Software Security Operational Description rev 3

schacket

Software Security Letter

Intel Corporation AX203NG Intel Wi-Fi 6 AX203 PD9AX203NG PD9AX203NG ax203ng

Similarity Letter

PDF Viewing Options

Not Your Device? Search For Manuals or Datasheets below:


File Info : application/pdf, 3 Pages, 294.26KB

Document DEVICE REPORTGetApplicationAttachment.html?id=6079150
The information provided in this document applies to the following Intel Wireless Adapter Modules. Model FCC ID
AX203NGW PD9AX203NG

Software Security Description ­ KDB 594280 D02v01r03 Section II

General Description

1. Describe how any software/firmware update will be There is no downloadable software provided by the

obtained, downloaded, and installed. Software that is manufacturer that can modify critical radio transmitter

accessed through manufacturer's website or device's parameters. All critical parameters are programmed in

management system, must describe the different levels OTP memory at the factory and cannot be modified or

of security as appropriate.

overridden by third parties.

2. Describe the rf parameters that are modified by any There are no rf parameters that can be modified. All rf

software/firmware without any hardware changes. Are parameters are programmed in OTP memory at the

these parameters in some way limited, such that, it will factory and cannot be modified or overridden by third

not exceed the authorized RF characteristics?

parties.

3. Describe in detail the authentication protocols that are in place to ensure that the source of the RF related software/firmware is legitimate. Describe in detail how the software is protected against modification.

The firmware is programmed at the factory and cannot be modified by third parties.

4. Describe in detail any encryption methods used to support the use of legitimate RF relatedsoftware/firmware.

The firmware is programmed at the factory and cannot be modified by third parties therefore no encryption is necessary.

5. For a device that can be configured as a master and This is a client module only. client (with active or passive scanning), explain how the device ensures compliance for each mode? In particular if the device acts as master in some band of operation and client in another; how is compliance ensured in each band of operation?

Third-Party Access Control
1. Explain if any third parties have the capability to operate a US sold device on any other regulatory domain, frequencies, or in any manner that is in

Third parties do not the capability to operate in any manner that is violation of the certification in the U.S.

violation of the device's authorization if activated in the U.S..

2. Describe, if the device permits third-party software or RF parameters are programmed into OTP memory at the

firmware installation, what mechanisms are provided by factory and cannot be reprogrammed or re-flashed by

the manufacturer to permit integration of such

third parties.

functions while ensuring that the RF parameters of the

device cannot be operated outside its authorization for

operation in the U.S. In the description include what

controls and/or agreements are in place with providers

of third-party functionality to ensure the devices'

underlying RF parameters are unchanged and how the

manufacturer verifies the functionality.

3. For Certified Transmitter modular devices, describe There are no rf parameters that can be modified. All rf

how the module grantee ensures that hosts

parameters are programmed in OTP memory at the

manufactures fully comply with these software security factory and cannot be modified or overridden by third

requirements for U-NII devices. If the module is controlled through driver software loaded in the host, describe how the drivers are controlled and managed

parties. The module is not controlled by driver software on the host and cannot override critical rf parameters stored in module OTP memory.

such that the modular transmitter parameters are not

modified outside the grant of authorization.

SOFTWARE CONFIGURATION DESCRIPTION ­ KDB 594280 D02v01r02 Section III

USER CONFIGURATION GUIDE

1. Describe the user configurations permitted through No UI provided. the UI. If different levels of access are permitted for professional installers, system integrators or end-users, describe the differences.

a) What parameters are viewable and configurable by None different parties?

b) What parameters are accessible or modifiable to None the professional installer or system integrator?

i) Are the parameters in some way limited, so that The module micro-code reads the parameters from the

the installers will not enter parameters that exceed

module OTP memory. These parameters cannot be

those authorized?

modified or overridden by sw drivers.

ii) What controls exist that the user cannot operate Default mode is always FCC compliant. Other country

the device outside its authorization in the U.S.?

modes cannot be activated without receiving three independent country codes from different APs, otherwise

remains in FCC default mode (always FCC compliant)

c) What parameters are accessible or modifiable by None the end-user?

i) Are the parameters in some way limited, so that The module micro-code reads the parameters from the

the installers will not enter parameters that exceed those authorized?

module OTP memory. These parameters cannot be modified or overridden by sw drivers.

ii) What controls exist that the user cannot operate Default mode is always FCC compliant. Other country

the device outside its authorization in the U.S.?

modes cannot be activated without receiving three

independent country codes from different APs, otherwise

remains in FCC default mode (always FCC compliant)

d) Is the country code factory set? Can it be changed Default country code is set in the factory and no UI is

in the UI?

provided for modification.

i) If it can be changed, what controls exist to ensure Programmed for default mode which is always FCC

that the device can only operate within its authorization compliant. Always set for default for all start-ups, resets,

in the U.S.?

timeouts or other host or network events.

e) What are the default parameters when the device Always FCC compliant is restarted?

2. Can the radio be configured in bridge or mesh mode? No If yes, an attestation may be required. Further information is available in KDB Publication 905462 D02.

3. For a device that can be configured as a master and This is a client device. client (with active or passive scanning),if this is user configurable, describe what controls exist, within the UI, to ensure compliance for each mode. If the device acts as a master in some bands and client in others, how is this configured to ensure compliance?

4. For a device that can be configured as different types This device is not an access point. of access points, such as point-to-point or point-to- multipoint, and use different types of antennas, describe what controls exist to ensure compliance with applicable limits and the proper antenna is used for each mode of operation. (See Section 15.407(a))

Name and surname of applicant (or authorized representative):

Date: October 10, 2018

Signature:

Steven C. Hackett Product Regulations Enginee Intel Mobile Communicationsr



Related FCC IDs:

Search Any Device: