X540HM UNII SW security and configuration check list

FCC ID: ZNFX540HM

Cover Letter(s)

Download: PDF
FCCID_4452258

                                              SOFTWARE SECURITY DESCRIPTION (FCC ID : ZNFX540HM)
No                               General Description                                                                 LG description
     Describe how any software/firmware updates for elements than can             The software/firmware update is bundled, as part of LGE software update, and the
     affect the device’s RF parameters will be obtained, downloaded,              user or installer cannot modify the content. The installation and/or update
1    validated and installed. For software that is accessed through               proceeds automatically once the user accepts to install/update the
     manufacturer’s website or device’s management system, describe the           software/firmware. User can obtain the LGE software update via LGE website or
     different levels of security as appropriate.                                 FOTA.

     Describe the RF parameters that are modified by any software/firmware
                                                                                  Radio parameters are fixed at time of production as required by the FCC
     without any hardware changes. Are these parameters in some way
2                                                                                 certification. Any future software/firmware release is verified by Grantee before
     limited such that any other software/firmware changes will not allow the
                                                                                  release. If required, Grantee will follow FCC permissive change procedure.
     device to exceed the authorized RF characteristics?

     Describe in detail the authentication protocols that are in place to
                                                                                  Software/firmware is digitally signed and encrypted using proprietary handshaking,
     ensure that the source of the RF-related software/firmware is valid.
3                                                                                 authorization and provisioning protocols. The device inoperable if signed value is
     Describe in detail how the RF-related software is protected against
                                                                                  invalid through modification.
     modification.
     Describe in detail any encryption methods used to support the use of
4                                                                                 Encryption using proprietary internal software.
     legitimate RF-related software/firmware.
     For a device that can be configured as a master and client (with active or
     passive scanning), explain how the device ensures compliance for each        The country code which is obtained from mobile network's MCC value is used to
5    mode? In particular if the device acts as master in some band of             ensure full compliance with band operation. If the device can't get the country
     operation and client in another; how is compliance ensured in each band code, it uses default value which is the minimum set of reguration domain of USA.
     of operation?
No                           Third-Party Access Control                                                              LG description
     Explain if any third parties have the capability to operate a U.S.-sold
                                                                                  Only Grantee can release or make changes to the software/firmware
     device on any other regulatory domain, frequencies, or in any manner
1                                                                                 using proprietary secure protocols. Any third parties can't operate on domain,
     that may allow the device to operate in violation of the device’s
                                                                                  frequencies.
     authorization if activated in the U.S.
     Describe, if the device permits third-party software or firmware
     installation, what mechanisms are provided by the manufacturer to
                                                                                  LGE device supports strong security implementation.
     permit integration of such functions while ensuring that the RF
                                                                                  Grantee proprietary hardware platform, software tools and proprietary
     parameters of the device cannot be operated outside its authorization
2                                                                                 protocols are required to replace a new firmware.
     for operation in the U.S. In the description include what controls and/or
                                                                                  Even if some 3rd party applications replace the firmware in violation of security, it's
     agreements are in place with providers of third-party functionality to
                                                                                  inoperable with the device.
     ensure the devices’ underlying RF parameters are unchanged and how
     the manufacturer verifies the functionality.

     For Certified Transmitter modular devices, describe how the module
     grantee ensures that host manufacturers fully comply with these
     software security requirements for U-NII devices. If the module is
3                                                                                 Not applicable, this device is not a module.
     controlled through driver software loaded in the host, describe how the
     drivers are controlled and managed such that the modular transmitter RF
     parameters are not modified outside the grant of authorization.




                                                       SOFTWARE CONFIGURATION DESCRIPTION
No                           USER Configuration Guide                                                                LG description
     Describe the user configurations permitted through the UI. If different      All users have access to Link Rate and Signal Strength, Wi-Fi Security method and
     levels of access are permitted for professional installers, system           channel information. Any other parameters except for parameters(Link Rate and
     integrators or end-users, describe the differences.                          Signal Strength, Wi-Fi Security method and channel information) are not accessible
                                                                                  and all parameters are not modifiable.
     a. What parameters are viewable and configurable by different parties?       a. Link Rate and Signal Strength, WiFi Security method and channel information.


     b. What parameters are accessible or modifiable by the professional          b. 1) & 2) Nothing is accessible or modificable by 3rd party or Installers.
     installer or system integrators?
     (1) Are the parameters in some way limited, so that the installers will
     not enter parameters that exceed those authorized?
     (2) What controls exist that the user cannot operate the device outside
     its authorization in the U.S.?
1
     c. What parameters are accessible or modifiable by the end-user?             c. 1) Yes, it's encripted and nobody can access it except for the manufacturer.
     (1) Are the parameters in some way limited, so that the user or installers     2) Nothing exists.
     will not enter parameters that exceed those authorized?
     (2) What controls exist so that the user cannot operate the device
     outside its authorization in the U.S.?


     d. Is the country code factory set? Can it be changed in the UI?
     (1) If it can be changed, what controls exist to ensure that the device      d. Yes, it's set-up but it's never can be changed in the UI.
     can only operate within its authorization in the U.S.?


     e. What are the default parameters when the device is restarted?
                                                                                  e. Nothing is changed. It's always set-up based on the regulatory domains.
     Can the radio be configured in bridge or mesh mode? If yes, an               No.
2    attestation may be required. Further information is available in KDB
     Publication 905462 D02.
     For a device that can be configured as a master and client (with active or Only WiFi Hotspot can change WiFi channel that is allowed.
     passive scanning), if this is user configurable, describe what controls
3    exist, within the UI, to ensure compliance for each mode. If the device
     acts as a master in some bands and client in others, how is this
     configured to ensure compliance?
     For a device that can be configured as different types of access points,     We don’t' use defferent type of antennas.
     such as point-to-point or point-to-multipoint, and use different types of
4    antennas, describe what controls exist to ensure compliance with
     applicable limits and the proper antenna is used for each mode of
     operation. (See Section 15.407(a))





Document Created: 2019-09-12 09:09:00
Document Modified: 2019-09-12 09:09:00

© 2024 FCC.report
This site is not affiliated with or endorsed by the FCC