CMAX Stand-alone WLAN Module User Manual 1
Upgrade History Date Version Comment 2010-04-13 1.0 Initial Release 2011-04-24 1.
Contents 1. General Description ……………………………………………………………………………………………...….6 1.1 Features …………………………………………………………………………………………………………………………………..6 1.2 Applications ……………………………………………………………………………………………....……..…………….………6 1.3 Product description ………………………………………………………………………………………….…………………….6 1.4 Specification ……………………………………………………………………………………….…………….…………………….7 2. Installation ……………………………………………………………………………………………………….…….8 2.1 Fundamentals of wireless LAN ……………………………………………………………………………………………….8 2.1.
3.2.6 Authentication …………………………………………………………………………………………………………....26 3.2.7 Wizard ………………………………………………………………………………………………………………………...27 3.2.8 Web Site ……………………………………………………………………………………………………………………..28 3.2.9 Contact ……………………………………………………………………………………………………………………….28 3.3 TELNET ………………………………………………………………………………………………………………………………….29 3.3.1 TELNET Connection …………………………………………………………………………………………………...29 3.3.2 System ………………………………………………………………………………………………………………………..30 3.3.
6.2.2 Wireless LAN Operation …………………………………………………………………………………………….48 6.2.3 Serial & Wireless LAN Command Format …………………………………………………………….…...49 7. Technical Support, Warranty, and Precaution ………………………………………………………….…...57 7.1 Technical Support ………………………………………………………………………………………….…………………...57 7.2 Warranty ………………………………………………………………………………………………………………………….…….57 7.2.1 Refund …………………………………………………………………………………………………………………….…..57 7.2.2 Free Repair Services …………………………………………………………………………………………………..57 7.2.
1. General Description CMAX stand-alone WLAN Module”supports stand-alone WLAN system which embeds MCU( Micro Controller Unit) with various configuration applications, monitoring functions and security protocols. The stand-alone WLAN system, along with CMAX S/W package, can easily be adapted to target systems which have RS-232 serial interface to enable wireless network (IEEE802.
Debugger board Serial Cable (Serial Communication Cable) Power (DC 5V/200mA Adapter) CD (User Manual and H/W, S/W Doc Package) [Table 1.3.1] Product Description 1.4 Specifications CATEGORIES FEATURE Wireless Standard IEEE802.11b, IEEE802.11g Frequency Range 2.412~2.462GHz Channels 1 ~ 11 channels Max Transmit Power Wireless Receive Sensitivity Specification Data Rates Antenna Modes UART Interface IMPLEMENTATION 802.11b: max. 18dBm (@11Mbps) 802.11g: max. 15dBm (@54Mbps) 802.11b: min.
SPI Interface Transfer Rate 10Mbps Open Connection Shared Key(WEP encryption 64 and 128 bit options) Security WPA-PSK, WPA2-PSK WPA1/2 Enterprise(EAP-TLS, EAP-TTLS, PEAP, LEAP, FAST) SSL2 / SSL3 / TLS1 Network Drivers Protocol 802.11b, 802.11g DHCP Client, HTTP, HTTPS, TELNET, FTP, ARP, ICMP, SNMP, Internet IPv4, TCP, UDP Power 85mA * 3.3V ( Peak 90mA * 3.3V) Power Consumption 280.
[Figure 2.1.1] Reference Network Architecture 2.1.1 Infrastructure Mode The wireless LAN stations communicate through an Access Point (AP). So, at least one AP is needed to make the infrastructure network. The wireless LAN station can talk to wired network hosts because AP relays between wireless LAN stations as well as between wireless LAN station and wired LAN (Ethernet) host. [Figure 2.1.1.1] Infrastructure 2.1.2 Ad-hoc Mode Wireless stations communicate each other without the AP.
[Figure 2.1.2.1] Ad-Hoc 2.1.3 Basic Requisites SSID It is an identifier to identify the particular wireless LAN. So the same SSID should be configured to all stations to communicate in the same wireless network. In case of infrastructure mode, user has to set his station’s SSID as same as AP’s. Channel IEEE802.11b/g wireless LAN stations communicate through the ISM (Industrial, Scientific, and Medical) band whose frequency is about 2.4GHz. IEEE802.
PSK (Pre-Shared Key) which doesn’t have any server. CMAX Module supports both Enterprise mode and Personal mode (WPA-PSK). WPA 2 To final security of Wireless LAN, IEEE 802.11i, a standard about Wireless LAN, has suggested the Counter Mode with Cipher Block Changing Message Authentication Code Protocol (CCMP) for replacing the TKIP. CCMP uses Advanced Encryption Standard (AES), it is the WPA 2 that adopts the using the method. WPA 2 has also both Enterprise and PSK mode.
[Figure 2.2.1.1] Connect through serial port Connect the CMAX Module through WLAN Start the WLAN Module Manager on your PC. Click the “Connect” button after inserting IP Address, User ID and User Password as the same values with the CMAX Module. [Figure 2.2.1.2] Connect through WLAN Configuring Wireless LAN Parameters Move to the [Network] menu and setting SSID as the same values with the AP’s. Then, move to the [Authenticaton] menu and setting security options. Finaly, Click the “Update” button.
[Figure 2.2.1.3] Configuring Wireless LAN Parameters If you want to make an Ad-hoc network, choose the [Ad-hoc] as the value of [WLAN Topology] and set a value of [SSID]. Then, try to connect your PC to the network. 2.2.2 Setting Network Aera This step is for setting both CMAX Module and your PC to be located the same network. If only they are, the TCP connection between them can be established. Setting of the PC Add or change the IP address of the network adapter on your PC like following.
need installation. First, search your WLAN Module via network. All the values of parameters are set the default values in the factory. To apply it to your system, proper values should be set via WLAN Module Manager. Major parameter’s default values are listed on below table. To implement this simple test, keep these values without any changes.
[Figure 3.1.1] initial appearance of WLAN Module 3.1.1 Configuration via WLAN Checklists Make sure the WLAN connection between your PC and WLAN Module Manager. If they are the same network, [search] button can be used. If they aren’t, [IP Address] should be inserted to use.
Procedures 1) Serial Port : Select a COM port as the same values with the your COM port. 2) User ID : Set the User ID 3) User Password : Set the User Password 4) Connect : Connect through Serial communication to CMAX Module 5) Next : Move to the configuration page of system Note : If you want to save [ID/Password], it choose the checkbox. After changing the configuration, you must be rebooted CMAX Module. 3.1.3 Printer Search : Provide information of CMAX Module in the network. [Figure 3.1.3.
[Figure 3.1.4.1] System Setting Printer Name : Set the [Printer Name] Print Port Num : Set the [Print Port Num] User ID : Set the [User ID] User Password : Set the [User Password] Confirm Password : Set correct values of [Confirm Password] Next : Move to the configuration page of protocol Back : Move to the configuration page of connection 3.1.5 Protocol : Select to use ftp, http and snmp that is application. For a description of each feature in the manual can be found at.
Task State - Set the HTTPS, TELNET, FTP and SNMP that are applications if you use. SNMP - To perform SNMP sets for each item. Next : Move to the configuration page of BSS Information Back : Move to the configuration page of System 3.1.6 BSS Info : After Searching on AP(Access Point), user can select to connect at the AP. Then, AP’s SSID will be inserted automatically. [Figure 3.1.6.
[Figure 3.1.7.1] Network Setting Network Mode : Select the Infra Network or Adhoc mode. Note : If adhoc mode user selects to connect a adhoc-channel (1~14). SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32 bytes. Inactivity Time : After connecting to the server of printer, It is time to maintain a connection with the server.
[Figure 3.1.8.1] Authentication Setting Authentication : It is security configuration between CMAX Module and AP(Access Point) FIELD DESCRIPTION Cryptograph Open System It should be select NONE or WEP64/128 as the setting of AP to be access You can input the max 26charater,. It Configure to WEPB64/18 if WEP Key you input it like the following format. - Cryptograph Shared Key WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) Select a WEP64/128 same AP’s configuration to be access.
3.1.9 Certification : Can upload Certificates to CMAX Module for EAP-TLS certification [Figure 3.1.9.1] Upload Certificate Upload Certification - Open file : Select the Certificate - Update : Save the Selecting a certificate to CMAX Module 3.1.10 Firmware : It has been supporting the firmware upgrade. If It does not connect from CMAX Module, can not update the firmware. To stable firmware upgrade, we are not supported doing all of the eatures. After updating the firmware, CMAX Module must be rebooted.
Open file : Select a firmware type of [WLAN_M*.Bin] Update : Update a firmware to CMAX Module Stop : Stop the firmware upgraded Note : Emergency mode : If an error occurs while firmware upgrade, CMAX module will be started to the emergency mode. Emergency mode does not support the security features. So You must update the full firmware to operate normal mode. 3.1.11 Information : Product and firmware information is displayed [Figure 3.1.11.
3.2.1 Web Connection : CMAX Module can Set configuration using the HTTP, HTTPS protocol. HTTP and HTTPS settings are same. Only, HTTPS secure connection is supported. Default setting is HTTP HTTP Connection : Start internet explorer through “http://192.168.192.168” Default : ID : admin Password : password [Figure 3.2.1.1] Sign in with your HTTPS Connection : Start internet explorer through https://192.168.192.
Note : Web Server Security feature - Supported the SSL 2.0, SSL 3.0 and TLS 1.0 - For HTTPS connections, if you want to access from the computer, security protocol should be checked. 3.2.2 Home : Display the system, protocol and network information in the CMAX Module [Figure 3.2.2.1] Home 3.2.3 System : After inserting the [Pinter Name], [Printer Port], [User Name] and [User Password], user should press the “SUBMIT” button to set system configuration [Figure 3.2.3.
Printer Name : Set the [Printer Name] Print Port Num : Set the [Print Port Number] User ID : Set the [User ID] User Password : Set the [User Password] Confirm Password : Set correct values of [Confirm Password] Default : User ID : admin , User Password : password 3.2.4 Protocol : Set the HTTPS, TELNET, FTP and SNMP that are applications if you use. Then To perform SNMP sets for each item.
3.2.5 Network : After inserting the network configuration, user should press the “SUBMIT” button to set. [Figure 3.2.5.1] Network Setting Network Mode : Select the Infra Network or Adhoc mode. Note : If adhoc mode user selects to connect a adhoc-channel (1~14). SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32 bytes. Inactivity Time : After connecting to the server of printer, It is time to maintain a connection with the server.
[Figure 3.2.6.1] Authentication Setting Authentication : It is security configuration between CMAX Module and AP(Access Point) FIELD DESCRIPTION Cryptograph Open System It should be select NONE or WEP64/128 as the setting of AP to be access You can input the max 26charater,. It Configure to WEPB64/18 if WEP Key you input it like the following format. - Cryptograph Shared Key WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) Select a WEP64/128 same AP’s configuration to be access.
[Figure 3.2.7.1] Wizard start page [Figure 3.2.7.2] Wizard result page 3.2.8 Web Site : Move to the website of CMAX Wireless 3.2.9 Contact : User will be connected Customer Service by the E-Mail.
3.3 TELNET You can configure the CMAX module by TELNET Note : TELNET : TELNET is Text-based remote access service and based TCP/IP Protocol. CMAX module configuration : Input the number provided on the left side of the menu and then enter the "Enter" to enter the next entry. Menu move example Menu number : move to next menu. $ : go to the previous menu. # : Go to the main menu. 3.3.1 TELNET Connection : Connect by Telnet Client.( Microsoft Windows xp based on the description.
Authentication: Configure security parameter of CMAX module. Save: You can store the configuration information that input so far to the CMAX module Exit : Terminate TELNET connection. 3.3.2 System : You can configure Printer Name, Print Port Number, ID and User Password. User ID and User Password is applied to all application of CMAX module. Select “[1]System” to “configuration main menu”. [Figure 3.3.2.
[Figure 3.3.3.2] TELNET Task State Protocol menu Select “[0]Task State” to “Protocol menu.” [0] HTTPS : Configure to Enable(1) or Disable(0) to HTTPS. ( default HTTP ) [1] TELNET : Configure to Enable(1)/Disable(0) to TELNET. [2] FTP : Configure to Enable(1)/Disable(0) to FTP [3] SNMP : Configure to Enable(1)/Disable(0) to SNMP. [Figure 3.3.3.3] TELNET SNMP Connection Information menu Select “[1] SNMP” to Protocol menu.
[Figure 3.3.4.1] TELNET Network menu [0] Network Mode : Select a network mode( Infra Network(0) / Adhoc(1)). [1] Adhoc Channel : Configure Adhoc Channel(1~14) to Connection. [2] SSID : It should be configured the SSID same as AP's SSID to be access. [3] Inactivity Time : It means a time limit keeping connection that without data communication between client and server. [4] IP Assignment Method : Select IP Assignment megthod( DHCP(0)/Manual Alloccation(1) ).
[$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu. [Figure 3.3.5.2] TELNET Open System Security main menu [0~5] Authentication : Configure a Security Mode. Reference [Table 3.3.5.1] [$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu.
[Figure 3.3.5.3] TELNET Open System Cryptograph menu [0] Open System : You should select ‘NONE[0]’ or ‘WEP64/128[1]’ [$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu. [Figure 3.3.5.4] TELNET Shared Key Cryptograph menu [1] Shared Key : You should select ‘WEP64’ or ‘WEP128’ [$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu. [Figure 3.3.5.5]TELNET WPA-PSK/WPA2-PSK a detailed menu.
[Figure 3.3.5.6] TELNET WPA-PSK/WPA2-PSK Cryptograph menu [2] WPA-PSK : You should select a ‘TKIP[0]’ or ‘AES[1]’ [3] WPA2-PSK : You should select a ‘TKIP[0]’ or ‘AES[1]’ [$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu. [Figure 3.3.5.7]TELNET WPA/WPA2 a detailed menu. [0] Authentication : You should configure a authentication method. Reference [Table 3.3.5.1] [1] Cyrptograph : Configure an encryption method according to security methods.
[Figure 3.3.5.9] TELNET EAP Configuration Menu. [0] EAP Mode: It should be selected same as AP’s EAP mode [1] EAP ID/PASSWORD: it should be configured same as AP’s EAP ID and password. [$] Back: Go to the previous menu. [#] Main Menu : Go to the main menu. 3.3.6 Save : To save a changed configuration information on CMAX module, select the ‘[5]Save’ in the configuration main menu. 3.3.7 Exit : To terminate a TELNET connection, select the ‘[6] Exit’ in the configuration main menu. 3.
[Figure 3.4.1.1] FTP Connection Screen - User ID, User Password 를 입력 후 “Enter”를 칩니다. - It should be input User ID and User password. Default : User ID : admin User Password : password 3.4.2 Config File list view : It should be confirmed a file as you input ‘ls’. [Figure 3.4.2.1] FTP ‘ls’ command executed screen 3.4.3 Config File download :It should be downloaded a file as you input ‘get config’. [Figure 3.4.3.1] FTP ‘get config’ command screen 3.4.
3.4.5 Config File Specification : Table 3.4.5.1 is downloaded file’s content from CMAX module by ‘get config’ command. To change a configuration value, input without blank in ‘bracket’([ ]). ** Caution!!! ** Do not change the order or contents of the menu. ** Only need to change the settings, please. [1] System 1. Printer Name: [unknown] 2. Printer Port Num: [9100] 3. User ID: [admin] 4. User Password: [password] [2] Protocol 1. Task State 1) HTTPS: [0] 2) TELNET: [0] 3) FTP: [0] 4) SNMP: [0] 2.
Describes in detail how the file should be configure. [1] System: Configure the system information. 1. Printer Name: Configure the system name. 2. Printer Port Num: Configure the TCP server port. 3. User ID: Configure the user ID. 4. User Password: Configure the user password. [2] Protocol: Configure the Application (HTTPS, TELNET, FTP, SNMP) as Enable(1) or Disable(0). And configure the SNMP connect information. 1. Task State 1) HTTPS: Configure the HTTPS as Enable(1) or Disable(0).
6. Authentication ID: It should be configure the Authentication ID same as AP’s Authentication ID. 7. Authentication Password: It should be configured the Authentication password same as AP's Authentication password to be access. 3.5 SNMP It is managed a network information through SNMP (supported SNMPv1). Note : SNMP stands for 'Simple Network Management Protocol' and it is used for network management.
[Figure 3.5.1.1] SNMP Connection configuration screen 3.5.2 SNMP Manager operation test: it is description of basic SNMP operation. If you selected terminal node to ‘Get Tree’, get this value(client note value). [Figure 3.5.2.
Get Next : You can bring the value at trees as selected a terminal node. [Figure 3.5.2.2] SNMP ‘getnext’ message opration screen You can configure the terminal node value to ‘set tree’. (You can set only the contents had set on "Write") [Figure 3.5.2.
Walk: It can get the all item that terminal node of tree or terminal node of node. [Figure 3.5.2.4] SNMP ‘walk’ message operation screen Traps: If a specific event occurs, relevant(in the event) message is transmitted to trap address. - ColdStart: when a terminal rebooting works, coldstart message is transmitted to trap address. [Figure 3.5.2.
[Figure 3.5.2.6] SNMP AuthenticationFailure message received screen 4. Hardware Block Diagram [Figure 4.1] Hardware Block Diagram 4.
NUM NAME IN/OUT DESCRIPTION 1 VCC 3.3V Power 2 VCC 3.3V Power 3 VCC 3.3V Power 4 VCC 3.
Configuration Tool of CMAX module Hyper Terminal( or other Terminal program) 5.2 Start Test 5.2.1 STEP1. It should be connect to CMAX Test board and PC’s Serial port. It should be turn on the CMAX test board. It should be connected the PC to CMAX module through serial interface. It should be run a Terminal program of PC by connected Serial(ex, HyperTerminal) 5.2.2 STEP2. (Wireless Configuration to between CMAX module and PC).
Hardware Handshaking : CTS/RTS 2 Configuration Data Set 3 Firmware Upload 4 Certificate Upload 5 BSS Info Request 6 BSS Info Response Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS [Table 6.1.1.1] Serial Operation Specification 6.1.
ASCII _ [ I F ] G E T HEX 0x5F 0x5B 0x49 0x46 0x47 0x5D 0x45 0x54 [Table 6.2.1.1] Serial Command ASCII, HEX Serial Command Sequence [Figure 6.2.1.
[Figure 6.2.2.1] Wireless LAN Command Sequence 6.2.3 Serial & Wireless LAN Command Format Request Frame Format DESCRIPTOR STX (COMMAND CODE) PARAMETER ETX 18 Variable 1 Length(bytes) [Table 6.2.3.1] Request Frame Format (Serial & WLAN) Response Frame Format DESCRIPTOR STX (COMMAND CODE) PARAMETER Length(bytes) 18 Variable ETX 1 [Table 6.2.3.2] Response Frame Format (Serial & WLAN) ETX Frame Format SETTING FORMAT ETX ETX = 0x03 [Table 6.2.3.
WLAN Gateway unsigned char[4] Printer Port unsigned short[2] baudrate unsigned char Version unsigned short[2] DHCP unsigned char IncativityTime unsigned short[2] https unsigned char 0 : http, 1 : https value unsigned short[2] 0x1F 0x00 (fix) not used WLAN Mode Only Search Response CMD("__[I_F]__[PRT_SET]") SET Request 1 (Host 9000 Port → Device 3337 Port) Printer SET (UDP WLAN MAC unsigned char[6] WLAN IP Address unsigned char[4] WLAN SubNetMask unsigned char[4] WLAN Gateway un
on Value (configurati (Host → Device) on start message) 2 CMD("__[I_F]__[IF__GET]") Check sum Configuration Configuration Current Value Current Value CMD("__[I_F]__[IF__CUR]") (Device → Host) unsigned char[2] unsigned char[18] SystemName unsigned char[44] Region unsigned char Location NetworkMode unsigned char Infra/Adhoc IpConfigMode unsigned char Static/DHCP IP Address unsigned char[4] SubNetMask unsigned char[4] Gateway unsigned char[4] SSID unsigned char[32] 0:Open, 1:Shar
E Message FAIL (Host ↔ Device) isTelnet unsigned char isFTP unsigned char isSNMP unsigned char isSNMPTrap unsigned char SNMPSetCommunity unsigned char[16] SNMPGetCommunity unsigned char[16] SNMPTrapCommunity unsigned char[16] TrapIP unsigned char[4] IncativityTime unsigned char[3] Check sum unsigned char[2] FAIL CMD("__[I_F]__[___FAIL]") Check sum unsigned char[18] Fail Response unsigned char[2] Serial & WLAN BSS Information 1 Request (Host → Device) BSS Info Request CMD("__[I_F]
CMD("__[I_F]__[SYS_RSP]") (Device → Host) Firmware version unsigned char[16] Update date unsigned char[32] MAC Address unsigned char[6] Check sum unsigned char[2] Set Configurati on (configurati on start message) Serial & WLAN 1 Configuration Set Configuration Set Value Value CMD("__[I_F]__[IF__SET]") (Host → Device) unsigned char[18] SystemName unsigned char[44] Region unsigned char Location NetworkMode unsigned char Infra/Adhoc IpConfigMode unsigned char Static/DHCP IP Address
Message 2 SUCCESS(Device → Host) E Message FAIL (Host ↔ Device) ipDefaultTTL unsigned char Dummy unsigned char isWebSSL unsigned char isTelnet unsigned char isFTP unsigned char isSNMP unsigned char isSNMPTrap unsigned char SNMPSetCommunity unsigned char[16] SNMPGetCommunity unsigned char[16] SNMPTrapCommunity unsigned char[16] TrapIP unsigned char[4] IncativityTime unsigned char[3] Check sum unsigned char[2] SUCCESS CMD("__[I_F]__[IF__SUC]") Check sum unsigned char[2] FAIL CM
(Host → Device) FW CANCEL Response (Device → Host) FW CRC ERR Message (Host ↔ Device) Check sum unsigned char[2] FW CRC ERROR("__[I_F]__[FW_XRSP]") Check sum unsigned char[18] unsigned char[2] FW CRC ERROR("__[I_F]__[CRC_ERR]") Check sum unsigned char[18] unsigned char[2] Serial Mode Only Certificate Data Certificate Data CMD("__[I_F]__[FW_CERT]") unsigned char[18] Message Certificate Size unsgiend char[8] (Host → Device) Cerifiacate Data valiable (CA, Client Check sum unsigned char[2] Ke
Check sum unsigned char[2] Certificate Data END Certificate Data End 2 3 CMD("__[I_F]__[CERTEND]") unsigned char[18] Message Certificate Size unsgiend char[8] (Host → Device) Cerifiacate Data valiable Check sum unsigned char[2] Message SUCCESS (Device → Host) SUCCESS CMD("__[I_F]__[IF__SUC]") Check sum unsigned char[18] Max 500byte Success Response unsigned char[2] WLAN Mode Only Client PEM Data Client PEM Data 1 CMD("__[I_F]__[CP_CERT]") Message Client PEM Data Size unsgiend char[8]
7. Technical Support, Warranty, and Precaution 7.1 Technical Support If you have any question regarding operation of the product, visit the message board on CMAX Wireless’s web site or send us an email at the following address: E-mail: support@cmaxwireless.com For more information, visit our website at http://www.cmaxwireless.co.kr 7.2 Warranty 7.2.1 Refund Upon the customer’s request to refund the product within two weeks after purchase, CMAX Wireless will refund the product. 7.2.
Reverse engineering of firmware and applications provided by CMAX Wireless is prohibited. Use of firmware and applications provided by CMAX Wireless for purposes other than those for which they were designed is prohibited. Do not use the product in an extremely cold or hot place or in a place where vibration is severe. Do not use the product in an environment in which humidity is high or a lot of oil exists. Do not use the product where there is caustic or combustible gas.
connected. - Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.