPRGXOHPLFURFRGHUHDGVWKHSDUDPHWHUVIURPWKH


the installers will not enter parameters that exceed        PRGXOH273PHPRU\7KHVHSDUDPHWHUVFDQQRWEH
those authorized?                                          PRGLILHGRURYHUULGGHQE\VZGULYHUV

     ii) What controls exist that the user cannot operate 'HIDXOWPRGHLVDOZD\V)&&FRPSOLDQW2WKHUFRXQWU\
the device outside its authorization in the U.S.?        PRGHVFDQQRWEHDFWLYDWHGZLWKRXWUHFHLYLQJWKUHH
                                                          LQGHSHQGHQWFRXQWU\FRGHVIURPGLIIHUHQW$3VRWKHUZLVH
                                                          UHPDLQVLQ)&&GHIDXOWPRGH DOZD\V)&&FRPSOLDQW 

   d) Is the country code factory set? Can it be changed 'HIDXOWFRXQWU\FRGHLVVHWLQWKHIDFWRU\DQGQR8,LV
in the UI?                                              SURYLGHGIRUPRGLILFDWLRQ

     i) If it can be changed, what controls exist to ensure 3URJUDPPHGIRUGHIDXOWPRGHZKLFKLVDOZD\V)&&
that the device can only operate within its authorization FRPSOLDQW$OZD\VVHWIRUGHIDXOWIRUDOOVWDUWXSVUHVHWV
in the U.S.?                                               WLPHRXWVRURWKHUKRVWRUQHWZRUNHYHQWV

   e) What are the default parameters when the device $OZD\V)&&FRPSOLDQW
is restarted?

2. Can the radio be configured in bridge or mesh mode? 1R
If yes, an attestation may be required. Further
information is available in KDB Publication 905462 D02.

3. For a device that can be configured as a master and 7KLVLVDFOLHQWGHYLFH
client (with active or passive scanning),if this is user
configurable, describe what controls exist, within the UI,
to ensure compliance for each mode. If the device acts
as a master in some bands and client in others, how is
this configured to ensure compliance?

4. For a device that can be configured as different types 7KLVGHYLFHLVQRWDQDFFHVVSRLQW
of access points, such as point to point or point to
multipoint, and use different types of antennas,
describe what controls exist to ensure compliance with
applicable limits and the proper antenna is used for
each mode of operation. (See Section 15.407(a))



1DPHDQGVXUQDPHRIDSSOLFDQW RUDXWKRUL]HGUHSUHVHQWDWLYH 


'DWH-XQH                  6LJQDWXUH

                                                                           6WHYHQ&+DFNHWW
                                                                           3URGXFW5HJXODWLRQV(QJLQHH
                                                                           ,QWHO0RELOH&RPPXQLFDWLRQVU



Document Created: 2019-09-10 08:58:50
Document Modified: 2019-09-10 08:58:50

© 2024 FCC.report
This site is not affiliated with or endorsed by the FCC