How-To Guide

Page
1
of
4 Ref: KDB 594280 D02 U-NII / RSS-247article 6.4(4).
SOFTWARE SECURITY INFORMATION
FCC ID: 2ANOG-A98M
Pursuant to:
FCC Part 15E 15.407(I) and KDB 594280 D02 UNII Device Security v01r03 / IC RSS-247article 6.4(4).
The information within this section is to show compliance against the SW Security Requirements laid out
within KDB 594280 D02 U-NII Device Security v01r03. The information below describes how to maintain
the overall security measures and systems so that only:
1. Authenticated software is loaded and operating on the device.
2. The device is not easily modified to operate with RF parameters outside of the
authorization.
SOFTWARE SECURITY DESCRIPTION
Requirement Answer
General Description
1.
Describe how any s oftware/firmware updates
for elements than can affect the device’s
RF parameters will be obtained,
downloaded, validated and installed. For
software that is accessed through
manufacturer’s website or device’s
management system, describe the different
levels of security as appropriate.
The factory firmware is produced by Grantee
and it is delivered to the factory via a secured
channel. The factory loads the firmware to the
device on the production line with specialized
tools not available to consumers..
2.
Describe the RF parameters that are
modified by any software/firmware without
any hardware changes. Are these
parameters in some way limited such that
any other software/firmware changes will
not allow the device to exceed the
authorized RF characteristics?
The RF parameters have been confirmed in
accordance with FCC regulations, and burned
into the device. The unauthorized person can
not modify via changing the firmware or other
ways.
3.
Describe in detail the authentication
protocols that are in place to ensure that
the source of the RF-related
software/firmware is valid. Describe in detail
how the RF-related software is protected
against modification.
No authentication is applied for firmware
download, but FSG power on protection is
applied to protect the factory RF calibration
data from corruption or tempering.
4.
Describe in detail any encryption methods
used to support the use of legitimate RF-
related software/firmware.
Yes, see answers to #1 and #3.
5. For a device that can be configured as a
master and client (with active or passive
scanning), explain how the device ensures
compliance for each mode? In particular if
the device acts as master in s ome band of
operation and client in another; how is
compliance ensured in each band of
operation?
Please refer to test report,this device is the
slave, which is compliant with FCC regulation
demands.

Summary of content (4 pages)