IAdea Corporation 3F, No. 21, Lane 168, Xingshan Road, NeihuDist., Taipei City 11469, Taiwan, R.O.C. Tel : 886-2-2791- 1110/ Fax: 886-2-2791- 1170 Date: 2023/1/10 FCC ID: Y9E-IAD-18010A Software Security Description We, IAdea Corporation hereby declare that requirements of IAD- 18010A IAD- 18010L have been met and shown on the following question. Software Security Description 1 . Describe how any software/ firmware update will be obtained, downloaded, and installed. Software that is accessed through manufacturer s website or device s management system, must describe the different levels of security. Description: The software/ firmware aren t provided through website or device s management. 2 . Describe all the radio frequency parameters that are modified by any software/ firmware without any hardware changes. Are these parameters in some way limited, such that, it will not exceed the authorized parameters?
Description: Any software/ firmware can t modify RF parameters that can affect and exceed the authorized RF characteristics. 3. Describe in detail the authentication protocols that are in place to ensure that the source of the software/firmware is legitimate. Describe in detail how the software is protected against modification. Description: The answer is same with question 2 4 . Describe in detail the verification protocols in place to ensure that installed software/ firmware is legitimate. Description: The answer is same with question 2 5 . Describe in detail any encryption methods used to support the use of legitimate software/ firmware. Description: The answer is same with question 2 6 . For a device that can be configured as a master and client ( with active or passive scanning) , explain how the device ensures compliance for each mode? In particular if the device acts as master in some band of operation and client in another; how is compliance ensured in each band of operation?
Description: This device operation as a client and each mode was compliance with the rule. 1 . Explain if any third parties have the capability to operate a US sold device on any other regulatory domain, frequencies, or in any manner that is in violation of the certification. Description: This device isn t provided to any third parties , so there is no case that third parties operate this device. 2. What prevents third parties from loading non-US versions of the General Description Third- Party Access Control IAdea Corporation 3F, No. 21, Lane 168, Xingshan Road, NeihuDist., Taipei City 11469, Taiwan, R.O.C. Tel : 886-2-2791- 1110/ Fax: 886-2-2791- 1170 software/firmware on the device? Describe in detail how the device is protected from flashing and the installation of third-party firmware such as DD-WRT. Description: The answer is same with question 1 3 . For Certified Transmitter modular devices, describe how the module grantee ensures that hosts manufactures fully comply with these software security requirements for U-NII devices. If the module is controlled through driver software loaded in the host, describe how the drivers are controlled and managed such that the modular transmitter parameters are not modified outside the grant of authorization. Description:The answer is same with question 1 Software Security Description 1 . To whom is the UI accessible? ( Professional installer, end user, other. ) Description: Professional installer and end user a) What parameters are viewable to the professional installer/ end-
user?
Description:
RF ON/OFF Search WiFi Access point Connect WiFi access point b) What parameters are accessible or modifiable by the professional installer?
Description: All parameters described in a are accessible and modifiable by the professional installer
( 1 ) Are the parameters in some way limited, so that the installers will not enter parameters that exceed those authorized?
Description: All parameters described do not effect exceed those authorized.
( 2 ) What controls exist that the user cannot operate the device outside its authorization in the U. S. ?
Description: All parameters described in a, user can not operate the device outside its authorization in the us. c) What parameters are accessible or modifiable to by the end- user?
Description: The parameters can not be accessible or modifiable by the end user.
( 1 ) Are the parameters in some way limited, so that the installers will not enter parameters that exceed those authorized?
Description: All parameters was limited , the installers will not enter parameters that exceed those authorized User Configuration Guide IAdea Corporation 3F, No. 21, Lane 168, Xingshan Road, NeihuDist., Taipei City 11469, Taiwan, R.O.C. Tel : 886-2-2791- 1110/ Fax: 886-2-2791- 1170
( 2 ) What controls exist that the user cannot operate the device outside its authorization in the U. S. ?
Description: Because UI is limited as described a, the user can not operate the device outside its authorization. d) Is the country code factory set? Can it be changed in the UI?
Description: Country code is factory set and UI can not change the country code
( 1 ) If so, what controls exist to ensure that the device can only operate within its authorization in the U. S. ?
Description: This question is not valid e) What are the default parameters when the device is restarted?
Description: RF ON Search WiFi Access point idle WiFi access point not connected to Country code US( CH1 - 1 1 ) Cananda( CH1 - 1 1 ) 2. Can the radio be configured in bridge or mesh mode? If yes, an attestation may be required. Further information is available in KDB Publication 905462 D02. Description:NO 3. For a device that can be configured as a master and client (with active or passive scanning), if this is user configurable, describe what controls exist, within the UI, to ensure compliance for each mode. If the device acts as a master in some bands and client in others, how is this configured to ensure compliance?
Description This device operate as a client, and was controlled to ensure compliance. 4. For a device that can be configured as different types of access points, such as point-to-point or point-to-multipoint, and use different types of antennas, describe what controls exist to ensure compliance with applicable limits and the proper antenna is used for each mode of operation. (See Section 15.407(a)) Description: This device can t be configured as different types of access points , such as point to point and point to multipoint If any questions regarding this declaration, please dont hesitate to contact us. Sincerely ________________/Director of product development
( Signature/ Title) Company name: IAdea Corporation