Software Security Req For UNII Devices
Software Security Req For UNII Devices
Software Security Req For UNII Devices
I. INTRODUCTION
On March 31, 2014, the Commission revised the rules in Part 15 that permits U-NII devices in the 5 GHz
Band. 1 As part of that revision, the Commission required that all U-NII device software be secured to
prevent its modification to ensure that the device operates as authorized thus reducing the potential for
harmful interference to authorized users. 2 Although, the Commission refused to set specific security
protocols, the methods used by manufacturers to implement the security requirements must be well
documented in the application for equipment authorization. In this document, we provide general
guidance on the type of information that should be submitted in the equipment authorization application.
The security description provided in the application must cover software security, configuration, and
authentication protocols descriptions, as appropriate. This guidance applies to master and client devices.
Special circumstances that apply only to client devices are also addressed.
An applicant must describe the overall security measures and systems that ensure that only:
The description of the software must address the following questions in the operational description for the
device and clearly demonstrate how the device meets the security requirements. 3 While the Commission
did not adopt any specific standards, it is suggested that the manufacturers may consider applying existing
industry standards. 4 Also, this guide is not intended to be exhaustive and may be modified in the future.
There may be follow-up questions based on the responses provide by the applicant for authorization.
1
See Revision of Part 15 of the Commission’s Rules to Permit Unlicensed National Information Infrastructure (U-
NII) Devices in the 5 GHz Band, First Report and Order, ET Docket No. 13-49 (2014) (1st R&O).
2
For U-NII devices certified as SDR, see KDB Publication 442812 D01.
3
An exhibit that is part of the Operational Description can be subject to confidentiality. Applicants may request that
the software description, as part of the operational description exhibit type, be held confidential. If the software
description is submitted as the software information exhibit, it is automatically held confidential.
4
It is suggested that manufacturers follow existing security standards and definitions: X.800, RFC 2828, and IEEE
802.11i.
In addition to the general security consideration, for devices which have “User Interfaces” (UI) to
configure the device in a manner that may impact the operational parameter, the following questions shall
be answered by the applicant and the information included in the operational description. The description
must address if the device supports any of the country code configurations or peer-peer mode
communications discussed in KDB 594280 Publication D01. 5
5
See KDB Publication 594280 D01Software Configuration Control for Devices. The document provides guidance
for devices permitting device configurations and limitations on configuration parameters accessible to the third
parties.
6
The specific parameters of interest for this purpose are those that may impact the compliance of the device. These
typically include frequency of operation, power settings, antenna types, DFS settings, receiver thresholds, or country
code settings which indirectly programs the operational parameters.
07/10/2014: 594280 D02 UNII Device Security v01 has been changed to 594280 D02 UNII Device
Security v01r01. Changes to items 3 and 4 in the Software Configuration Description table.