Requirem Answer rity appropriate characteristics?
ti Describe i detail ti FCC IC NIl Software Security Info RF_736, Issue 6 SOFTWARE SECURITY INFORMATION FCC ID: _2AR42APPC1213XP __ Pursuant to:
Page 1 of 4 28-12-2022 Ic FCC Part 15E 15.407(I) and KDB 594280 DO2 UNII Device Security v01r03 / IC RSS-247 issue 2 article 6.4(4). The information within this section is to show compliance against the SW Security Requirements laid out within KDB 594280 D02 U-NII Device Security v01r03. The information below describes how to maintain the overall security measures and systems so that only:
1. Authenticated software is loaded and operating on the device. 2. The device is not easily modified to operate with RF parameters outside of the authorization. General Description ent 1. Describe how any software/firmware updates for elements than can affect the devices RF parameters will be obtained, downleaded, validated and installed. For software that is accessed through manufacturer's website or devices management system, describe the different levels of secu as . escribe the RF parameters that are modified by any software/firmware without any hardware changes. Are these parameters in some way limited such that any other software/firmware changes will not allow the device to exceed the authorized RF 3. Describe in detail the authentication protocols that are in place to ensure that the source of the RF-related software/firmware is valid. Describe in detail how the RF-related software is protected against modification. n any encryp on methods used to support the use of legitimate RF-
related software/firmware. 5. For a device that can be configured as a masier and client (with active or passive scanning), explain how the device ensures compliance for each mode? In particular if the device acts as master in some band of operation and client in another; how is compliance ensured in each band of 0 eration?
Page 1 of 4 ProDVX introducers new SW through an ZC process after a complete SW validation process. ProDVX uses proprietary radio that can only runs ProDVX SW. This is available through secure ProDVX technical support. All the radio frequency parameters are Transmit power, operating channel, modula on type. Only authorized parameters are available and can be set in software. The ProDVX SW runs a load validation during the SW upgrade process to ensure that the SW is legitimate, unaltered, and downloaded correctly. The SW, radios, and load validation are proprietary. Software image contains security key signature and contains platform type imbedded in header. Software images are not encrypted but are compressed. This is a client device. Ref: KDB 594280 D02 U-NII/ RSS-247article 6.4(4). Requirement Answer Describe the fi rati Use configuration the differences. a) What met viewabl nd Not vailabl nfig by part system integrators?
FCC IC NII Software Security Info Page 2 of 4 RF_736, Issue 6 28-12-2022
| | Requirement | Answer 1. Explain if any third parties have the The devices sold to the US cannot be capability to operate a U.S./Canada - operated on any other country or domains. sold device on any other regulatory This is locked into the manufacturing data domain, frequencies, or in any manner and cannot be changed. that may allow the device to operate in violation of the devices authorization if activated in the U.S./Canada. 2. Describe, if the device permits third-party + Not available software or firmware installation, what mechanisms are provided by the manufacturer to permit integration of such functions while ensuring that the RF parameters of the device cannot be operated outside its authorization for operation in the U.S./Canada. In the description include what controls and/or agreemenis are in place with providers of third-party functionality to ensure the devices underlying RF parameters are unchanged and how the manufacturer verifies the functionality. 3. For Certified Transmitter modular devices, | The SW and radios are ProDVX proprietary. describe how the module grantee The SW is updated through a ProDVX controller ensures that host manufacturers fully (a closed system). comply with these software security requirements for U-NII devices. If the module is controlled through driver software loaded in the host, describe how the drivers are controlled and managed such that the modular transmitter RF parameters are not modified outside the grant of authorization. Third Party Access Control This section is required for devices which have a User Interface (UI) to configure the device in a manner that may impact the operational parameter. The operation description must address if the device supports any of the country code configurations or peer-peer mode communications discussed in KDB 594280 DO1 v02r01
. user con gu ons permitted r can not set any through the UI. If different levels of access are permitted for professional installers, system integrators or end-users, describe para ers are ea a e co urable different ies?
b) What parameters are accessible or Not available modifiable by the professional installer or R CONFIGURATION GUIDE Page 2 of 4 Ref: KDB 594280 D02 U-NIL/ RSS-247article 6.4(4). kiwa
(1) Are the in limited | Not available in the U.S./Canada? |
by parameters that exceed those authorized?
Not available _ aan changed in the UI? be changed in the UI. |
Th devi configured manufacturi |
U.S./Canada? |
e) What the default ters when Not KDB Publication 905462 D02. device that b configured compliance?
This is client device. Section 15.407(a)). aik FCC IC NII Software Security Info RF_736, Issue 6 parameters some way '
so that the installers will not enter parameters that exceed those authorized?
(2) What controls exist that the user cannot operate the device outside its authorization c) What parameters are accessible or modifiable the end-user?
(1) Are the parameters in some way limited, so that the user or installers will not enter
(2) What controls exist so that the user cannot operate the device outside its authorization in the U.S./Canada?
d) Is the country code factory set? Can it be
(1) If it can be changed, what controls exist to ensure that the device can only operate within its authorization in the are parame the device is restarted?
2. Can the radio be configured in bridge or mesh mode? If yes, an attestation may be required. Further information is available in 3. Fora can asa master and client (with active or passive scanning), if this is user configurable, describe what controls exist, within the UI, to ensure compliance for each mode. If the device acts as a master in some bands and client in others, how is this configured to ensure . 4. For a device that can be configured as different types of access points, such as point-to-point or point-to-multipoint, and use different types of antennas, describe what controls exist to ensure compliance with applicable limits and the proper antenna is used for each mode of operation. (See Name and surname of applicant (or authorized representative): Patrick van Date: _2023/0707. Page 3 of 4 28-12-2022 Not available Not available Not available Yes the country code is factory set. It cannot e ces are at ng to be US only and only ProDVX US SW loads can be installed. available Not available Not available
/ Director Signature:
Ref: KDB 594280 D02 U-NII / RSS-247article 6.4(4). kiwaw FCC IC NII Software Security Info Page 4 of 4 RF_736, Issue 6 28-12-2022 Revision Record Sheet:
Remark(s) History sheet added Issued/modified by : Willem Jan Jong Function : Team Lead Revision 16 Date 1 28-12-2022 Verified by : Axel Gase Function : Quality Manager Date 1 28-12-2022 Released by : Axel Gase Function : Manager Quality Assurance Date of release: 1 28-12-2022 Page 4 of 4 Ref: KDB 594280 D02 U-NII RSS-247article 6.4(4).