TS.64 v1.0 FWA Devices Architecture and Requirements
TS.64 v1.0 FWA Devices Architecture and Requirements
Copyright Notice
Copyright © 2023 GSM Association
Disclaimer
The GSMA makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and
hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained
in this document may be subject to change without prior notice.
Compliance Notice
The information contain herein is in full compliance with the GSMA Antitrust Compliance Policy.
This Permanent Reference Document is classified by GSMA as an Industry Specification, as such it has been developed and is maintained by
GSMA in accordance with the provisions set out GSMA AA.35 - Procedures for Industry Specifications.
V1.0 Page 1 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Table of Contents
1 Introduction 4
1.1 Overview 4
1.2 Scope 5
1.3 Definitions 5
1.4 Abbreviations 6
1.5 References 9
1.6 Conventions 17
2 FWA Devices Architectures 17
2.1 Indoor FWA Solution 18
2.2 Outdoor FWA Solution (single tenant) 19
3 FWA Devices Requirements (Common section) 21
3.1 Radio/RRC/NAS common requirements 21
3.2 Quality of Service 22
3.3 Voice Service 22
3.3.1 Voice General Requirements 22
3.3.2 VoIP service: registration and basic call for single-line profile 23
3.3.3 VoIP service: supplementary services for single-line profile 26
3.3.4 FXS interface requirements 29
3.3.5 FAX and POS (Point of Sale) Requirements 30
3.4 Networking Features 31
3.4.1 Interfaces 31
3.4.2 Performance 32
3.4.3 Protocols 33
3.4.4 DHCP 34
3.4.5 NAT & Bridge operation 35
3.4.6 MTU 35
3.4.7 DNS 35
3.4.8 Security 36
3.4.9 Customisation 37
3.4.10 USB Port 37
3.5 Wi-Fi 38
3.5.1 Standards 38
3.5.2 MIMO capabilities, Bandwidth, Modulation and Coding schemes 39
3.5.3 Performance 39
3.5.4 Service Set Identifier (SSID) 40
3.5.5 Channel and Bandwidth Selection 41
3.5.6 Clients 41
3.5.7 Security 41
3.5.8 Wi-Fi protected Setup (WPS) 42
3.5.9 Band Steering 42
3.5.10 Mesh Networks 43
3.5.11 Wi-Fi Diagnostics 43
3.5.12 Wireless Multimedia Extension 43
V1.0 Page 2 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.5.13 Customisation 43
3.6 IDU/ODU Interworking and Resilience 44
3.6.1 Common requirements to bridged and routed modes of operation 44
3.6.2 ODU Bridged mode operation. 45
3.6.3 Reliability of IDU-ODU operation 46
3.6.4 ODU Routed mode operation. 46
3.6.5 Tunnels/VPNs 47
3.7 Device Management 47
3.7.1 Common Requirements for IDU and ODU 47
3.7.2 Technical Adaptation of FWA Device 52
3.8 Security 52
3.8.1 Passwords 53
3.8.2 Web UI security requirements 54
3.9 User Data Protection and Privacy 54
3.10 Hardware, Safety, EMC requirements and environment operating
conditions 56
3.10.1 General 56
3.11 Stability 57
3.12 User Interface 58
4 Specific Requirements for 4G FWA Devices 58
4.1 Radio/RRC/NAS specific requirements for 4G FWA devices 58
4.2 Antenna Performance Acceptance Values for 4G FWA devices 59
5 Specific Requirements for 5G NSA FWA Devices 60
5.1 Radio/RRC/NAS specific requirements for 5G-FR1 NSA FWA devices. 60
5.2 Radio/RRC/NAS specific requirements for 5G-FR2 NSA FWA devices 61
5.3 Antenna Performance Acceptance Values for 5G NSA FWA devices 62
6 Specific Requirements for 5G SA FWA Devices 63
6.1 Radio/RRC/NAS specific requirements for 5G-FR1 SA FWA devices 64
6.2 Radio/RRC/NAS specific requirements for 5G-FR2 SA FWA devices 65
6.3 Antenna Performance Acceptance Values for 5G SA FWA devices 65
Annex A Hardware, Safety and EMC normative references for European
Market 66
A.1 Safety 66
A.2 EMC 66
A.3 Radio Spectrum 66
A.4 Environment Protection and Energy Efficiency 67
A.5 Environment Operating Conditions 68
Annex B Example of Wi-Fi metrics for Wi-Fi diagnostic 68
Annex C Document Management 69
C.1 Document History 69
C.2 Other Information 69
V1.0 Page 3 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
1 Introduction
1.1 Overview
The use of Fixed Wireless Access (FWA) solutions has become quite popular in the
Ultrabroadband Internet Access market as a cost-effective solution to provide a good
connectivity service to customers, especially in areas in which wireline (FTTx) solutions have
not been yet deployed.
A typical FWA Device is an indoor (1-box) or outdoor (2-box) solution that connects via Radio
Interface to the network of the Service Provider, and offers to the end-user Wi-Fi connectivity,
Fast- or Gigabit-Ethernet ports, and one or two FXS (Foreign eXchange Station) ports for
connecting analog telephones to provide voice service to the end-user.
Several options are available as regards the radio technology for the communication between
the FWA Device and the Network, including WiMax. However, in this context we will focus on
Devices connecting to the mobile network of service operators via standard 4G/4G+/5G
interfaces, as this technology is the natural choice for MNOs and is quickly becoming very
popular in the market.
Provided that the 4G/4G+/5G mobile interface through which the FWA Devices connect to the
network is well defined and standardized, many other functionalities of FWA Devices have not
been standardized so far; this implies that both Operators and Manufacturers need to define
and implement in a customized way many features of the FWA Device and the way the
services are delivered to the end-user.
So, for example, Remote Management of FWA Devices is an area not clearly defined in
standards, although some operators manage such devices via BBF TR-069 ACS (Auto-
Configuration Server).
Voice service is another area in which there isn’t a clearly defined standard for FWA Devices.
Many Devices offer voice service through the adoption of an IR.92 VoLTE stack, but this often
does not fit the needs of a typical land-line service with PSTN Emulation requirements; for this
reason, many Operators prefer to implement a VoIP-based stack, but this is a customized
development which requires a lot of effort in specification definition, implementation and
testing.
Another area still not covered by standards so far is the definition of an open architecture for
outdoor (2-box) FWA Devices. An outdoor solution is typically made of an external Antenna,
also called OutDoor Unit (ODU), providing connection to the mobile network, and an InDoor
Unit (IDU), providing Wi-Fi, networking, Ethernet and Voice Service. The connection between
the two Units is normally done via a Gigabit-Ethernet connection, with Power-over-Ethernet to
provide power supply to the ODU.
Sometimes, the 2 boxes (IDU and ODU) are provided from the same manufacturer as a whole
solution and the protocol used between the two boxes is proprietary or, in general, not public.
Instead, many Operators may want to open the interface between IDU and ODU, as for
example different market segments (consumer, small business, and enterprise) may need
different types of IDU with very different features and services.
V1.0 Page 4 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
1.2 Scope
This document specifies a minimum set of requirements for FWA Devices. The proposed
approach is to define requirements common to the various mobile technologies (4G, 5G NSA,
5G SA), and delta requirements for the requirements specific to each technology.
The requirements are grouped in functional areas (e.g. Radio, Device Management, Voice);
for each area it is indicated where the requirements apply to Outdoor or Indoor FWA solutions
(or both).
• Radio/RRC/NAS
• Use of multiple APNs for differentiating the various services
• Quality of Service
• Voice Service
• Networking Features
• Wi-Fi
• IDU/ODU Interworking and Resilience
• Device Management
• Security
Please note that 3G FWA Devices and multi-SIM FWA Devices are outside the scope of this
document.
1.3 Definitions
Term Description
In an OutDoor FWA Solution, in Bridged mode operation the OutDoor Unit (ODU)
transfers frames (i.e. IP Packets) between each VLAN on the link with the Indoor Unit
Bridged
to the correspondent PDN/PDU Connection on the mobile network, and vice versa.
mode
Therefore, in this operation mode, the behaviour of the ODU corresponds to a Layer
2 bridge between networks with different encapsulations.
In an OutDoor FWA Solution, in Routed mode operation the OutDoor Unit (ODU)
routes frames (i.e., IP Packets) between each VLAN on the link with the Indoor Unit
to the PDN/PDU Connections on the mobile network, and vice versa, by means of IP
Routed routing and IP routing table. Therefore, in this operation mode, the behaviour of the
mode ODU corresponds to an IP (Layer 3) router.
This operation mode normally involves the use of Network Address Translation (NAT)
to route IP packets coming from the private IP addressing space with the IDU, to the
mobile network, and vice versa.
NR FR1
Operating bands below 1GHz for NR.
low-bands
V1.0 Page 5 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Term Description
NR FR1
Operating bands between 1GHz and 2GHz for NR.
mid-bands
NR FR1
Operating bands above 2 GHz for NR.
high-bands
A procedure for changing the voice codec during the active phase of a call, done
Upspeed usually to change to a codec that requires more bandwidth than the one needed for
the original codec.
1.4 Abbreviations
Term Description
3GPP 3rd Generation Partnership Project
4G Fourth-generation technology standard for broadband cellular networks
5G Fifth-generation technology standard for broadband cellular networks
5QI 5G QoS Identifier
ACS AutoConfiguration Server
AES Advanced Encryption Standard
AKA Authentication and Key Agreement
ANR Automatic Neighbour Relation
AP Access Point
APN Access Point Name
ARP Address Resolution Protocol
BBF BroadBand Forum
BRI Basic Rate Interface
CA Carrier Aggregation
CB Communication Barring
CCBS Completion of Communications to Busy Subscriber
CDIV Communication Diversion
CGI Cell Global Identity
CPE Customer Premise Equipment
CSCF Call Session Control Function
CW Communication Waiting
CWMP CPE WAN Management Protocol
DC Direct Current
DLNA Digital Living Network Alliance
DNS Domain Name System
DSCP Differentiated Service Code Point
DSS Dynamic Spectrum Sharing
DTMF Dual-Tone Multi-Frequency signaling
ECT Explicit Communication Transfer
V1.0 Page 6 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Term Description
EEA EPS Encryption Algorithm
EIA EPS Integrity Algorithm
EIRP Equivalent Isotropic Radiated Power
EMC ElectroMagnetic Compatibility
EN-DC E-UTRAN/New Radio Dual Connectivity
EPS Evolved Packet System
ETSI European Telecommunications Standards Institute
Evolved Universal Mobile Telecommunications System (UMTS) Terrestrial Radio
E-UTRAN
Access
FDD Frequency Division Duplex
FQDN Fully Qualified Domain Name
FR Frequency Range
FS Free Space
FTP File Transfer Protocol
FWA Fixed Wireless Access
FXS Foreign eXchange Station
GSM / E-
Global System for Mobile Communication/ Extended-GSM
GSM
GSMA GSM Association
HTTP HyperText Transfer Protocol
ICMP Internet Control Message Protocol
IDU InDoor Unit
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IMS IP Multimedia Subsystem
IP Internet Protocol
ISDN Integrated Services Digital Network
International Telecommunication Union – Telecommunication Standardization
ITU-T
Bureau
LAN Local Area Network
LTE Long Term Evolution
M2M Machine-to-Machine
MAC Media Access Control
MCID Malicious Communication Identification
MIMO Multiple Input Multiple Output
MSS Maximum Segment Size
MTBF Mean Time Between Failure
MTU Maximum Transmission Unit
MWI Message Waiting Indication
V1.0 Page 7 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Term Description
NAS Non-Access Stratum
NAT Network Address Translation
NEA New radio Encryption Algorithm
NIA New radio Integrity Algorithm
NR New Radio
NSA Non Stand-Alone
NSSAI Network Slice Selection Assistance Information
NTP Network Time Protocol
ODU OutDoor Unit
OIP Originating Identification Presentation
OIR Originating Identification Restriction
OTA Over The Air (without cable)
OTT Over The Top
PC Power Class
PCI Physical layer Cell Identifier
P-CSCF Proxy-CSCF
PDN Packet Data Network
PDSCH Physical Downlink Shared Channel
POE Power Over Ethernet
PSK Pre-Shared Key
PSU Power Supply Unit
QCI QoS Class Identifier
QoE Quality of Experience
QoS Quality of Service
RFC Request For Comments
RPC Remote Procedure Call
RRC Radio Resource Control
RSRP Reference Signal Received Power
RSRQ Reference Signal Received Quality
RSSI Received Signal Strength Indicator
RTCP RTP Control Protocol
RTP Real-time Transport Protocol
SA Stand-Alone
SDP Session Description Protocol
Subscriber Identity Module / Universal Subscriber Identity Module (in this document,
SIM/USIM
includes eSIM)
SINR Signal to Interference plus Noise Ratio
SIP Session Initiation Protocol
V1.0 Page 8 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Term Description
SUCI Subscription Concealed Identifier
SUPI Subscription Permanent Identifier
SSID Service Set Identifier
TCP Transmission Control Protocol
TDD Time Division Duplex
TIP Terminating Identification Presentation
TIR Terminating Identification Restriction
TLS Transport Layer Security
TRP Total Radiated Power
TRS Total Radiated Sensitivity
TSG Terminal Steering Group
TWAMP Two-Way Active Measurement Protocol
UDP User Datagram Protocol
UE User Equipment
UI User Interface
URI Uniform Resource Identifier
URL Uniform Resource Locator
URSP UE Route Selection Policy
VLAN Virtual LAN
VOD Video On Demand
VoLTE Voice over LTE
VoIP Voice over Internet Protocol
WAN Wide Area Network
WFA Wi-Fi Alliance
A wireless local area networking technology that uses radio waves to provide
Wi-Fi
wireless high-speed Internet access, defined by IEEE 802.11 standards.
WMM Wi-Fi Multimedia
WPA Wi-Fi Protected Access
WPS Wi-Fi Protected Setup
1.5 References
Ref Doc Number Title
<PRD or document title e.g., “Policy and Procedures for
[1] <e.g., PRD AA.34> Official Documents”. For non-binding documents with no
reference entries, this section may be deleted >
“Key words for use in RFCs to Indicate Requirement Levels”,
[2] RFC 2119 S. Bradner, March 1997. Available at
http://www.ietf.org/rfc/rfc2119.txt
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key
[3] RFC 8174
Words
V1.0 Page 9 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 10 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 11 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 12 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 13 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 14 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 15 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 16 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
1.6 Conventions
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”,
“SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be
interpreted as described in RFC 2119 [2] and clarified by RFC 8174 [3], when, and only
when, they appear in all capitals, as shown here.
V1.0 Page 17 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
An Indoor FWA Device may provide further services, e.g. Smart Home control, but they’re
outside the scope of this document, which focuses on the three services above.
The indoor FWA Device normally offers the following interfaces:
• LAN:
o Ethernet: an FWA Device offers some Ethernet LAN interfaces, of which at
least one LAN interface should be Gigabit Ethernet
o Wi-Fi: an FWA Device offers Wi-Fi interface. Minimum performance
requirements for Wi-Fi are detailed in the specific section.
• Voice Interfaces: an FWA Device must offer at least one analog FXS (Foreign
eXchange Station) port, to be used in association with a single-line (that is, single-
number, single-channel) profile. The availability of two or more FXS interfaces or more
complex interfaces such as ISDN BRI (Basic Rate Interface) are normally associated
to the use with more complex multi-line (multiple-number, multiple-channel) profiles.
V1.0 Page 18 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• WAN: an FWA Device connects to the network via a radio/mobile interface (4G, 5G
NSA, 5G SA). Different PDN connections are used to differentiate quality of service.
The requirements are detailed in the specific section of this document.
The Indoor FWA Device hosts one SIM which allows line identification and authorization to
access the network.
As mentioned at the beginning of the section, this document focuses only on an open,
standard architecture between the OutDoor Unit (ODU) and InDoor Unit (IDU), so that ODU
and IDU also from different manufacturers can be used together to achieve the Outdoor FWA
Solution.
In this version of the document, the single-tenant solution is considered: therefore, each ODU
is coupled 1:1 with an IDU and the resultant FWA Solution is exclusively dedicated to a single
user.
The OutDoor Unit:
• Hosts one physical SIM which allows line identification and authorization to access the
network;
• Provides connectivity to the network, via a radio interface (4G, 5G NSA, 5G SA).
Different PDN connections are used to differentiate quality of service. The
requirements are detailed in the specific section of this document;
V1.0 Page 19 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• Connects to the InDoor Unit, by means of an Ethernet Interface (at least Gigabit
Ethernet), differentiating services by means of VLANs dedicated to Voice, Video and
Data services, where each VLAN maps 1 :1 with a PDN connection;
• Is managed through a centralized Device Management platform. An example is a TR-
69 AutoConfiguration Server (ACS), operated by the Operator. The remote
management serves different purposes, including:
o Provisioning: used for APN configurations, VLAN configurations and other
provisioning activities.
o Assurance: used to perform assurance activities such as re-provisioning,
reboot, factory reset, firmware upgrade, …
o Monitoring: used to monitor Device operation and performance, for example
Device status, Internet access performance measurements, radio parameters.
• Is normally powered through Power over Ethernet from a POE PSU to be installed
indoor, which connects via Ethernet to the IDU;
• Is suitable for outdoor installation. That is, the ODU and its accessories have
Hardware, EMC and Security featues suitable for outdoor installation and compliant to
the current regulations of the country where they are installed.
In summary, the InDoor Unit of the OutDoor FWA Solution can be any Home
Router/Residential Gateway compliant to the requirements detailed in the following sections,
and in particular to the requirements for IDU/ODU interconnection. It is also very similar to an
Indoor FWA Device, with the difference that the IDU of an OutDoor FWA Solution does not
need a SIM and does not connect directly to the mobile network.
V1.0 Page 20 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
All this is possible thanks to some transmission techniques that are able to improve device
performance and leading to an overall higher spectral efficiency:
• Carrier Aggregation: the ability of the device to receive and/or transmit on multiple
bands at the same time.
• MIMO to use multiple antenna elements at the transmitter and the receiver to
improve bit rates and channel quality estimation.
• Higher-Order Modulations provide higher data rates within a given bandwidth; the
drawback is the reduced robustness to noise and interference.
• Higher Maximum Output Power to compensate propagation losses.
TS.64_3.1_REQ_001 The FWA device SHALL support one (1) SIM/USIM. FWA Devices with
multiple SIMs are outside the scope of this document.
TS.64_3.1_REQ_002 The FWA device MAY be equipped with one (1) eSIM, instead of a
physical SIM.
TS.64_3.1_REQ_003 The Indoor FWA Device (1-box solution) SHALL support the
establishment of at least 3 PDNs/PDUs (e.g. for data/remote
management, video, and voice services)
TS.64_3.1_REQ_004 The OutDoor Unit of an OutDoor FWA Solution (2-box) SHALL support
the establishment of at least 4 PDNs/PDUs (e.g. for remote
management of ODU, data/remote management of IDU, video, and
voice services)
TS.64_3.1_REQ_007 The FWA Device SHALL support the establishment of PDNs/PDUs with
the following stacks:
• IPv4 only
• IPv6 only
• IPv4/IPv6
TS.64_3.1_REQ_008 For each PDNs/PDUs, the FWA Device SHALL allow to configure:
• Protocol stack (IPv4, IPv6, IPv4v6);
• Authentication option (PAP/CHAP);
V1.0 Page 21 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• MTU/MSS
Further detailed requirements for FWA Device in this area depend on the specific technology
considered, therefore they are defined in the chapters dedicated to the various technologies
(§ 4.1 for 4G, § 5.1 for 5G-FR1 NSA, § 5.2 for 5G-FR2 NSA, § 6.1 for 5G-FR1 SA, § 6.2 for
5G-FR2 SA).
TS.64_3.2_REQ_002 A wireless service provider utilizes customized QoS for specific category
of subscribers including mission critical organizations, government
entities and enterprise customers. For the latter case, the FWA Device
SHOULD comply with the wireless service provider’s requirements and
mandates.
TS.64_3.3.1_REQ_001 The Indoor FWA Device (1-box solution) SHALL support voice service
either by means of VoLTE technology or VoIP technology.
TS.64_3.3.1_REQ_002 The InDoor Unit of an OutDoor FWA Solution (2-box) SHALL support
voice service uniquely by means of VoIP technology.
TS.64_3.3.1_REQ_003 In case of VoLTE Technology, the FWA Device SHALL be compliant to
GSMA IR.92 [6] profile.
TS.64_3.3.1_REQ_005 In case of VoIP technology, the FWA Device SHALL request a dedicated
PDN Connection.
Note 1: The PDN Connection for VoIP traffic may be characterized with
a dedicated QCI.
Note 2: Voice Traffic includes SIP, RTP, RTCP and DNS traffic used to
resolve the P-CSCF FQDN in order to get the P-CSCF addresses.
TS.64_3.3,1_REQ_007 The FWA Device SHALL be customizable in order not to have any FXS
port or other voice interfaces.
V1.0 Page 22 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.3.2 VoIP service: registration and basic call for single-line profile
TS.64_3.3.2_REQ_002 The FWA Device SHALL use the public user identity defined in 3GPP
23.003 [8]. In particular, the UE SHALL use a SIP URL format, with the
username part in E.164 telephone number, in international format: e.g.
sip:[email protected].
TS.64_3.3.2_REQ_003 The FWA Device SHALL support the private user identity, as specified
in 3GPP TS 23.228 [9] par. 4.3.3.1. This parameter is used as username
in SIP Digest authentication procedure; it is different from public user
identity.
TS.64_3.3.2_REQ_004 The FWA Device SHALL support RFC3263: Location of SIP Servers
[10], for the resolution of FQDN of the outbound proxy. The outcome of
the process of resolution of the P-CSCF FQDN is a set of P-CSCF IP
addresses, ordered by priority.
TS.64_3.3.2_REQ_005 In order to support the P-CSCF FQDN resolution process, the FWA
Device SHALL be configured with DNS Servers addresses. Such
addresses can be obtained during the Voice PDN connection
establishment process.
TS.64_3.3.2_REQ_008 The FWA Device SHALL offer a maximum expire time for Registration
of 600000 seconds.
TS.64_3.3.2_REQ_010 The FWA Device SHALL support the Retry-After header as defined in
RFC3261 [12].
TS.64_3.3.2_REQ_011 In case of Failure of Registration, the FWA Device SHALL follow the
procedures indicated at par. 5.1.1.2.1 of 3GPP TS 24.229 [7].
TS.64_3.3.2_REQ_015 The FWA Device MAY use Tel-URI in outgoing requests, instead of SIP-
URI.
V1.0 Page 23 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.2_REQ_020 The FWA Device SHALL support an open numbering plan, that is the
length of user selection is not predetermined.
TS.64_3.3.2_REQ_021 The FWA Device SHALL use en-bloc selection towards the IMS
network. Overlap selection is not foreseen.
TS.64_3.3.2_REQ_023 The FWA Device SHALL support DSCP marking for SIP, RTP and
RTCP traffic, with configurable values for DS Code Point.
TS.64_3.3.2_REQ_024 The FWA Device MAY insert a P-Preferred-Identity header in any initial
request for a dialog or request for a standalone transaction as a hint for
creation of an asserted identity, as per 3GPP 24.229 [7].
TS.64_3.3.2_REQ_025 The FWA Device SHALL accept incoming INVITE without SDP, in this
case the UE shall perform the SDP offer in the first reliable 1xx or 200
Response, as specified in RFC3262 [14].
TS.64_3.3.2_REQ_026 The FWA Device SHALL support at least the ITU-T G.711 codec (A-law
and µ-law) [18], as specified in RFC3261 [12].
TS.64_3.3.2_REQ_027 The FWA Device SHOULD support ITU-T G.729a [19] [20] and G.722
[21] codecs.
TS.64_3.3.2_REQ_028 If FWA Device supports more than one codec, the order of Codecs in
SDP Offer SHALL be configurable.
TS.64_3.3.2_REQ_029 The FWA Device SHALL send and receive DTMF tones complying with
RFC4733 [17].
TS.64_3.3.2_REQ_030 The RTP Payload Type for DTMF Events SHALL be configurable.
TS.64_3.3.2_REQ_031 The FWA Device SHALL support an echo canceller compliant to ITU-T
G.131 [22], for managing delays less than 150 ms.
V1.0 Page 24 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.2_REQ_036 The FWA Device SHALL use Symmetric RTP and RTCP, i.e. the UE
shall transmit RTP/RTCP packets using the same UDP port used for
receiving RTP/RTCP packets, as stated in RFC 4961 [27].
TS.64_3.3.2_REQ_037 The FWA Device, for Early Media and Ringing Tone Generation, SHALL
be compliant, either to RFC 5009 [28], about P-Early-Media header, or
RFC 3960 [29], in particular with the “Gateway Model”.
TS.64_3.3.2_REQ_038 When a FWA Device has sent the SDP offer, it SHALL be prepared to
receive media for any streams described by that offer, as defined in RFC
3264 [15], even before receiving any SIP provisional response.
TS.64_3.3.2_REQ_039 In case the FWA Device is compliant to RFC 3960, the FWA Device, for
ringing tone generation, SHOULD implement the following local policy,
derived from the example contained in RFC 3960 [29]:
1. Unless a 180 (Ringing) response is received, never generate local
ringing.
2. If a 180 (Ringing) has been received but there are no incoming media
packets or incoming media packets containing silence, generate local
ringing.
3. If a 180 (Ringing) has been received and there are incoming media
packets, not containing silence, play them and do not generate local
ringing.
TS.64_3.3.2_REQ_040 The FWA Device SHALL support RE-INVITE and UPDATE methods.
TS.64_3.3.2_REQ_042 The FWA Device SHALL insert the following header in INVITEs:
Supported:100rel
TS.64_3.3.2_REQ_043 The following parameters SHALL be provisionable for VoIP Service from
the centralized management platform:
• phone number/line identity: user part of the public user identity,
to be used in SIP registration process and in all outgoing SIP
Requests in the From header.
• Authentication username: user part of the private user identity,
to be used during SIP Digest Authentication.
• Authentication password: to be used for user authentication
during SIP Digest Authentication.
• Outbound proxy: FQDN or IP Address of the proxy (P-CSCF) to
which the FWA Device sends all outgoing SIP requests.
V1.0 Page 25 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.2_REQ_045 The FWA Device SHOULD discard silently any SIP/RTP/RTCP packet
coming from IP source addresses different from the IP Address(es) of
the P-CSCF discovered by the Registration Procedure.
TS.64_3.3.2_REQ_046 The FWA Device SHALL support multiple SIP dialogs within a single
session, as specified in RFC3261 [12].
Note: as specified in RFC3261 [12], a dialog is defined by Call-ID, ‘From’
tag, and ‘To’ tag.
TS.64_3.3.2_REQ_047 The FWA Device SHALL support incoming INVITE with the Request-
URI different from the ‘To’ header, as specified in RFC3261 [12].
Note: as an example, this occurs when the incoming INVITE has been
diverted by the network due to some Diversion service.
TS.64_3.3.2_REQ_048 The FWA Device SHALL reply to an incoming INVITE with Request-URI
different from the SIP identity(-ies) configured on the FWA Device itself,
with a 404 Not Found response, as specified in RFC3261 [12].
V1.0 Page 26 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.3.1_REQ_002 The FWA Device SHALL support OIP (Originating Identity Presentation)
and OIR (Originating Identity Restriction) according to 3GPP TS 24.607
[31]. In particular:
• If both From and P-Asserted-Identity headers are present, the UE has
to provide the Originating Identity Presentation giving priority to P-A-I
header with respect to From header.
• If multiple P-A-I headers are present in the incoming messages, the
UE SHALL provide OIP according to the P-A-I in tel-URI format.
TS.64_3.3.3.1_REQ_003 For the purpose of OIP Service, the FWA Device SHALL support ETSI
EN 300 659 on FXS port. In particular, the cases of OIP service
Unsubscribed and Identity Restricted SHALL be treated with the ad-hoc
coding, defined in ETSI EN 300 659_3 par. 5.4.4 [32].
TS.64_3.3.3.1_REQ_004 For the purpose of OIP service on FXS port, the FWA Device SHOULD
allow reformat the Identity to be displayed, so for instance to remove
international prefix from domestic numbers.
TS.64_3.3.3.1_REQ_005 The FWA Device SHOULD perform OIP service on FXS port also in
combination with Call Waiting service.
TS.64_3.3.3.2_REQ_002 The FWA Device SHALL support RFC 3842 “A message summary and
Message Waiting Indication Event Package for the Session Initiation
Protocol” [34] in order to provide Centralized Voice Mail Service.
TS.64_3.3.3.3_REQ_001 The FWA Device SHALL support Anonymous Call Rejection (ACR),
Communication Barring (CB) and Do Not Disturb (DND) services
according to 3GPP TS 24.611 [35].
TS.64_3.3.3.4_REQ_002 The Keypad procedures for holding an active call, switching between an
active and a held call, terminating an active call and resuming an held
call, SHALL be configurable.
TS.64_3.3.3.4_REQ_003 In order to provide PSTN emulation of the hold service, FWA Device
SHOULD hold an active call when the local user presses the Register
Recall (“R” key) on the telephone; after holding the call, offer dial tone
to the telephone, in order to allow dialling a new call.
V1.0 Page 27 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.3.4_REQ_004 When a FWA Device has a held call and user is dialling a new number,
it SHOULD terminate new call attempt and return to the held call, if the
user presses the Register Recall (“R”) key on the telephone during: dial
tone, dialling, ringing, busy, fast busy.
TS.64_3.3.3.4_REQ_005 In order to provide PSTN emulation of the hold service, when a FWA
Device has an active call and a held call, if the user of the FWA Device
hangs up the telephone, the FWA Device SHOULD:
• terminate the active call.
• ring back (recall) the FXS port
• when the local user answers, resume the held call.
• If the local user doesn’t answer in 30 seconds, release the held
call.
TS.64_3.3.3.4_REQ_006 In order to provide PSTN emulation of the hold service, when a FWA
Device has an active call and a held call, if the remote user terminates
the active call, the FWA Device SHOULD:
• Play 5 seconds of fast-busy as a “guard tone”, then
• Resume held call.
TS.64_3.3.3.5_REQ_003 When required, the FWA Device SHALL generate a configurable Call
Waiting Tone (Frequency, Cadence, Level).
TS.64_3.3.3.5_REQ_004 The Call Waiting service SHALL NOT be applied to FXS port in other
states than active conversation (e.g., idle, dialling, ringing, hold,
reorder/congestion.)
TS.64_3.3.3.5_REQ_005 The Keypad procedures for answering a waiting call while holding an
active call, answering a waiting call while terminating an active call,
rejecting a waiting call, SHALL be configurable.
V1.0 Page 28 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.3.5_REQ_008 On a FXS port, at most one active call and one held can be handled
simultaneously. Hence, the FWA Device equipped with one FXS port
SHOULD reject an incoming call with Busy when there are
simultaneously an active call and a held call.
TS.64_3.3.3.6_REQ_001 The FWA Device SHALL support N-Way Conference service according
to 3GPP TS 24.147 [38].
TS.64_3.3.3.7_REQ_001 The FWA Device SHALL support CCBS service according to 3GPP TS
24.642 [39].
TS.64_3.3.3.7_REQ_002 The CCBS ring pattern SHALL be played in case the incoming INVITE
contains the specific Alert-Info Header:
Alert-Info: <urn:alert:service:auto-callback>
TS.64_3.3.3.9_REQ_001 The FWA Device SHOULD support TIP/TIR services according to 3GPP
TS 24.608 [41].
TS.64_3.3.3.10_REQ_00 The FWA Device SHOULD support MCID service according to 3GPP
1 TS 24.616 [42].
TS.64_3.3.4_REQ_001 The FWA Device SHALL support at least one FXS (Foreign eXchange
Station) port, compliant to ETSI ES 201 970 [43].
V1.0 Page 29 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.4_REQ_003 The FXS interface SHALL recognize Register Recall signal, as specified
in ETSI ES 201 970 [43].
TS.64_3.3.4_REQ_005 The FXS interface SHALL support narrowband voice (3.1kHz net
bandwidth, in the range 300-3400 Hz) in conformance to Rec. ITU-T
Q.522 [44].
TS.64_3.3.4_REQ_006 The FXS interface SHOULD support wideband voice (8 kHz bandwidth).
TS.64_3.3.5_REQ_001 The FWA Device SHOULD support FAX and/or POS service using the
same FXS port for voice.
TS.64_3.3.5_REQ_002 The FWA Device SHOULD support FAX transmission, at least by means
of upspeed to ITU-T G.711 [18].
TS.64_3.3.5_REQ_004 The called FWA Device SHOULD send the ReINVITE (upspeed to
G.711), when it detects the CED/ANSam in case of FAX; in case of
modem/POS, the called FWA Device SHOULD send the ReINVITE
(upspeed to G.711), when it detects the modem carrier signal.
TS.64_3.3.5_REQ_005 When performing upspeed to G.711, either initiated by the FWA Device
or by the remote party, the FWA Device SHOULD disable, for the
ongoing call, all voice signal processing features, such as echo
canceller, voice activity detection.
Note: this is needed as voice signal processing features introduce non-
linearities in the coded signal; instead, for the transport of voice-band
V1.0 Page 30 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.3.5_REQ_006 When performing upspeed to G.711, either initiated by the FWA Device
or by the remote party, the FWA Device SHOULD use a static dejitter
buffer.
TS.64_3.3.5_REQ_007 The FWA Device SHOULD support T.38 fax transmission, as specified
in ITU-T T.38 (09/2010) [45]. In particular:
a. The calling FWA Device SHOULD include, in the SDP Offer of the
INVITE, the line a=cdsc:1 image udptl t38
b. The called FWA Device SHOULD perform an upspeed to T.38, when
it detects the V.21 preamble, by sending a ReINVITE, if in the received
INVITE is present the line a=cdsc:1 image udptl t38.
TS.64_3.3.5_REQ_008 The FWA Device MAY support the capabilities for T.38 defined by Annex
D of ITU-T T.38 (11/2015) [46].
TS.64_3.3.5_REQ_009 In case a ReINVITE fails, for example because the remote party is
unable to perform upspeed (i.e. a 488 Not Acceptable Here Response
is received), the FWA Device SHALL continue the session using the
previously negotiated codec(s). In this case, the FWA Device MAY send
a ReINVITE to confirm again to the remote party the previously
negotiated codecs.
TS.64_3.3.5_REQ_010 The FWA Device SHOULD allow, on a per-FXS port basis, the possibility
to choose whether to use only the G.711 codec.
TS.64_3.3.5_REQ_011 When the configuration for use of the G.711 codec only is enabled, the
FWA Device SHOULD disable all voice signal processing features, such
as echo canceller, voice activity detection.
TS.64_3.3.5_REQ_012 When the configuration for use of the G.711 codec only is enabled, the
FWA Device SHOULD use a static dejitter buffer.
TS.64_3.3.5_REQ_013 The FWA Device SHOULD allow the possibility to enable or disable
T.38, on a device basis.
3.4.1 Interfaces
TS.64_3.4.1_REQ_001 The indoor FWA Device and the InDoor Unit of an OutDoor FWA
Solution SHALL support at least two Gigabit Ethernet LAN ports,
compliant to IEEE 802.3ab standard.
TS.64_3.4.1_REQ_002 For the physical interfaces for LAN Ethernet, the 1000BASE-T electrical
interface SHOULD be used.
V1.0 Page 31 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.4.1_REQ_004 The InDoor Unit and the OutDoor Unit of an OutDoor FWA Solution
SHALL have a connection coherent with the LAN-WAN capability of the
Device as defined in the performance requirements below.
TS.64_3.4.1_REQ_005 For the physical interfaces for the IDU-ODU, if Ethernet is used, the
BASE-T electrical interface SHOULD be used.
3.4.2 Performance
TS.64_3.4.2_REQ_001 The 4G FWA Device SHALL offer an aggregate throughput of at least 1
Gb/s bidirectional between LAN interfaces, either Ethernet or WiFi,
irrespective of IPv4 or IPv6 protocol, irrespective of Packet Length.
TS.64_3.4.2_REQ_005 The 4G FWA Device SHALL offer a throughput LAN-WAN coherent with
the LTE UE Category of the Device, irrespective of IPv4 or IPv6 protocol,
irrespective of Packet Length and not affected by the local LAN-LAN
throughput.
TS.64_3.4.2_REQ_006 The 5G FWA Device SHALL offer a throughput LAN-WAN coherent with
5G cellular bandwidth of the FWA Device, irrespective of IPv4 or IPv6
protocol, irrespective of Packet Length and not affected by the local
LAN-LAN throughput.
V1.0 Page 32 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
Note: The table assumes NR channels are TDD configured as 70:30 DL:UL
3.4.3 Protocols
TS.64_3.4.3_REQ_001 The FWA Device SHALL support Internet Protocol version 4 (IPv4),
defined in IETF RFC 791 [60].
TS.64_3.4.3_REQ_002 The FWA Device SHALL support Internet Protocol version 6 (IPv6),
defined in IETF RFC 8200 [61] and further amendments defined by
IETF.
TS.64_3.4.3_REQ_003 The FWA Device SHALL support Address Resolution Protocol (ARP),
defined in IETF RFC 826 [62] and further amendments (IETF RFC 5227
[63], IETF RFC 5494 [64]).
TS.64_3.4.3_REQ_004 The FWA Device SHALL support Network Discovery Protocol for IPv6
(NDP) defined in IETF RFC 4861 [65] and further amendments defined
by IETF.
TS.64_3.4.3_REQ_005 The FWA Device SHALL support Internet Control Message Protocol
(ICMP) defined in IETF RFC 792 [66] and further amendments defined
by IETF (RFC 950 [67], RFC 4884 [68], RFC 6633 [69], RFC 6918 [70]).
TS.64_3.4.3_REQ_006 The FWA Device SHALL support Internet Control Message Protocol
version 6 for IPv6 (ICMPv6) defined in IETF RFC 4443 [71].
TS.64_3.4.3_REQ_007 The FWA Device SHALL implement a Network Time Protocol (NTP)
client as defined in IETF RFC 5905 [72] and further amendments.
TS.64_3.4.3_REQ_008 The FWA Device SHALL support Internet Group Management Protocol,
version 3 (IGMPv3), defined in IETF RFC 3376 [73].
TS.64_3.4.3_REQ_009 The FWA Device SHALL support IGMP Proxy as defined in IETF RFC
4605 [74].
TS.64_3.4.3_REQ_010 The FWA Device SHALL support QoS Treatment both at level 2 (p-bits
of 802.1q VLAN Tag [75]) and at level 3 (Differentiated Services Code
Point of the IP header).
V1.0 Page 33 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.4.3_REQ_011 The FWA Device SHALL support the Differentiated Services (DiffServ)
architecture and behaviours defined in IETF RFC 2474 [76], RFC 2475
[77], RFC 2597 [78], RFC 3260 [79]).
TS.64_3.4.3_REQ_015 The FWA Device SHALL support VLAN Tagging, compliant to IEEE
802.1q standard [75].
3.4.4 DHCP
TS.64_3.4.4_REQ_001 The FWA Device SHALL support Dynamic Host Configuration Protocol
(DHCP) defined in IETF RFC 2131 [98].
TS.64_3.4.4_REQ_002 The FWA Device SHALL support DHCP Options defined in IETF RFC
2132 [99].
TS.64_3.4.4_REQ_003 The FWA device MAY implement DHCP options 60 and 43 for automatic
provision of ACS parameters.
TS.64_3.4.4_REQ_004 The DHCP Server implemented by the FWA Device SHALL manage at
least 254 addresses.
TS.64_3.4.4_REQ_005 It SHALL be possible to define any IPv4 Unicast subnet for the private
LAN and DHCP pool.
TS.64_3.4.4_REQ_006 The DHCP Server implemented by the FWA Device SHALL support
Duplicate Address Detection (DAD) functionality.
TS.64_3.4.4_REQ_007 The DHCP Server implemented by the FWA Device SHALL provide a
mechanism for IP reservation on MAC Address basis, assigning the
same IP address (if available) at the same MAC Address.
TS.64_3.4.4_REQ_008 The FWA Device SHALL support hostnames presented by the hosts
(DHCP clients) with DHCP Option 12.
TS.64_3.4.4_REQ_009 The FWA Device SHALL properly manage the cases of overlapping
hostnames and hostnames non presented by clients, by assigning to
client’s unambiguous hostnames by means of Option 12.
TS.64_3.4.4_REQ_010 The FWA Device SHALL support Dynamic Host Configuration Protocol
for IPv6 (DHCPv6) defined in IETF RFC 8415 [100].
TS.64_3.4.4_REQ_011 The FWA Device SHALL support Prefix Delegation for IPv6 (DHCPv6)
defined in IETF RFC 8415 [100].
V1.0 Page 34 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.4.4_REQ_012 The FWA Device SHALL support Prefix Exclude for IPv6 (DHCPv6)
defined in IETF RFC 8415 [100].
TS.64_3.4.5_REQ_001 The FWA Device SHALL support IP Network Address Translator (NAT)
as defined in IETF RFC 3022 [101].
TS.64_3.4.5_REQ_005 The FWA Device SHALL support CLAT functionality according to IETF
RFC 6145 [103].
3.4.6 MTU
TS.64_3.4.6_REQ_001 The FWA Device SHALL support a default MTU size of 1380 bytes.
TS.64_3.4.6_REQ_003 The FWA Device SHALL support network override of the default MTU
size in IPv4 operation via Protocol Configuration Options (3GPP
TS24.008 [104]).
TS.64_3.4.6_REQ_004 The FWA Device SHALL support network override of the default MTU
size in IPv6 operation via Router Advertisement (IETF RFC 4861 [65]).
3.4.7 DNS
TS.64_3.4.7_REQ_001 The FWA Device SHALL support Domain Name System (DNS)
compliant to IETF RFC 1034 [105], RFC 1035 [106] and further
amendments defined by IETF.
V1.0 Page 35 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.4.7_REQ_003 The FWA Device SHALL be able to advertise the DNS server(s) to the
Hosts in LAN via DHCP protocol. On a configuration basis, the
advertised DNS server(s) can be:
• The FWA Device itself, if it’s configured to act as a DNS Server;
• The DNS server addresses received from the network, if the
FWA Device is not configured to act as a DNS Server;
• Optionally, other DNS Server addresses configured on the FWA
Device.
TS.64_3.4.7_REQ_004 The FWA Device SHALL support a configurable Dynamic DNS (DDNS)
Service, allowing the FWA Device to be addressable from the Internet
with an FQDN.
Note: some MNOs may wish to remove this service via customization.
TS.64_3.4.7_REQ_005 For the Dynamic DNS service, the FWA Device SHALL send updates to
the DDNS server not periodically, but only whenever an IP address
change is detected on the Data WAN Interface.
TS.64_3.4.7_REQ_006 For Static DNS operation the FWA Device SHALL support Recursive
DNS.
TS.64_3.4.7_REQ_007 For Static DNS operation the FWA Device SHALL NOT support Iterative
DNS.
TS.64_3.4.7_REQ_009 The FWA Device SHALL support DNS access via HTTPS (IETF RFC
8484 [107]).
TS.64_3.4.7_REQ_010 The FWA Device SHALL support DNS access via TLS.
TS.64_3.4.7_REQ_011 The FWA device SHALL be protected against DNS Rebind Vulnerability.
3.4.8 Security
V1.0 Page 36 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.4.8_REQ_008 If the FWA Device supports UPnP, rules created for one client device
SHALL apply only to that device and not to other LAN clients (also for
the FWA Device itself).
TS.64_3.4.8_REQ_012 The FWA Device SHALL implement a configurable (at least with on/off
behaviours) stateful IPv4 Firewall.
TS.64_3.4.8_REQ_013 The FWA Device SHALL implement a Denial of Service (DoS) protection
functionality.
TS.64_3.4.8_REQ_014 The DoS functionality SHALL remain enabled even when the Firewall
has been disabled by user configuration
TS.64_3.4.8_REQ_015 The behaviour of the FWA Device to ICMP messages coming from WAN
interface SHALL be configurable.
TS.64_3.4.8_REQ_016 The FWA Device SHALL implement a configurable (at least with on/off
behaviours) stateful IPv6 Firewall.
TS.64_3.4.8_REQ_018 The IPv6 and IPv4 firewall status SHALL be presented independently.
TS.64_3.4.8_REQ_019 The FWA Device SHALL NOT allow outgoing traffic originated from a
LAN IP address outside the range defined by the FWA Device itself.
TS.64_3.4.8_REQ_020 In Factory Reset condition, the status of the firewall SHALL be enabled.
3.4.9 Customisation
TS.64_3.4.10_REQ_001 The FWA Device MAY support a Universal Serial Bus (USB) interface.
V1.0 Page 37 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
The following requirements apply ONLY IF the FWA Device supports a USB Interface for
functions other than powering the FWA Device.
TS.64_3.4.10_REQ_002 The USB interface SHALL be compliant to the Universal Serial Bus
Specification version 3.1 [108] or higher.
TS.64_3.4.10_REQ_005 The FWA Device SHALL integrate the USB Mass Storage Device Class
driver, to provide the automatic detection of an USB Mass Storage (such
as Hard Disk, CD/DVD ROM, USB memory stick, etc.) connected to the
USB Host Port.
TS.64_3.4.10_REQ_006 The FWA Device SHALL integrate the USB Printer Device Class driver,
to provide the automatic detection of an USB Printer connected to the
USB Host Port.
TS.64_3.4.10_REQ_007 The FWA Device SHOULD use SMBv2 (or higher) protocol to enable
the sharing of an USB Mass Storage Hard Disk Devices between LAN
hosts.
TS.64_3.4.10_REQ_008 The FWA Device SHOULD use SMBv2 (or higher) protocol to enable
the print sharing between the LAN hosts, supporting the standard error
messages via SMB protocol.
TS.64_3.4.10_REQ_010 The USB Interface SHALL block firmware upgrade, logging, tracing and
similar local management and troubleshooting activities on the FWA
Device.
3.5 Wi-Fi
Requirements in this section apply to the Indoor FWA Solution and to the InDoor Unit (IDU)
of the Outdoor FWA Solution. There may be MNO or market specific Wi-Fi requirements for
the outdoor unit (ODU).
3.5.1 Standards
TS.64_3.5.1_REQ_001 The FWA Device SHALL integrate a Wi-Fi 4 (IEEE 802.11n [83]) Access
Point (AP), or later standards, operating on 2.4 GHz bands.
TS.64_3.5.1_REQ_002 The FWA Device SHALL integrate a Wi-Fi 5 (IEEE 802.11ac [84])
Access Point (AP), or later standards, operating on 5 GHz bands.
TS.64_3.5.1_REQ_003 The FWA Device SHOULD integrate a Wi-Fi 6 (IEEE 802.11ax [85])
Access Point (AP), or later standards, operating on both 2.4 and 5 GHz
bands.
TS.64_3.5.1_REQ_004 The FWA Device MAY integrate a Wi-Fi 6E (IEEE 802.11ax [85]) Access
Point (AP), or later standards, operating on 2.4, 5 and 6 GHz bands.
TS.64_3.5.1_REQ_005 The FWA Device SHALL be certified (WFA Certification Program): Wi-
Fi CERTIFIED 5.
V1.0 Page 38 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.5.1_REQ_008 The FWA Device SHALL be certified (WFA Certification Program): Wi-
Fi Protected Setup (PBC).
TS.64_3.5.2_REQ_002 The Wi-Fi AP of a FWA Device SHOULD support MIMO 4x4 on all
supported frequency bands.
TS.64_3.5.2_REQ_003 The Wi-Fi AP of a FWA Device MAY support MIMO higher than 4x4 on
some or all supported frequency bands.
TS.64_3.5.2_REQ_010 An 802.11n AP of a FWA Device SHALL support all the Modulation and
coding schemes foreseen by the standard, up to 64-QAM with coding
5/6.
TS.64_3.5.2_REQ_011 An 802.11ac AP of a FWA Device SHALL support all the Modulation and
coding schemes foreseen by the standard, up to 256-QAM with coding
5/6.
TS.64_3.5.2_REQ_012 An 802.11ax AP of a FWA Device SHALL support all the Modulation and
coding schemes foreseen by the standard, up to 1024-QAM with coding
5/6.
3.5.3 Performance
TS.64_3.5.3_REQ_001 The AP of a FWA Device SHALL offer a throughput coherent with the
theoretical maximum physical bit rate attainable by the AP
characteristics, at least 70% of Maximum Physical Speed with TCP and
UDP traffic in a “clean” environment
V1.0 Page 39 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.5.3_REQ_002 All the Wi-Fi interfaces SHALL NOT exceed the regulatory limits as
regards output power level (EIRP).
TS.64_3.5.3_REQ_003 For Wi-Fi antenna performance, the FWA Device SHALL comply to the
requirements specified in TS.49 [97].
Figures for selected Wi-Fi AP types are as follows:
802.11ax 2.4+5 GHz, MIMO 2x2 + 2x2, 80 MHz, 1024-QAM 600 + 1200 Mbps
802.11ax 2.4+5 GHz, MIMO 2x2 + 2x2, 160 MHz, 1024-QAM 600 + 2400 Mbps
802.11ax 2.4+5 GHz, MIMO 4x4 + 4x4, 160 MHz, 1024-QAM 1200 + 4800 Mbps
TS.64_3.5.4_REQ_001 The AP of a FWA Device SHALL permit the configuration of one main
SSID for each supported band.
TS.64_3.5.4_REQ_002 The AP of a FWA Device SHALL permit the configuration of at least one
guest SSID.
TS.64_3.5.4_REQ_003 The guest SSID(s) SHALL NOT permit the access to the configuration
of the FWA Device.
TS.64_3.5.4_REQ_004 The guest SSID(s) SHALL NOT permit traffic between hosts in LAN.
TS.64_3.5.4_REQ_008 The default configuration of the FWA Device SHALL be with the same
SSID for all supported bands.
V1.0 Page 40 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.5.5_REQ_001 The AP of a FWA Device SHALL permit the manual channel selection
on all supported bands.
TS.64_3.5.5_REQ_005 The default value for Periodic Automatic Channel Selection SHOULD be
24 hours.
TS.64_3.5.5_REQ_007 The AP of a FWA Device SHALL permit the manual Bandwidth selection
on all supported bands.
3.5.6 Clients
3.5.7 Security
TS.64_3.5.7_REQ_001 The AP of a FWA Device SHALL support all encryption algorithms
foreseen by the supported standards.
TS.64_3.5.7_REQ_002 The AP of a FWA Device SHALL support all security and authentication
features foreseen by the supported standards.
TS.64_3.5.7_REQ_005 The AP of a FWA Device SHALL support Wi-Fi Alliance Wi-Fi Protected
Access 3 (WPA3) [110].
TS.64_3.5.7_REQ_007 The AP of a FWA Device SHALL support CTR mode with CBC-MAC
Protocol (CCMP) security protocol, also known as Advanced Encryption
Standard (AES).
V1.0 Page 41 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.5.7_REQ_010 The FWA Device default configuration SHALL be personal mixed mode
WPA2/WPA3 with AES.
TS.64_3.5.7_REQ_013 The procedure to set the Wi-Fi passphrase to a different value SHALL
be supported by a mechanism showing the strength of the new desired
passphrase based on the number of characters and classes of
characters (e.g. numbers, letters).
TS.64_3.5.7_REQ_014 The FWA Device SHALL implement a configurable overall Wi-Fi control
functionality, letting the user to configure which days of the week/which
hours of the day the wireless service is turned ON/OFF.
TS.64_3.5.8_REQ_001 The AP of a FWA Device SHALL support WPS in order to facilitate the
association between clients and the AP of the FWA Device.
TS.64_3.5.8_REQ_002 The AP of a FWA Device SHALL support WPS with Push Button mode.
TS.64_3.5.8_REQ_003 The WPS Push Button MAY be either physical or logical (i.e., in the Web
UI of the FWA Device) or both.
TS.64_3.5.8_REQ_004 The AP of a FWA Device SHALL support WPS PIN mode, with PIN
generated by client.
TS.64_3.5.8_REQ_005 The WPS PIN mode with PIN generated by the AP of the FWA Device
SHALL be forbidden.
TS.64_3.5.8_REQ_006 WPS Push Button authentication SHALL only allow a limited number of
attempts per period of time, to be protected against brute force attacks.
TS.64_3.5.9_REQ_002 The AP of a FWA Device SHALL support IEEE 802.11v [87] industry
standard to allow configuration of client devices while connected to
wireless networks,
TS.64_3.5.9_REQ_003 The AP of a FWA Device SHALL support Band Steering to steer clients
from the more congested 2.4 GHz band to the less congested bands (5
GHz, and 6GHz if supported).
V1.0 Page 42 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.5.10_REQ_001 The AP of a FWA Device SHALL comply to the Wi-Fi Alliance Easy
Mesh™ R2 (or later) standard.
TS.64_3.5.10_REQ_002 The FWA Device SHALL manage the connectivity of Wi-Fi clients and
implement AP steering to guarantee that each client is always connected
to the best AP and frequency band.
TS.64_3.5.10_REQ_003 The AP of a FWA Device SHALL support IEEE 802.11r [88] industry
standard to allow fast transition of clients between BSS (Basic Service
Sets),
TS.64_3.5.11_REQ_001 The FWA Device SHALL collect Wi-Fi metrics related to its AP and the
connected clients as shown in Annex B.
TS.64_3.5.11_REQ_002 Wi-Fi Diagnostics data SHALL be available to be collected from the FWA
Device by means of TR-069.
TS.64_3.5.11_REQ_003 Additional protocols for allowing the collection of Wi-Fi Diagnostics data
from the network MAY be used.
TS.64_3.5.11_REQ_004 The Wi-Fi Diagnostic solution SHALL collect data also from the other
APs connected in mesh, as well as from the clients connected to those
APs.
TS.64_3.5.12_REQ_002 If WMM™ is supported, the FWA Device SHALL provide the mechanism
to enable/disable the feature and to configure the mappings (Access
Categories vs DSCP).
3.5.13 Customisation
TS.64_3.5.13_REQ_001 It SHALL be possible for a MNO to customize the settings of a FWA
Device as regards Wi-Fi region/country of operation, enabled bands and
channels, power transmission limits, SSIDs, passphrases.
V1.0 Page 43 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.6.1.1_REQ_001 The OutDoor Unit (ODU) in an OutDoor FWA Solution, SHALL be able
to map the traffic received on each PDN Connection / PDU Session, on
different VLANs over the interface with the InDoor Unit (IDU), and vice
versa.
TS.64_3.6.1.1_REQ_002 The IDU SHALL be able to map the different traffic generated by the IDU
itself or by hosts in LAN, and destined to the WAN, on different VLANs
over the interface with the ODU, based on Service/VLAN mapping rules
defined on the IDU.
TS.64_3.6.1.1_REQ_003 IDU and ODU SHALL be able to manage at least 4 VLANs over the IDU-
ODU interface.
An example of service/VLAN mapping is:
• IDU remote management – VLAN ‘a’
• Data/Internet traffic – VLAN ‘b’
• Voice (VoIP) – VLAN ‘c’
• Video – VLAN ‘d’
TS.64_3.6.1.2_REQ_002 The ODU SHALL allow to configure one PDN connection / PDU session
to be locally terminated in the ODU itself, that is to operate in routed
mode without being mapped on a VLAN with the IDU.
Note: for example, this connection may be dedicated to ODU Remote
Management.
V1.0 Page 44 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.6.1.2_REQ_003 When using DHCP with the IDU, the ODU SHALL define an IP Address
Lease Time and configure it to the IDU by means of DHCP Option 51.
TS.64_3.6.1.2_REQ_004 The ODU SHOULD define an IP Address Lease Time in the interval 1
hour (3600 seconds) - 12 hours (43200 seconds).
TS.64_3.6.1.2_REQ_005 When using DHCP with the IDU, the ODU SHALL be able to provide the
IDU with the Interface MTU parameter, by means of DHCP Option 26,
over each VLAN, using the IPv4 Link MTU received from the Mobile
Network on the corresponding PDN/PDU.
TS.64_3.6.1.2_REQ_006 The ODU and the IDU SHALL use, on each VLAN, Address Resolution
Protocol (ARP) or Network Discovery Protocol for IPv6 (NDP) in order
to properly maintain the association between IP Addresses and MAC
Addresses, on each VLAN.
TS.64_3.6.1.2_REQ_007 The ODU SHALL use a unique MAC Address per each VLAN; the same
MAC Address is meant to be used, on a VLAN, both for data traffic
exchange with the IDU and for ARP/NDP communications with the IDU.
TS.64_3.6.1.2_REQ_008 The IDU SHALL use a unique MAC Address per each VLAN; the same
MAC Address is meant to be used, on a VLAN, both for data traffic
exchange with the ODU and for ARP/NDP communications with the
ODU.
TS.64_3.6.1.2_REQ_009 The ODU SHALL reply, on each VLAN, to ARP Requests generated by
IDU, relating to the IP Address of the Default Gateway, with its own MAC
Address dedicated to that VLAN.
TS.64_3.6.1.2_REQ_010 The ODU and the IDU SHOULD support 802.1X authentication [111],
where the IDU has the role of the Supplicant, and the ODU has the Role
of the Authenticator.
TS.64_3.6.1.2_REQ_011 For the purpose of 802.1X, the ODU MAY have also the role of local
Authentication Server.
V1.0 Page 45 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.6.4_REQ_002 In routed mode operation, the ODU SHALL retain for itself the IP
Address received from the mobile network over a APN/DNN.
TS.64_3.6.4_REQ_003 In routed mode operation, the ODU SHALL be able to configure the IP
Address of the IDU, on each VLAN configured in routed mode, by means
of DHCP, using a private IP address pool.
TS.64_3.6.4_REQ_004 In routed mode operation, if DHCP is used, then ODU SHALL provide
via DHCP also:
• The DNS Server IP Address(es), which can be either the ODU
itself or the Servers received from network;
• The Default Gateway (Router), which is the IP Address of the
ODU over the IDU-ODU connection.
TS.64_3.6.4_REQ_005 In routed mode operation, the ODU SHALL be able to manage statically
configured addresses for:
• The IP Address of the IDU over the IDU-ODU connection: this
is a directly connected interface
• The LAN of the IDU: this will be a subnet routed through the IP
Address of the IDU.
V1.0 Page 46 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_3.6.4_REQ_006 In routed mode operation, the ODU SHALL perform NAT of traffic
coming from the IDU and destined to the Network.
3.6.5 Tunnels/VPNs
TS.64_3.6.5_REQ_001 The IDU SHALL be able to establish, through the ODU, one or more
Tunnels or VPN connections, based on IPSec or PPTP or GRE, over
one or more VLANs, towards Tunnel/VPN Terminators in the network.
For this purpose, TR-069 protocol provides the chance to execute Device management and
monitoring operations such as read and write parameters, perform a firmware upgrade etc.
TS.64_3.7_REQ_001 The FWA Device SHALL support broadband forum (BBF) TR-069
Device WAN Management Protocol (Issue:6 corrigendum 1 CWMP
Version 1.4 or later) [47].
All objects and parameters describing the many different functions and capabilities of the
FWA Devices are hierarchically organised in a XML scheme called “data model”.
• Root: used to describe the main functions necessary to CWMP (e.g. interfaces,
SW/FW Diagnostics, basic Device information)
o TR-140: TR-069 Data Model for Storage Service Enabled Devices, Issue 1,
Amendment 3 [50]
1. RPC methods
2. Data model structure
3. Security
4. Performance monitoring
5. Data model parameters
V1.0 Page 47 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
This is a GSMA minimum set of requirements and then MNOs can add extra metrics according
to their needs.
TS.64_3.7.1.1_REQ_001 The FWA Device SHALL support the following FWA Device RPC
Methods, as reported in TR-069 (Issue:6 corrigendum 1 CWMP Version
1.4) technical report, section 3.6 [47]:
• GetRPCMethods
• SetParameterValues
• GetParameterValues
• GetParameterNames
• SetParameterAttributes
• GetParameterAttributes
• AddObject
• DeleteObject
• Reboot
• Download
TS.64_3.7.1.1_REQ_002 The FWA Device SHALL support the following ACS RPC Methods, as
reported in TR-069 (Issue:6 corrigendum 1 CWMP Version 1.4)
technical report, section 3.6 [47]:
• Inform
• TransferComplete
TS.64_3.7.1.1_REQ_003 The FWA Device SHOULD support the following FWA Device RPC
Methods:
• Upload
• FactoryReset
• TR-098: Internet Gateway Device Data Model for TR-069 [52]. The data model
defined in this specification is DEPRECATED since proved to be inflexible and
caused problems in representing complex Device configurations; accordingly, it
should be used only by legacy Devices.
• TR-181: Device Data Model for TR-069 [53]. This technical report covers the same
functionality of TR-098 plus several extensions as well as IPv6 support and interface
stacking mechanism.
For all FWA Devices and upgrades of existing Devices the “Device:2”
TS.64_3.7.1.2_REQ_001
data model defined in TR-181 Issue 2 [53] SHALL be used.
V1.0 Page 48 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.7.1.3 Security
The FWA Device SHALL support TLS 1.2 [54] and any earlier versions
TS.64_3.7.1.3_REQ_001 that are still valid in standards.
Signalling request from the device to the ACS SHALL indicate the
TS.64_3.7.1.3_REQ_005
latest version of TLS that the device supports.
The FWA Device SHALL fall back to an earlier version of TLS if that is
TS.64_3.7.1.3_REQ_006
requested by the ACS.
The FWA Device SHALL support the mandatory cipher suites for all
TS.64_3.7.1.3_REQ_007
supported TLS versions.
V1.0 Page 49 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
The FWA Device SHALL support both FWA Device initiated and
TS.64_3.7.1.4_REQ_002
Network Initiated diagnostics TR-143 approaches.
The FWA Device SHALL support both size-based and time-based TR-
TS.64_3.7.1.4_REQ_003
143 throughput testing approaches.
In order to increase the rate that a specific link can be tested, the FWA
TS.64_3.7.1.4_REQ_004
Device SHOULD support TCP multi-thread for TR-143 downlink and
uplink throughput test.
The FWA Device SHALL support both FTP and HTTP transport for
TS.64_3.7.1.4_REQ_005
Download and Upload diagnostics.
The FWA Device SHALL support UDP Echo Plus methodology for
TS.64_3.7.1.4_REQ_006
latency and packet loss evaluation (One Way Packet Loss, Round Trip
Delay, One Way IP Packet Delay Variation).
TS.64_3.7.1.5_REQ_001 The Data model of the FWA Device SHALL contain a set of data object
concerning the ACS parameter:
• ACS Url
• ACS Username
• ACS Password
• Connection Request URL
• Connection Request Username
• Connection Request Password
• Periodic Inform Interval
TS.64_3.7.1.5_REQ_002 The Data model of the FWA Device SHALL contain a set of data object
concerning APNs info, making a clear distinction between the various
APN types (Management, Data, Voice):
• APN Name
• IP Address and Subnet Mask
• IP stack (IPv4, IPv6, IPv4v6)
• APN Authentication Type
• APN Username
• APN Password
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_003
concerning FWA Device info:
• Serial Number
V1.0 Page 50 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• IMEI
• Software/Firmware Version
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_004
concerning SIM info:
• MSISDN
• IMSI
• ICCID
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_005
concerning network info:
• PLMN ID
• Global Cell ID
• TAC
• PCI
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_006
concerning radio condition, making a clear distinction between 4G and
5G NSA/SA parameter:
• Connected bands
• RSRP
• RSRQ
• SINR
If the FWA Device supports VoIP, the Data model SHALL contain a set
TS.64_3.7.1.5_REQ_007
of data object concerning voice service, as specified in
TS.64_3.3.2_REQ_043.
If the FWA Device supports Voice service (VoIP or VoLTE), the Data
TS.64_3.7.1.5_REQ_008
model SHALL contain the status of SIP registration.
If the FWA Device supports Wi-Fi access point, the Data model SHALL
TS.64_3.7.1.5_REQ_009
contain a set of data object concerning Wi-Fi service:
• SSID
• Channel
• Password
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_010
concerning networking (eg. VLAN ID).
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_011
concerning Devices connected to the FWA Device, both via Wi-Fi or
Ethernet:
• Host name
• Connected IP Address
• MAC Address
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_012
concerning TR-143 Diagnostic Parameter:
• Download URL
• Interface
• Ethernet Priority
• DSCP
• BOM Time
• EOM Time
• Test Bytes Received
• Diagnostic Max Connection for multi-thread connections
V1.0 Page 51 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
The Data model of the FWA Device SHALL contain a set of data object
TS.64_3.7.1.5_REQ_013
concerning NTP service.
3.8 Security
To prevent attacks on secured connections and on the CPE itself, the
TS.64_3.8_REQ_001
FWA Device SHALL have unique cryptographic keys and secrets per
each sample in the factory setting condition.
The FWA Device SHALL support remote firmware upgrade via the
TS.64_3.8_REQ_003
WAN connection.
The FWA Device SHALL provide at least two different methods to the
TS.64_3.8_REQ_007
end-user to request the factory reset, e.g. Web UI and pinhole/reset
button on the case of the FWA Device.
The FWA Device SHALL allow the customization of the active services
TS.64_3.8_REQ_009
and corresponding open ports, based on MNOs requirements.
Any other port on any interface of the FWA Device, out of those
TS.64_3.8_REQ_010
defined by MNO custom requirements, SHALL be closed at all times.
V1.0 Page 52 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.8.1 Passwords
Access to the configuration of the FWA Device SHALL be secured by a
TS.64_3.8.1_REQ_001
password, both in Factory Reset condition (preset password used with
factory settings) and after user customization.
The preset password used with factory settings SHALL NOT contain
TS.64_3.8.1_REQ_002
information derived from data or parts of data related to the FWA
Device itself (e.g. manufacturer, model name, MAC address, IMEI, …)
The FWA Device SHALL prevent the user from selecting a weak
TS.64_3.8.1_REQ_007
password without being warned about doing so.
V1.0 Page 53 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
The FWA Device MAY offer to the end-user remote access to the
TS.64_3.8.2_REQ_004
configuration via WAN interface, e.g. through a Web server.
The FWA Device SHALL allow the end-user to display the version
TS.64_3.8.2_REQ_012
number of the firmware currently installed on the Device.
• Data essential for the basic services of the FWA Device: for example, the MAC
Addresses of the hosts connected in LAN to the FWA Device are needed in order to
properly route data traffic to/from these hosts.
• Data useful to provide additional services of the FWA Device: for example, the call
log, that is the list of received, placed and missed voice calls, may be a useful service
provided by the FWA Device, although it is based on sensitive data.
V1.0 Page 54 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• Data useful to provide additional services offered by the MNO using a combination of
features local to the FWA Device and remotely located in the network: for example,
MAC Addresses and hostnames may be used by Wi-Fi diagnostics applications, to
provide the end-user hints and advice to optimize the Wi-Fi performance in the home
network.
The nature and amount of user personal data being stored, processed
TS.64_3.9_REQ_001
and transmitted by the FWA Device SHALL be clearly identified and
declared.
Personal data in the FWA Device SHALL be presented to the end user
TS.64_3.9_REQ_005
only upon authenticated access and by means of secure protocols.
Personal data in the FWA Device SHALL NOT be shared with other
TS.64_3.9_REQ_007
parties other than the MNO providing the service and/or its business
partners specifically identified by the MNO.
V1.0 Page 55 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.10.1 General
The FWA Device SHALL comply to the safety, health and
TS.64_3.10.1_REQ_001
environmental protection regulations of the market where it is meant to
be used.
For the Indoor FWA Device and the InDoor Unit of the OutDoor FWA
TS.64_3.10.1_REQ_005
Solution, the maximum allowed temperature on the different parts of
the enclosure, except the one on the bottom side, in any environmental
condition during stationary use, shall be not higher than 55°C.
Regarding the insulation against water and dust, the OutDoor Unit of
TS.64_3.10.1_REQ_007
the OutDoor FWA Solution SHALL be compliant at least to the class
IP65 of the international standard IEC 60529 [89].
Regarding the electrical resistibility, the Indoor FWA Device and the
TS.64_3.10.1_REQ_008
InDoor Unit of the OutDoor FWA Solution SHALL comply with basic
requirements defined by Rec. ITU-T K.21 [90] (Resistibility of
telecommunication equipment installed in customer premises to
overvoltages and overcurrents) and K.44 [91] (Resistibility tests for
telecommunication equipment exposed to overvoltages and
overcurrents – Basic Recommendation).
The FWA Device SHALL have a MTBF (Mean Time Between Failure)
TS.64_3.10.1_REQ_010
not shorter than 7 years at 30 °C.
V1.0 Page 56 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
3.11 Stability
In case of loss of power, when the power is restored the FWA Device
TS.64_3.11_REQ_001
SHALL return automatically to the operational state, with all services
(e.g., data, voice) restored according to the configuration of the device
prior the power interruption.
In case of loss of radio signal(s), when the radio signal is restored the
TS.64_3.11_REQ_002
FWA Device SHALL return automatically to the operational state, with
all services (e.g., data, voice) restored according to the configuration of
the device prior the radio signal interruption.
Note: this objective considers only the availability of the Device itself,
not the availability of the network.
Note: this objective considers only the availability of the Device itself,
not the availability of the network.
As regards the performance targets reported at sect. 3.4 and 3.5, with
TS.64_3.11_REQ_008
reference to 3GPP TS 36.101 [93] (for 4G), TS 38.101-1 [94] (5G FR1)
and TS 38.101-2 [95] (5G FR2), the Indoor FWA Device and the
InDoor Unit of the OutDoor FWA Solution SHALL offer:
V1.0 Page 57 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
As regards the performance targets reported at sect. 3.4 and 3.5, with
TS.64_3.11_REQ_009
reference to 3GPP TS 36.101 [93] (for 4G), TS 38.101-1 [94] (5G FR1)
and TS 38.101-2 [95] (5G FR2), the Indoor FWA Device and the
InDoor Unit of the OutDoor FWA Solution SHALL offer:
TS.64_4.1_REQ_002 The FWA device SHALL support EEA0 Null Encryption Algorithm.
TS.64_4.1_REQ_003 The FWA device SHALL support 128-EEA1 EPS Encryption Algorithm
(based on SNOW 3G algorithm) for both RRC signalling ciphering and
User Plane ciphering.
TS.64_4.1_REQ_004 The FWA device SHALL support 128-EEA2 EPS Encryption Algorithm
(based on AES algorithm) for both RRC signalling ciphering and User
Plane ciphering.
TS.64_4.1_REQ_006 The FWA device SHALL support EIA0 Null Integrity Algorithm.
V1.0 Page 58 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
TS.64_4.1_REQ_007 The FWA device SHALL support 128-EIA1 EPS Integrity Algorithm
(based on SNOW 3G algorithm) for both RRC and NAS signalling
integrity protection.
TS.64_4.1_REQ_008 The FWA device SHALL support 128-EIA2 EPS Integrity Algorithm
(based on AES algorithm) for both RRC and NAS signalling integrity
protection.
TS.64_4.1_REQ_009 The FWA device SHOULD support 128-EIA3 EPS Integrity Algorithm
(based on ZUC algorithm) for both RRC and NAS signalling integrity
protection.
V1.0 Page 59 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
GSMA TS.24 (Operator Acceptance Values for Device Antenna Performance) version 6
onwards has specific focus on FWA Devices, as they have different form factor which may
improve Antenna performance.
V1.0 Page 60 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 61 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 62 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 63 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 64 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
V1.0 Page 65 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
A.1 Safety
• EN 50385:2017 (Product standard to demonstrate the compliance of base station
equipment with electromagnetic field exposure limits (110 MHz - 100 GHz), when
placed on the market).
A.2 EMC
• IEC EN 55032:2015 + A1:2020 - class B limits (Electromagnetic compatibility of
multimedia equipment - Emission requirements).
• ETSI EN 301 489-1 V2.2.3 (EMNC Standard for Radio Equipment and services –
Part1: Common Requirements).
• ETSI EN 301 489-17 V3.2.4 (Part 17: Specific conditions for Broadband Data
Transmission Systems).
• ETSI EN 301 489-19 V2.2.1 Specific conditions for Receive Only Mobile Earth
Stations (ROMES) operating in the 1,5 GHz band providing data communications
and GNSS receivers operating in the RNSS band (ROGNSS) providing positioning,
navigation, and timing data.
• ETSI EN 301 489-52 V1.2.2 (Part 52: Specific conditions for Cellular
Communications User Equipment’s).
• ETSI EN 301 893 V2.1.1 (5 GHz RLAN; Harmonised Standard covering the essential
requirements of article 3.2 of Directive 2014/53/EU).
• ETSI EN 301 908-1 V15.1.1 (IMT cellular networks; Harmonised Standard covering
the essential requirements of article 3.2 of the Directive 2014/53/EU; Part 1:
Introduction and common requirements).
V1.0 Page 66 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• ETSI EN 301 908-2 V13.1.1 MT cellular networks; Harmonised Standard for access
to radio spectrum; Part 2: CDMA Direct Spread (UTRA FDD) User Equipment (UE).
• ETSI EN 301 908-13 V13.2.1 (IMT cellular networks; Harmonised Standard covering
the essential requirements of article 3.2 of Directive 2014/53/EU; Part 13: Evolved
Universal Terrestrial Radio Access (E-UTRA) User Equipment (UE)).
• Draft ETSI 301 908-25 V15.1.1 IMT cellular networks - Harmonised Standard for
access to radio spectrum - Part 1: Introduction and common requirements Release
15.
• EN 303 413 V1.2.1 Satellite Earth Stations and Systems (SES); Global Navigation
Satellite System (GNSS) receivers; Radio equipment operating in the 1164 MHz to
1300 MHz and 1559 MHz to 1610 MHz frequency bands; Harmonised Standard for
access to radio spectrum.
• ETSI TS 138 521-1 V17.5.0 5G; NR; User Equipment (UE) conformance
specification; Radio transmission and reception; Part 1: Range 1 standalone (3GPP
TS 38.521-1 version 17.5.0 Release 17).
• ETSI TS 138 521-3 V17.5.0 5G; NR; User Equipment (UE) conformance
specification; Radio transmission and reception; Part 3: Range 1 and Range 2
Interworking operation with other radios (3GPP TS 38.521-3 version 17.5.0 Release
17).
• Directives RoHS 2011/65/UE and WEEE 2012/19/UE, and the related conformity
assessment procedures.
• For the operation in the European Union (EU), considering the obligations of the
applicable Directives, the manufacturer of the FWA Device shall provide the full text
of the Declaration of Conformity (DoC) and the Technical File, which shall include the
Technical Documentation (TD) compliant with the conformity assessment procedure
used under the applicable product Directives.
V1.0 Page 67 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
• ETSI ETS 300 019-1-2 [] as regards transportation for equipment in class 2.3 (Public
transportation).
• For the Indoor FWA Device and the InDoor Unit of the OutDoor FWA Solution, ETSI
EN 300 019-1-3 [] as regards stationary use in Environmental Class T 3.1
“Temperature-controlled locations”.
• For the OutDoor Unit of the OutDoor FWA Solution, ETSI EN 300 019-1-4 [] as
regards stationary use in Environmental Class T 4.1 “Non-weather protected
locations”.
• For the OutDoor Unit of the OutDoor FWA Solution, IEC EN 60068-2-52 as regards
the corrosion produced by salt-laden atmosphere - severity (1).
• ETS 300 019-2-3 as regards the mechanical stress, (severity Class T3.2).
a. IEC EN 60068-2-27 Test Ea – Shock: according to, with test severity defined for the
Class T3.2 by the standard ETS 300 019-2-3
b. IEC EN 60068-2-64 Test Fh – Random: according to, with test severity defined for
the Class T3.2 by the standard
c. IEC EN 60068-2-6 Test Fc – Sinusoidal Vibration: according to, with test severity
defined for the Class T3.2 by the standard ETS 300 019-2-3
V1.0 Page 68 of 69
GSM Association Non-confidential
Official Document TS.64 FWA Devices Architecture and Requirements
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at [email protected]
V1.0 Page 69 of 69