all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
manual | Users Manual | 2.12 MiB | December 08 2011 | |||
1 | Cover Letter(s) | December 08 2011 | ||||||
1 | Cover Letter(s) | December 08 2011 | ||||||
1 | External Photos | December 08 2011 | ||||||
1 | Internal Photos | December 08 2011 | ||||||
1 | ID Label/Location Info | December 08 2011 | ||||||
1 | Cover Letter(s) | December 08 2011 | ||||||
1 | RF Exposure Info | December 08 2011 | ||||||
1 | Test Setup Photos | December 08 2011 | ||||||
1 | Test Report | December 08 2011 |
1 | manual | Users Manual | 2.12 MiB | December 08 2011 |
CMAX Stand-alone WLAN Module User Manual 1 Upgrade History Comment Initial Release Fix issue : MCU, SDRAM, PCB Artwork Date Version 2010-04-13 2011-04-24 1.0 1.1 2 Contents 2. 1. General Description ....6 1.1 Features ..6 1.2 Applications .......6 1.3 Product description ..6 1.4 Specification ...7 Installation ..8 2.1 Fundamentals of wireless LAN .8 2.1.1 Infrastructure Mode .9 2.1.2 Ad-hoc Mode ...9 2.1.3 Basic Requisites ...10 2.1.4 Authentication and Security ..10 2.2 Installation .11 2.2.1 Making Wireless LAN Network .11 3. Configuration ...14 3.1 Configuration with WLAN Module Manager ...14 3.1.1 Configuration via WLAN ...15 3.1.2 Configuration via Serial ....15 3.1.3 Printer Search ...16 3.1.4 System ....16 3.1.5 Protocol .......................................17 3.1.6 BSS Info .......................................18 3.1.7 Network .....18 3.1.8 Authentication ..19 3.1.9 Certification ....21 3.1.10 Firmware ....21 3.1.11 Information .....22 3.2 Web Configuration ....22 3.2.1 Web Connection ...23 3.2.2 Home ..24 3.2.3 System 24 3.2.4 Protocol ....26 3.2.5 Network ...26 3 3.2.6 Authentication ....26 3.2.7 Wizard ...27 3.2.8 Web Site ..28 3.2.9 Contact .28 3.3 TELNET .29 3.3.1 TELNET Connection ...29 3.3.2 System ..30 3.3.3 Protocol ...30 3.3.4 Network ...31 3.3.5 Authentication ...32 3.3.6 Save .36 3.3.7 Exit ...36 3.4 FTP ..36 3.4.1 FTP Connection .36 3.4.2 Config File list view ...37 3.4.3 Config File download ...37 3.4.4 Config File Upload ..37 3.4.5 Config File Specification ....38 3.5 SNMP ....40 3.5.1 SNMP Connection ...40 3.5.2 SNMP Manager operation test...41 4. Hardware Block Diagram ....44 4.1 Hardware Pin Array ....44 5. Demo and Test ....45 5.1 Test environment ..45 5.1.1 Hardware ....45 5.1.2 Software ...45 5.2 Start Test .46 5.2.1 STEP1. ...46 5.2.2 STEP2. ...46 5.2.3 STEP3. ...46 6. Configuration Tool Command List ..46 6.1 Configuration Tool Protocol ....46 6.1.1 Serial Operation Specification ....46 6.1.2 WLAN Operation Protocol & Port .....47 6.2 Serial & WLAN Command ...47 6.2.1 Serial Operation ....47 4 6.2.2 Wireless LAN Operation .48 6.2.3 Serial & Wireless LAN Command Format ....49 7. Technical Support, Warranty, and Precaution ....57 7.1 Technical Support ....57 7.2 Warranty ..57 7.2.1 Refund ...57 7.2.2 Free Repair Services ..57 7.2.3 Charged Repair Services ....57 7.3 Precaution .57 7.4 USA-Federal Communications Commission (FCC)..58 7.4.1 Labeling ...59 5 1. General Description CMAX stand-alone WLAN Modulesupports stand-alone WLAN system which embeds MCU( Micro Controller Unit) with various configuration applications, monitoring functions and security protocols. The stand-alone WLAN system, along with CMAX S/W package, can easily be adapted to target systems which have RS-232 serial interface to enable wireless network
(IEEE802.11 b/g) functionality with no redesign of the system, thus making the system connected, controlled and maintained in WLAN network. 1.1 Features Embedded 802.11b/g Wireless Networking Supports Serial to WLAN, Infrastructure, Ad-hoc mode Supports network status indicator LEDs UART/SPI Interface Compact design 27mm 36mm 4.7mm Distance Outdoor: approx. 100m Strong Security with WEP 64/128, WPA/WPA2 Personal, Enterprise Supports DHCP Client, HTTP, HTTPS, TELNET, FTP, ARP, SNMP, IPv4, TCP, UDP Protocol 1.2 Applications POS Equipment Automotive Applications Medical Equipment Street Furniture Telematics Industrial Automation Metering Applications 1.3 Product description CATEGORIES IMPLEMENTATION CMAX Stand-alone WLAN Module 6 Debugger board Serial Cable
(Serial Communication Cable) Power
(DC 5V/200mA Adapter) CD
(User Manual and H/W, S/W Doc Package)
[Table 1.3.1] Product Description 1.4 Specifications CATEGORIES FEATURE IMPLEMENTATION Wireless Specification Wireless Standard Frequency Range Channels Max Transmit Power Receive Sensitivity Data Rates Modulation Schemes Range Connection Modes Antenna Modes Antenna UART Interface Baud Rate Bits Parity Stop bits Flow Control IEEE802.11b, IEEE802.11g 2.412~2.462GHz 1 ~ 11 channels 802.11b: max. 18dBm (@11Mbps) 802.11g: max. 15dBm (@54Mbps) 802.11b: min. -76dBm (@11Mbps) 802.11g: min. -65dBm (@54Mbps) 802.11b : 1M ~ 11 Mbps (TBD) 802.11g : 6M ~ 54 Mbps (TBD) 802.11b BPSK, QPSK, CCK, DSSS 802.11g BPSK, QPSK, 16-QAM, 64-QAM, OFDM Up to 100m free space (Outdoor) Infrastructure and Ad-hoc (IBSS) To support one chip antenna or external one antenna via connector 115,200bps 8 None 1 CTS/RTS(hardware) 7 SPI Interface Transfer Rate Security Protocol Network Drivers Internet Power Power Consumption 10Mbps Open Connection Shared Key(WEP encryption 64 and 128 bit options) WPA-PSK, WPA2-PSK WPA1/2 Enterprise(EAP-TLS, EAP-TTLS, PEAP, LEAP, FAST) SSL2 / SSL3 / TLS1 802.11b, 802.11g DHCP Client, HTTP, HTTPS, TELNET, FTP, ARP, ICMP, SNMP, IPv4, TCP, UDP 85mA * 3.3V ( Peak 90mA * 3.3V) 280.5mW (Peak 297mW) MCU Specification 266MHz ARM9 with SRAM 32M and Flash 8M Upgradeability Environmental Humidity Physical Operation Mode Operating System Management Development Kit Configuration Tools Upgradeability Operation Temperature Storage Temperature Dimensions Weight Firmware upgradeable via UART and Wireless LAN
-5 ~ 55 (TBD)
-20 ~ 70 (TBD) Operation: 10% to 90%, Non-Condensing Storage: 5% to 90%, Non-Condensing 27mm 36mm 4.7mm 5g Infrastructure , Ad-hoc FreeRTOS WLAN Module Manager, HTTP, HTTPS, TELNET, FTP Development board and software tools Command Line Interface
[Table 1.4.1] Specification 2. Installation 2.1 Fundamentals of wireless LAN CMAX Module supports IEEE802.11b/g. The IEEE802.11b and IEEE802.11g support 11Mbps and 54Mbps transmission rate respectively. There are two types of wireless LAN networks infrastructure and ad-hoc. 8
[Figure 2.1.1] Reference Network Architecture 2.1.1 Infrastructure Mode The wireless LAN stations communicate through an Access Point (AP). So, at least one AP is needed to make the infrastructure network. The wireless LAN station can talk to wired network hosts because AP relays between wireless LAN stations as well as between wireless LAN station and wired LAN (Ethernet) host.
[Figure 2.1.1.1] Infrastructure 2.1.2 Ad-hoc Mode Wireless stations communicate each other without the AP. So user can make a system more simply. It is proper if theres no wired LAN requirement and it is a small network. Some people call it peer-to-peer mode. 9
[Figure 2.1.2.1] Ad-Hoc 2.1.3 Basic Requisites SSID It is an identifier to identify the particular wireless LAN. So the same SSID should be configured to all stations to communicate in the same wireless network. In case of infrastructure mode, user has to set his stations SSID as same as APs. Channel IEEE802.11b/g wireless LAN stations communicate through the ISM (Industrial, Scientific, and Medical) band whose frequency is about 2.4GHz. IEEE802.11 specification divides this band into 14 channels every 5MHz. If user installs more than one wireless LAN networks in the same area, the channels should be apart more than 4 channels to avoid interferences. 2.1.4 Authentication and Security Authentication A wireless LAN station should get authentication from the AP in the infrastructure mode. There are the Open system and the Shared key for the authentication methods. WEP (Wired Equivalent Privacy) The WEP is a secure protocol for wireless LAN. There are two kinds of WEP method - 64 bits and 128 bits key. WPA (Wi-Fi Protected Access) WPA is a security standard for users of device equipped with Wi-Fi wireless connection. It is an improvement on and is expected to replace the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). There are two modes about the user authentication in WPA security. The one is Enterprise which has authentication server and the other one is 10 PSK (Pre-Shared Key) which doesnt have any server. CMAX Module supports both Enterprise mode and Personal mode (WPA-PSK). WPA 2 To final security of Wireless LAN, IEEE 802.11i, a standard about Wireless LAN, has suggested the Counter Mode with Cipher Block Changing Message Authentication Code Protocol (CCMP) for replacing the TKIP. CCMP uses Advanced Encryption Standard (AES), it is the WPA 2 that adopts the using the method. WPA 2 has also both Enterprise and PSK mode. CMAX Module supports also both them. 2.2 Installation Before testing, users should connect the CMAX Module. There are two methods for connecting. The first method is to connect a target device with the serial port and the other method is to connect by wireless LAN card on your PC.
[Figure 2.2.1] Connect between CMAX Module and a PC 2.2.1 Making Wireless LAN Network Even though you connect an AP on your network, wireless LAN network could not be made automatically. You should configure values of items which related with wireless network. Please follow the below steps. Connect the CMAX Module through serial port Start the WLAN Module Manager on your PC. Push the Connect button after Selecting a COM port, User ID and User Password as the same values with the your COM port. 11
[Figure 2.2.1.1] Connect through serial port Connect the CMAX Module through WLAN Start the WLAN Module Manager on your PC. Click the Connect button after inserting IP Address, User ID and User Password as the same values with the CMAX Module.
[Figure 2.2.1.2] Connect through WLAN Configuring Wireless LAN Parameters Move to the [Network] menu and setting SSID as the same values with the APs. Then, move to the [Authenticaton] menu and setting security options. Finaly, Click the Update button. Please ask the manufacturer of the AP, when you want to know about setting the APs value. 12
[Figure 2.2.1.3] Configuring Wireless LAN Parameters If you want to make an Ad-hoc network, choose the [Ad-hoc] as the value of [WLAN Topology] and set a value of [SSID]. Then, try to connect your PC to the network. 2.2.2 Setting Network Aera This step is for setting both CMAX Module and your PC to be located the same network. If only they are, the TCP connection between them can be established. Setting of the PC Add or change the IP address of the network adapter on your PC like following. Get into the menu of [Windows Control Panel] >> [Network Connections] >> [Properties of the Network Adapter - with right click of your mouse]. Then, you can show the properties of [Internet Protocol (TCP/IP). In there, press the [Advanced] button for adding an IP Address like the below figure.
[Figure 2.2.2.1] adding / changing the IP address of users PC Setting of CMAX Module CMAX Module uses WLAN Module Manager as its a configuration program. WLAN Module Manager is for MS Windows, and this is comfortable to use because it doesnt 13 need installation. First, search your WLAN Module via network. All the values of parameters are set the default values in the factory. To apply it to your system, proper values should be set via WLAN Module Manager. Major parameters default values are listed on below table. To implement this simple test, keep these values without any changes. DISTRIBUTION FUNCTION VALUE System User ID User Password FTP TELNET HTTP SNMP Protocol admin password Disable Disable Enable / HTTPS is disable Disable Community Name (Read) : Public Community Name (Write) : Private Trap Destination IP Address : 0.0.0.0 Trap Destination Community Name : Public Trap Mode : 1 (Enable), 0 (Disable) Locality Disable Network Mode Ad-hoc, channel 1 SSID CMAX_adhoc Network IP Assignment Method Manual Allocation IP, Subnet, Gateway Subnet : 255.255.255.0 IP : 192.168.192.168 Gateway : 192.168.192.1 Authentication Open System Shared key None None
[Table 2.2.2.1] Default values of Major parameters 3 Configuration 3.1 Configuration with WLAN Module Manager 14
[Figure 3.1.1] initial appearance of WLAN Module 3.1.1 Configuration via WLAN Checklists Make sure the WLAN connection between your PC and WLAN Module Manager. If they are the same network, [search] button can be used. If they arent, [IP Address] should be inserted to use. Procedures 1) Printer Address : Set the values of the CMAX Modules IP Address properly 2) User ID : Set the values of the User ID 3) User Password : Set the values of the Password 4) Connect : Connect through Wireless LAN to CMAX Module 5) Next : Move to System Configuration page. Note : If you want to save [ID/Password], it choose the checkbox. 3.1.2 Configuration via Serial Checklists Make sure the connection between your PC and WLAN Module Manager using RS232 direct cable. To use this, WLAN Module Manager has to be operating in the [Serial Configuration] mode. You press the Connect button after Selecting a COM port, User ID and User Password as the same values with the your COM port. Then, You can enter the
[Serial Configuration] mode. 15 Serial Port : Select a COM port as the same values with the your COM port. Procedures 1) 2) User ID : Set the User ID 3) User Password : Set the User Password 4) Connect : Connect through Serial communication to CMAX Module 5) Next : Move to the configuration page of system Note : If you want to save [ID/Password], it choose the checkbox. After changing the configuration, you must be rebooted CMAX Module. 3.1.3 Printer Search
: Provide information of CMAX Module in the network.
[Figure 3.1.3.1] Printer Search Reset : Delete the printer information Search : Search active printers in the network. If a network problem occurs, the printers will not scan. Then, you press the [Search] button again. Select : After selecting a printer to connect, you should press [Select] button. 3.1.4 System
: Set the Printer Name, Printer Port Num, User ID and User Password. User ID and password will be used to set the configuration. 16
[Figure 3.1.4.1] System Setting Printer Name : Set the [Printer Name]
Print Port Num : Set the [Print Port Num]
User ID : Set the [User ID]
User Password : Set the [User Password]
Confirm Password : Set correct values of [Confirm Password]
Next : Move to the configuration page of protocol Back : Move to the configuration page of connection 3.1.5 Protocol
: Select to use ftp, http and snmp that is application. For a description of each feature in the manual can be found at.
[Figure 3.1.5.1] Protocol Setting 17 Task State
- Set the HTTPS, TELNET, FTP and SNMP that are applications if you use. SNMP
- To perform SNMP sets for each item. Next : Move to the configuration page of BSS Information Back : Move to the configuration page of System 3.1.6 BSS Info
: After Searching on AP(Access Point), user can select to connect at the AP. Then, APs SSID will be inserted automatically.
[Figure 3.1.6.1] BSS Setting Reset : Delete current information of BSSID Get BSS Information : Scanning information of BSSID. If the problem of network occurs, the printers will not scan. Then, you press the [Get BSS Information] button again. Select : Select BSS that searched. Next : Move to the configuration page of Network Back : Move to the configuration page of Protocol 3.1.7 Network
: Set the network parameter of CMAX Module 18
[Figure 3.1.7.1] Network Setting Network Mode : Select the Infra Network or Adhoc mode. Note : If adhoc mode user selects to connect a adhoc-channel (1~14). SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32 bytes. Inactivity Time : After connecting to the server of printer, It is time to maintain a connection with the server. Default setting : Disable, Maximun time : 32767(sec) IP Assignment Method : Supported Automatic Allocation(DHCP Client) or Manual Allocation. Default setting : Manual Allocation
- Automatic Allocation(DHCP Client) : Assigns the IP Address that is assigned in the DHCP server automatically
- Manual Allocation : Does not assign the IP address in the AP(Access Poing)s DHCP server. User should insert the IP Address that is such as IP Address of AP. IP Address : Insert the [IP Address] of AP : Default IP Address : 192.168.192.168 Subnet Mask : Insert the [Subnet Mask] of AP : Default subnet Mask : 255.255.255.0 Gateway : Insert the [Gateway] of AP : Default Gateway : 192.168.192.1 Next : Move to the configuration page of Authentication Back : Move to the configuration page of BSS Information 3.1.8 Authentication
: Set a security configuration of the CMAX Module 19
[Figure 3.1.8.1] Authentication Setting Authentication : It is security configuration between CMAX Module and AP(Access Point) FIELD DESCRIPTION Cryptograph It should be select NONE or WEP64/128 as the setting of AP to be access Open System WEP Key You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) Cryptograph Select a WEP64/128 same APs configuration to be access. Shared Key WEP Key You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) WPA-PSK /
WPA2-PSK WPA-TKIP /
WPA2-AES Cryptograph You should same to configure a TKIP/AES with AP to be access. PSK Key Cryptograph EAP ID Password You should same to input a TKIP/AES with AP to be access. You should same to configure a cryptograph with AP to be access. You should same to configure a EAP Mode with AP to be access. You should Input the ID with configured certificate Server You should Input the Password with configured certificate Server However, If EAP Configuration is a EAP-TLS, you should input the private_key_password that is certificate password that generated for CMAX module.
[Table 3.1.8.1] Security setting Save : It is function to Save the configuration information that you have set Saved file can set through uploading with FTP Update : User will save the configuration information to CMAX Module Note : To upload a file must be named Config should be Back : Move to the configuration page of Network 20 3.1.9 Certification
: Can upload Certificates to CMAX Module for EAP-TLS certification
[Figure 3.1.9.1] Upload Certificate Upload Certification
- Open file : Select the Certificate
- Update : Save the Selecting a certificate to CMAX Module 3.1.10 Firmware
: It has been supporting the firmware upgrade. If It does not connect from CMAX Module, can not update the firmware. To stable firmware upgrade, we are not supported doing all of the eatures. After updating the firmware, CMAX Module must be rebooted.
[Figure 3.1.10.1] Upgrade Firmware 21 Open file : Select a firmware type of [WLAN_M*.Bin]
Update : Update a firmware to CMAX Module Stop : Stop the firmware upgraded Note :
Emergency mode :
If an error occurs while firmware upgrade, CMAX module will be started to the emergency mode. Emergency mode does not support the security features. So You must update the full firmware to operate normal mode. 3.1.11 Information
: Product and firmware information is displayed
[Figure 3.1.11.1] Information Product Information : Product name Firmware Version : Firmware version Update Date : Updated date Mac Address : CMAX Modules Mac Address 3.2 Web Configuration Set the CMAX Moduless configuration through web connecting 22 3.2.1 Web Connection
: CMAX Module can Set configuration using the HTTP, HTTPS protocol. HTTP and HTTPS settings are same. Only, HTTPS secure connection is supported. Default setting is HTTP HTTP Connection : Start internet explorer through http://192.168.192.168 Default : ID : admin Password : password
[Figure 3.2.1.1] Sign in with your HTTPS Connection : Start internet explorer through https://192.168.192.168 Default : ID : admin Password : password Note : When establishing a HTTP connection, to continue to ignore security warnings.
[Figure 3.2.1.2] HTTPS Sign in with your 23 Note :
Web Server Security feature
- Supported the SSL 2.0, SSL 3.0 and TLS 1.0
- For HTTPS connections, if you want to access from the computer, security protocol should be checked. 3.2.2 Home
: Display the system, protocol and network information in the CMAX Module
[Figure 3.2.2.1] Home 3.2.3 System
: After inserting the [Pinter Name], [Printer Port], [User Name] and [User Password], user should press the SUBMIT button to set system configuration
[Figure 3.2.3.1] System Setting 24 Printer Name : Set the [Printer Name]
Print Port Num : Set the [Print Port Number]
User ID : Set the [User ID]
User Password : Set the [User Password]
Confirm Password : Set correct values of [Confirm Password]
Default : User ID : admin , User Password : password 3.2.4 Protocol
: Set the HTTPS, TELNET, FTP and SNMP that are applications if you use. Then To perform SNMP sets for each item. After inserting, user should press the SUBMIT button to set Protocol configuration
[Figure 3.2.4.1] Protocol Setting Setup
- HTTPS (Default setting is HTTP)
TELNET (Default setting is disable) FTP (Default is disable) SNMP (Default is disable) SNMP
Community Name (Read) : Read Community Default : Public Community Name (Write) : Write Community Default : Private Trap IP Address : Trap IP Address. Default : 0.0.0.0 Trap Community : Trap Community Default : Public
25 3.2.5 Network
: After inserting the network configuration, user should press the SUBMIT button to set.
[Figure 3.2.5.1] Network Setting Network Mode : Select the Infra Network or Adhoc mode. Note : If adhoc mode user selects to connect a adhoc-channel (1~14). SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32 bytes. Inactivity Time : After connecting to the server of printer, It is time to maintain a connection with the server. Default setting : Disable, Maximun time : 32767(sec) IP Assignment Method : Supported Automatic Allocation(DHCP Client) or Manual Allocation. Default setting : Manual Allocation Automatic Allocation(DHCP Client) : Assigns the IP Address that is assigned in the DHCP server automatically Manual Allocation : Does not assign the IP address in the AP(Access Poing)s DHCP server. User should insert the IP Address that is such as IP Address of AP. IP Address : Insert the [IP Address] of AP : Default IP Address : 192.168.192.168 Subnet Mask : Insert the [Subnet Mask] of AP : Default subnet Mask : 255.255.255.0 Gateway : Insert the [Gateway] of AP : Default Gateway : 192.168.192.1 3.2.6 Authentication
: After inserting the security features, user should press the SUBMIT button to apply on the system. 26
[Figure 3.2.6.1] Authentication Setting Authentication : It is security configuration between CMAX Module and AP(Access Point) FIELD DESCRIPTION Cryptograph It should be select NONE or WEP64/128 as the setting of AP to be access Open System WEP Key You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) Cryptograph Select a WEP64/128 same APs configuration to be access. Shared Key WEP Key WPA-PSK /
WPA2-PSK WPA-TKIP /
WPA2-AES Cryptograph PSK Key Cryptograph EAP ID Password You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) You should same to configure a TKIP/AES with AP to be access. You should same to input a TKIP/AES with AP to be access. You should same to configure a cryptograph with AP to be access. You should same to configure a EAP Mode with AP to be access. You should Input the ID with configured certificate Server You should Input the Password with configured certificate Server However, If EAP Configuration is a EAP-TLS, you should input the private_key_password that is certificate password that generated for CMAX module.
[Table 3.2.6.1] Security setting 3.2.7 Wizard
: Provides that user can easily insert the configuration of system. After inserting the configurations, user should press the NEXT button to apply on the system. 27
[Figure 3.2.7.1] Wizard start page
[Figure 3.2.7.2] Wizard result page 3.2.8 Web Site
: Move to the website of CMAX Wireless 3.2.9 Contact
: User will be connected Customer Service by the E-Mail. 28 3.3 TELNET You can configure the CMAX module by TELNET Note :
TELNET : TELNET is Text-based remote access service and based TCP/IP Protocol. CMAX module configuration : Input the number provided on the left side of the menu and then enter the "Enter" to enter the next entry. Menu move example Menu number : move to next menu.
$ : go to the previous menu.
# : Go to the main menu. 3.3.1 TELNET Connection
: Connect by Telnet Client.( Microsoft Windows xp based on the description.) Windows command execution.
- Windowss Beginning Run input command. Input TELNET 192.168.192.168(IP Address of CMAX module) to command windows. Default : IP Address : 192.168.192.168
[Figure 3.3.1.1] TELNET Configuration Server Connection Screen Input User ID, User Password and then enter the Enter
Default : User ID : admin User Password : password
[Figure 3.3.1.2] TELNET Configuration major menu
[1] System: Configure System information.
[2] Protocol: You can select to Enable(1) or disable(0) the application of the activities. And configure SNMP access information. (Default setting HTTP)
[2] Protocol: You can select to Enable(1) or disable(0) the application of the activities. And configure SNMP access information. (Default setting HTTP) Network: Configure Network parameter of CMAX module. 29 Authentication: Configure security parameter of CMAX module. Save: You can store the configuration information that input so far to the CMAX module Exit : Terminate TELNET connection. 3.3.2 System
: You can configure Printer Name, Print Port Number, ID and User Password. User ID and User Password is applied to all application of CMAX module. Select [1]System to configuration main menu.
[Figure 3.3.2.1] TELNET System information menu
[0] System Name : Configure CMAX Module name
[1] TCP Server Port Num: Configure TCP Server port number.
[2] User ID: Configure user ID.
[3] User Password : Configure user password.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 3.3.3 Protocol
: You can select to enable or disable the application(HTTP, HTTPS, TELNET, FTP, SNMP) of the use and configure SNMP Parameter(Community, Trap IP Address, Trap Community). Select [2]Protocol to Configuration main menu.
[Figure 3.3.3.1] TELNET Protocol menu 30
[Figure 3.3.3.2] TELNET Task State Protocol menu Select [0]Task State to Protocol menu.
[0] HTTPS : Configure to Enable(1) or Disable(0) to HTTPS. ( default HTTP )
[1] TELNET : Configure to Enable(1)/Disable(0) to TELNET.
[2] FTP : Configure to Enable(1)/Disable(0) to FTP
[3] SNMP : Configure to Enable(1)/Disable(0) to SNMP.
[Figure 3.3.3.3] TELNET SNMP Connection Information menu Select [1] SNMP to Protocol menu.
[0] Community Name (Read) :If SNMP is Enable(1) state, you can configure to accessed community of read mode..
[1] Community Name (Write) : If SNMP is Enable(1) state, you can configure to accessed community of write mode.
[2] Trap IP Address : If SNMP is Enable(1) state, you can configure to IP Address that received Trap message.
[3] Trap Community : If SNMP is Enable(1) state, you can configure to Trap community.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 3.3.4 Network
: Configure Network parameter of CMAX module. Select [3] Neteork to Configuration main menu. 31
[Figure 3.3.4.1] TELNET Network menu
[0] Network Mode : Select a network mode( Infra Network(0) / Adhoc(1)).
[1] Adhoc Channel : Configure Adhoc Channel(1~14) to Connection.
[2] SSID : It should be configured the SSID same as AP's SSID to be access.
[3] Inactivity Time : It means a time limit keeping connection that without data communication between client and server.
[4] IP Assignment Method : Select IP Assignment megthod( DHCP(0)/Manual Alloccation(1) ).
[5] IP Address : If you selected Manual Alloccation(1), configure IP Address.
[6] Subnet Mask : If you selected Manual Alloccation(1), configure Subnet Mask.
[7] Gateway : If you selected Manual Alloccation(1), configure Gateway.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 3.3.5 Authentication
: Configure CMAX Module Security. It should be configured the Security same as AP's Security to be access. Select [4]Authentication to configuration main menu.
[Figure 3.3.5.1] TELNET Security main menu
[0] Authentication : You configure a security method.. Reference [Table 3.3.5.1]
[1] Cyrptograph : Configure an encryption method according to security methods.
[2] Key : Configure a key of WEP or PSK.
[3] EAP : Configure an EAP Mode according to WPA/WPA2 32
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.2] TELNET Open System Security main menu
[0~5] Authentication : Configure a Security Mode. Reference [Table 3.3.5.1]
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. Authentication" is a function that CMAX module does authenticate to AP through to wireless FIELD DESCRIPTION Cryptograph It should be select NONE or WEP64/128 as the setting of AP to be access Open System WEP Key You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) Cryptograph Select a WEP64/128 same APs configuration to be access. Shared Key WEP Key You can input the max 26charater,. It Configure to WEPB64/18 if you input it like the following format.
- WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX) WPA-PSK /
WPA2-PSK WPA-TKIP /
WPA2-AES Cryptograph You should same to configure a TKIP/AES with AP to be access. PSK Key Cryptograph EAP ID Password You should same to input a TKIP/AES with AP to be access. You should same to configure a cryptograph with AP to be access. You should same to configure a EAP Mode with AP to be access. You should Input the ID with configured certificate Server You should Input the Password with configured certificate Server However, If EAP Configuration is a EAP-TLS, you should input the private_key_password that is certificate password that generated for CMAX module.
[Table 3.3.5.1] Security setting 33
[Figure 3.3.5.3] TELNET Open System Cryptograph menu
[0] Open System : You should select NONE[0] or WEP64/128[1]
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.4] TELNET Shared Key Cryptograph menu
[1] Shared Key : You should select WEP64 or WEP128
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.5]TELNET WPA-PSK/WPA2-PSK a detailed menu.
[0] Authentication : you should configure a authentication mode. Reference [Table 3.3.5.1]
[1] Cyrptograph : You should configure a Cryptograph mode according to authentication mode
[2] Key : You should a WEP key of PSK Key.
[3] EAP : You should configure a EAP Mode according to WAP/WAP2
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 34
[Figure 3.3.5.6] TELNET WPA-PSK/WPA2-PSK Cryptograph menu
[2] WPA-PSK : You should select a TKIP[0] or AES[1]
[3] WPA2-PSK : You should select a TKIP[0] or AES[1]
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.7]TELNET WPA/WPA2 a detailed menu.
[0] Authentication : You should configure a authentication method. Reference [Table 3.3.5.1]
[1] Cyrptograph : Configure an encryption method according to security methods.
[2] Key : Configure a key of WEP or PSK.
[3] EAP : Configure an EAP Mode according to WPA/WPA2
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.8 ]TELNET WPA/WPA2 Cryptograph menu Cryptograph : It should be configured a cryptograph method with TKIP[0] or AES[1]
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 35
[Figure 3.3.5.9] TELNET EAP Configuration Menu.
[0] EAP Mode: It should be selected same as APs EAP mode
[1] EAP ID/PASSWORD: it should be configured same as APs EAP ID and password.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu. 3.3.6 Save
: To save a changed configuration information on CMAX module, select the [5]Save in the configuration main menu. 3.3.7 Exit
: To terminate a TELNET connection, select the [6] Exit in the configuration main menu. 3.4 FTP It is function to Upload or Download 'Config file' for CMAX module configuration by FTP. If you modify the 'Config file' and upload that, it will be changed CMAX module setup. Note :
FTP : File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over a TCP/IP-based network(between server and client). Supported FTP command Get: : Receive config file CAUTION : To Upload a file, dont use file-extension and use config to filename. ls : List contents of remote directory Put : Send config file 3.4.1 FTP Connection
: It should be executed to Microsoft Windows xp Command line. Execute Windows command
- Microsoft Windows xps beginning run input command
It should be input command FTP 192.168.192.168 (CMAX modules IP Address) Default : IP Address : 192.168.192.168 36
[Figure 3.4.1.1] FTP Connection Screen
User ID, User Password Enter . It should be input User ID and User password. Default : User ID : admin User Password : password 3.4.2 Config File list view
: It should be confirmed a file as you input ls.
[Figure 3.4.2.1] FTP ls command executed screen 3.4.3 Config File download
:It should be downloaded a file as you input get config.
[Figure 3.4.3.1] FTP get config command screen 3.4.4 Config File Upload
: It should be uploaded a file as you input put config. you must use file name as config.
[Figure 3.4.4.1] FTP put config command screen 37 3.4.5 Config File Specification
: Table 3.4.5.1 is downloaded files content from CMAX module by get config command. To change a configuration value, input without blank in bracket([ ]).
** Caution!!!
** Do not change the order or contents of the menu.
** Only need to change the settings, please.
[1] System 1. Printer Name: [unknown]
2. Printer Port Num: [9100]
3. User ID: [admin]
4. User Password: [password]
[2] Protocol 1) HTTPS: [0]
2) TELNET: [0]
3) FTP: [0]
4) SNMP: [0]
1. Task State 2. SNMP 1) Community Name (Read): [public]
2) Community Name (Write): [private]
3) Trap IP Address: [0.0.0.0]
4) Trap Community: [public]
[3] Network 1) Infra Network(0) / Adhoc(1): [1]
2) Adhoc Channel: [1]
1. Network Mode 2. SSID: [CMAX_adhoc]
3. Inactivity Time: [0]
4. IP Assignment Method: [1]
5. IP Address: [192.168.192.168]
6. SubnetMask: [255.255.255.0]
7. Gateway: [192.168.192.1]
[4] Authentication 1. Authentication: [0]
2. Cryptograph: [0]
3. EAP Mode: [0]
4. WEP Key: []
5. PSK Key: []
6. Authentification ID: []
7. Authentification Password: []
[Table 3.4.5.1] FTP config files content 38 Describes in detail how the file should be configure.
[1] System: Configure the system information. 1. Printer Name: Configure the system name. 2. Printer Port Num: Configure the TCP server port. 3. User ID: Configure the user ID. 4. User Password: Configure the user password.
[2] Protocol: Configure the Application (HTTPS, TELNET, FTP, SNMP) as Enable(1) or Disable(0). And configure the SNMP connect information. 1) HTTPS: Configure the HTTPS as Enable(1) or Disable(0).(default configuration is HTTP) 2) TELNET: Configure the TELNET as Enable(1) as Disable(0). 3) FTP: Configure the FTP as Enable(1) as Disable(0). 4) SNMP: Configure the SNMP as Enable(1) or Disable(0). 1. Task State 2. SNMP 1) Community Name (Read): Configure the Read mode community.. 2) Community Name (Write): Configure the Write mode community. 3) Trap IP Address: If SNMPs state is Enable(1), Configure the IP address for Trap message received. 4) Trap Community: If SNMPs state is Enable(1), Configure the Trap community.
[3] Network: Configure the CMAX modules Network parameter. 1. Network Mode 1) Infra network(0) / Adhoc(1) : Select a network mode to connect 2) Adhoc Channel: If you selected Adhoc, you select channel(1~11) . 2. SSID: CMAX_adhoc: It should be input SSID as the setting of AP to be access 3. Inactivity Time: It should be configured a time limit keeping connection that without data communication between client and server. 4. IP Assignment Method: Select DHCP(0) or Manual Alloccation(1) 5. IP Address: If you selected Manual Alloccation(1), you configure a IP Address. 6. SubnetMask: If you selected Manual Alloccation(1), you configure a Subnet Mask. 7. Gateway: If you selected Manual Alloccation(1), you configure a Gateway.
[4] Authentication: It should be configured the Security same as AP's Security to be access. 1. Authentication: Open System(0), Shared Key(1), WPA-PSK(2), WPA-PSK2(3), WPA(4), WPA2(5) 2. Cryptograph: NONE(0), WEP64/128(1), TKIP(2), AES(3) 3. EAP Mode: EAP-PEAP(0), EAP-TTLS(1), EAP-TLS(2), EAP-LEAP(3) 4. WEP Key: It should be configure the WEB key same as APs WEP key. 5. PSK Key: It should be configure the PSK key same as APs PSK key. 39 6. Authentication ID: It should be configure the Authentication ID same as APs Authentication ID. 7. Authentication Password: It should be configured the Authentication password same as AP's Authentication password to be access. 3.5 SNMP It is managed a network information through SNMP (supported SNMPv1). Note :
SNMP stands for 'Simple Network Management Protocol' and it is used for network management. SNMP is only a protocol to transfer messages so it need the Application program to get Network management information using SNMP. SNMP has SNMP manager and agent, as in common network application is composed server and client model. SNMP agent is a part of SNMP module and it is installed in managed system to collect the network or system information. SNMP manager is also part of the SNMP module and it request the network information to SNMP agent. 3.5.1 SNMP Connection
: It should be connect a SNMP Agent through SNMP Manager. It is introduced a SNMP operation at this manual as used SNMP-JManger-v1.0. SNMP-JManager-v1.0 running
- Input the address(192.168.192.168 , CMAX modules IP Address) to Agent IP Address. Default : IP Address : 192.168.192.168
- Input the Read Community, Write Community and then click Apply Changes button. Default : Read Community : public Write Community : private 40
[Figure 3.5.1.1] SNMP Connection configuration screen 3.5.2 SNMP Manager operation test: it is description of basic SNMP operation. If you selected terminal node to Get Tree, get this value(client note value).
[Figure 3.5.2.1] SNMP get message operation screen 41 Get Next : You can bring the value at trees as selected a terminal node.
[Figure 3.5.2.2] SNMP getnext message opration screen You can configure the terminal node value to set tree. (You can set only the contents had set on "Write")
[Figure 3.5.2.3] SNMP set message operation screen 42 Walk: It can get the all item that terminal node of tree or terminal node of node.
[Figure 3.5.2.4] SNMP walk message operation screen Traps: If a specific event occurs, relevant(in the event) message is transmitted to trap address.
- ColdStart: when a terminal rebooting works, coldstart message is transmitted to trap address.
[Figure 3.5.2.5] SNMP coldStart message received screen
- AuthenticationFailure: If Read, Write Community is not correct, AuthenticationFailure message is transmitted to trap address. 43
[Figure 3.5.2.6] SNMP AuthenticationFailure message received screen 4. Hardware Block Diagram
[Figure 4.1] Hardware Block Diagram 4.1 Hardware Pin Array 44 NUM NAME IN/OUT DESCRIPTION 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 VCC VCC VCC VCC WLAN_ID DDM DDP NRST RXD EXT_WLAN_RST RTS TXD Test Point1 CTS LED_BLUE GPIO1 LED_RED DRxD DTxD GND GND GND GND GND OUT IN/OUT IN/OUT IN IN IN OUT OUT 3.3V Power 3.3V Power 3.3V Power 3.3V Power WLAN Module ID Debug USB DDM Debug USB DDP H/W RESET UART RXD Factory Reset UART RTS UART TXD IN/OUT Test Point In/Out 1 IN OUT UART CTS BLUE LED Control GPIO IN/OUT General Purpose In/Out 1 OUT IN OUT RED LED Control GPIO Debug UART RXD Debug UART TXD GROUND GROUND GROUND GROUND GROUND
[Table 4.1.1] Hardware Pin Arry 5. Demo and Test This chapter explains several examples that it can be used for functional testing of CMAX module. Test environment is as follows. 5.1 Test environment 5.1.1 Hardware RS232 serial port with a PC CMAX module & CMAX test board PC's COM port and CMAX for the module's serial port to connect the serial cable is required. 5.1.2 Software 45 Configuration Tool of CMAX module Hyper Terminal( or other Terminal program) 5.2 Start Test 5.2.1 STEP1. It should be connect to CMAX Test board and PCs Serial port. It should be turn on the CMAX test board. It should be connected the PC to CMAX module through serial interface. It should be run a Terminal program of PC by connected Serial(ex, HyperTerminal) 5.2.2 STEP2. (Wireless Configuration to between CMAX module and PC). It should be connected the PC to CMAX module through wireless LAN. It should be configured the PCs Network to next value. IP( 192.168.192.XXX), subnet(255.255.255.0), gateway(192.168.192.1) It should be confirmed wireless connection of CMAX module and PC by Ping response. 5.2.3 STEP3. (Data Transfer) It should be run a Terminal program of PC by connected WLAN(ex, HyperTerminal) It should be input a charater to HyperTerminal. It should be confirmed a Receive Data on serial Terminal.
[Figure 5.2.3.1] Wireless LAN to Serial 6. Configuration Tool Command List It should be explained the command for CMAX module and PC through Serial interface and WLAN. 6.1 Configuration Tool Protocol 6.1.1 Serial Operation Specification OPERATION SPECIFICATION 1 Configuration Data Get Baud Rate : 115200 46 2 Configuration Data Set 3 Firmware Upload 4 Certificate Upload 5 BSS Info Request 6 BSS Info Response Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS Baud Rate : 115200 Hardware Handshaking : CTS/RTS
[Table 6.1.1.1] Serial Operation Specification 6.1.2 WLAN Operation Protocol & Port OPERATION PROTOCOL & PORT 1 Configuration Data Get 2 Configuration Data Set 3 Firmware Upload 4 Certificate Upload 5 BSS Info Request 6 BSS Info Response 7 Printer Search Request 8 Printer Search Response TCP , 3318 TCP , 3318 TCP , 3318 TCP , 3318 TCP , 3318 TCP , 3318 UDP , 3337 UDP , 9000
[Table 6.1.2.1] WLAN Operation Protocol & Port 6.2 Serial & WLAN Command 6.2.1 Serial Operation Serial mode Configuration Tool work should need Start Message before sending real command. Serial mode Configuration Tool command should change all byte to ASCII code. And next transmit. Ex : Command Frame If it changes hexadecimal code to __[I_F]__[IF__GET]. It is 0x5F, 0x5F, 0x49, 0x49, 0x5F, 0x46, 0x47, 0x5F, 0x5F, 0x5B, 0x49, 0x46, 0x5F, 0x5F, 0x5D, 0x45, 0x54, 0x47. It should be transmitted ASCII value that the above hexadecimal value changed 0x5F is separated ASCII 5(==0x35) and ASCIIF(==0x46). and then WLAN module send them by serial interface. 47 ASCII _
I F
G E T HEX 0x5F 0x5B 0x49 0x46 0x47 0x5D 0x45 0x54
[Table 6.2.1.1] Serial Command ASCII, HEX Serial Command Sequence
[Figure 6.2.1.1] Serial Command Sequence Serial Start Message Format Serial Start Message Value Configuration Start Message
[0x7f, 0x1D, 0x1F, 0x03]
Configuration Start Response
[0x7f, 0x03]
Firmware Update Start Message
[0x80, 0x1D, 0x1F, 0x03]
Firmware Update Start Response
['S', 'T', 'R', 'T', 0x03]
CA_CER Update Start Message
[0x81, 0x1D, 0x1F, 0x03]
CA_CER Update Start Response
['S', 'T', 'R', 'T', 0x03]
CL_KEY Update Start Message
[0x82, 0x1D, 0x1F, 0x03]
CL_KEY Update Start Response
['S', 'T', 'R', 'T', 0x03]
CL_PEM Update Start Message
[0x83, 0x1D, 0x1F, 0x03]
CL_PEM Update Start Response
['S', 'T', 'R', 'T', 0x03]
Direction Host Device Device Host Host Device Device Host Host Device Device Host Host Device Device Host Host Device Device Host RSSI Request Message
[0x85, 0x1D, 0x1F, 0x03]
Device Mobile Printer RSSI response Message
[0x1D, 0x49, 0x02]
+ RSSI[2Byte] +[0x03]
Mobile Printer Device
[Table 6.2.1.2] Serial Start Message Format 6.2.2 Wireless LAN Operation Wireless LAN Command Sequence 48
[Figure 6.2.2.1] Wireless LAN Command Sequence 6.2.3 Serial & Wireless LAN Command Format Request Frame Format DESCRIPTOR Length(bytes) STX (COMMAND CODE) PARAMETER ETX 18 1
[Table 6.2.3.1] Request Frame Format (Serial & WLAN) Variable Response Frame Format DESCRIPTOR Length(bytes) STX (COMMAND CODE) PARAMETER 18 Variable ETX 1
[Table 6.2.3.2] Response Frame Format (Serial & WLAN) ETX Frame Format SETTING ETX FORMAT ETX = 0x03
[Table 6.2.3.3] ETX Frame Format (Serial & WLAN) STX (Command Code) Frame Format Function Operation Message Value Size Comment Printer Search
(UDP setting) 1 2 Search Request
(Host 9000 port Device 3337 port) Search Response
(Device 3337 Port Host 9000 Port) WLAN Mode Only Search Request CMD("__[I_F]__[PRT_REG]") unsigned char[18]
Search Response CMD("__[I_F]__[REG_RSP]") unsigned char[18]
WLAN MAC unsigned char[6]
WLAN IP Address unsigned char[4]
WLAN SubNetMask unsigned char[4]
49 WLAN Gateway unsigned char[4]
Printer Port unsigned short[2]
baudrate Version DHCP unsigned char not used unsigned short[2]
unsigned char IncativityTime unsigned short[2]
https value unsigned char 0 : http, 1 : https unsigned short[2]
0x1F 0x00 (fix) WLAN Mode Only Search Response CMD("__[I_F]__[PRT_SET]") unsigned char[18]
WLAN MAC unsigned char[6]
WLAN IP Address unsigned char[4]
WLAN SubNetMask unsigned char[4]
SET Request WLAN Gateway 1
(Host 9000 Port Device 3337 Port) Printer Port baudrate Version DHCP unsigned char not used unsigned char[4]
unsigned short[2]
unsigned short[2]
unsigned char Printer SET
(UDP setting) SET Response 2
(Device 3337 Port Host 9000 Port) IncativityTime unsigned short[2]
https value unsigned char 0 : http, 1 : https unsigned short[2]
0x1F 0x00 (fix) Search Response CMD("__[I_F]__[SET_RSP]") unsigned char[18]
WLAN MAC unsigned char[6]
WLAN IP Address unsigned char[4]
WLAN SubNetMask WLAN Gateway Printer Port unsigned char[4]
unsigned char[4]
unsigned short[2]
baudrate Version DHCP unsigned char not used unsigned short[2]
unsigned char IncativityTime unsigned short[2]
https Value unsigned char 0 : http, 1 : https unsigned short[2]
0x1F 0x00 (fix) Get Serial & WLAN Configurati 1 Configuration Get Configuration Get Value unsigned char[18]
50 on
(configurati on start message) Value CMD("__[I_F]__[IF__GET]")
(Host Device) Check sum unsigned char[2]
2 Configuration Current Value Configuration Current Value CMD("__[I_F]__[IF__CUR]") unsigned char[18]
(Device Host) SystemName unsigned char[44]
Region NetworkMode IpConfigMode IP Address SubNetMask Gateway SSID unsigned char Location unsigned char Infra/Adhoc unsigned char Static/DHCP unsigned char[4]
unsigned char[4]
unsigned char[4]
unsigned char[32]
AUTH Mode unsigned char Crypto Mode unsigned char 0:Open, 1:Shared, 2:WPA1PSK, 3:WPA2PSK, 4:WPA1EAP, 5:WPA2EAP 0:none, 2:WEP64/128, 3:TKIP, 4:AES WEP Key_0 WEP Key_1 WEP Key_2 WEP Key_3 PSK Key unsigned char[26]
unsigned char[26]
unsigned char[26]
unsigned char[26]
unsigned char[64]
Adhocchannel unsigned char EAP Mode EAP ID unsigned char unsigned char[32]
EAP PASSWORD unsigned char[32]
TLS, TTLS, PEAP, LEAP, FAST USER NAME unsigned char[32]
System ID USER PASSWORD unsigned char[32]
System Password PRINTER Port unsigned char[2]
unsigned char Channel Search unsigned char[64]
unsigned char[64]
unsigned char unsigned char powersave unsigned char Dummy SysContact SysLocation ipDefaultTTL Dummy isWebSSL 51 isTelnet isFTP isSNMP isSNMPTrap unsigned char unsigned char unsigned char unsigned char SNMPSetCommunity unsigned char[16]
SNMPGetCommunity unsigned char[16]
SNMPTrapCommunity unsigned char[16]
TrapIP IncativityTime Check sum FAIL CMD("__[I_F]__[___FAIL]") unsigned char[4]
unsigned char[3]
unsigned char[2]
unsigned char[18]
Fail Response E 1 Message FAIL
(Host Device) Check sum unsigned char[2]
Serial & WLAN BSS Information Request BSS Info Request CMD("__[I_F]__[BSS_REQ]") unsigned char[18]
(Host Device) Check sum unsigned char[2]
BSS Info Response CMD("__[I_F]__[BSS_RSP]") unsigned char[18]
BSS Information
(configurati on start message) BSS Information 2 Response
(Device Host) SSID Type SSID Length SSID Value BSSID Type BSSID length BSSID Value unsigned char unsigned char valiable(MAX 32) unsigned char unsigned char unsigned char[6]
Maximum MessageSize :
5KByte
(MAX AP : 100) NetworkMode unsigned char RSSI Security unsigned char[2]
unsigned char None 0, WEP64 3, WEP128 3, WPA1 4, WPA2 8 Check sum unsigned char[2]
Message FAIL
(Host Device) FAIL CMD("__[I_F]__[___FAIL]") unsigned char[18]
Fail Response Check sum unsigned char[2]
Connect Request
(Host Device) Connect Request Serial & WLAN System Request CMD("__[I_F]__[SYS_REQ]") unsigned char[18]
Check sum unsigned char[2]
Search Request unsigned char[18]
Get Info E 1 2 52 Set Configurati on
(configurati on start message) CMD("__[I_F]__[SYS_RSP]") Firmware version unsigned char[16]
(Device Host) Update date MAC Address Check sum Serial & WLAN unsigned char[32]
unsigned char[6]
unsigned char[2]
1 Configuration Set Value Configuration Set Value CMD("__[I_F]__[IF__SET]") unsigned char[18]
(Host Device) SystemName unsigned char[44]
Region NetworkMode IpConfigMode IP Address SubNetMask Gateway SSID unsigned char Location unsigned char Infra/Adhoc unsigned char Static/DHCP unsigned char[4]
unsigned char[4]
unsigned char[4]
unsigned char[32]
AUTH Mode unsigned char Crypto Mode unsigned char 0:Open, 1:Shared, 2:WPA1PSK, 3:WPA2PSK, 4:WPA1EAP, 5:WPA2EAP 0:none, 2:WEP64/128, 3:TKIP, 4:AES WEP Key_0 WEP Key_1 WEP Key_2 WEP Key_3 PSK Key Adhocchannel EAP Mode EAP ID unsigned char[26]
unsigned char[26]
unsigned char[26]
unsigned char[26]
unsigned char[64]
unsigned char unsigned char unsigned char[32]
EAP PASSWORD unsigned char[32]
USER NAME unsigned char[32]
USER PASSWORD unsigned char[32]
PRINTER Port unsigned char[2]
unsigned char Channel Search unsigned char[64]
unsigned char[64]
Dummy SysContact SysLocation 53 ipDefaultTTL Dummy isWebSSL isTelnet isFTP isSNMP isSNMPTrap unsigned char unsigned char unsigned char unsigned char unsigned char unsigned char unsigned char SNMPSetCommunity unsigned char[16]
SNMPGetCommunity unsigned char[16]
SNMPTrapCommunity unsigned char[16]
TrapIP IncativityTime Check sum unsigned char[4]
unsigned char[3]
unsigned char[2]
Message 2 SUCCESS(Device SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Host) Check sum unsigned char[2]
Message FAIL
(Host Device) FAIL CMD("__[I_F]__[___FAIL]") unsigned char[18]
Check sum unsigned char[2]
Serial & WLAN FW Data CMD( "__[I_F]__[FW_DATA]") unsigned char[18]
FW Data Length unsigned char[8]
FW Data Check sum valiable unsigned char[2]
SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Check sum unsigned char[2]
FW END CMD("__[I_F]__[FW__END]") unsigned char[18]
Check sum unsigned char[2]
SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Check sum unsigned char[2]
FAIL CMD("__[I_F]__[___FAIL]") unsigned char[18]
Check sum unsigned char[2]
FW CANCEL Request FW CRC ERROR("__[I_F]__[FW_XREQ]") unsigned char[18]
54 Firmware Upload E 1 2 3 4 E FW Data Message
(Host Device) Message SUCCESS
(Device Host) FW END Message
(Host Device) Message SUCCESS
(Device Host) Message FAIL
(Host Device)
(Host Device) Check sum unsigned char[2]
FW CANCEL Response FW CRC ERROR("__[I_F]__[FW_XRSP]") unsigned char[18]
(Device Host) Check sum unsigned char[2]
FW CRC ERR Message FW CRC ERROR("__[I_F]__[CRC_ERR]") unsigned char[18]
(Host Device) Check sum unsigned char[2]
Serial Mode Only Certificate Data CMD("__[I_F]__[FW_CERT]") unsigned char[18]
Certificate Size unsgiend char[8]
Max 500byte Certificate Data 1 Message
(Host Device) Cerifiacate Data valiable Check sum unsigned char[2]
Certificate Data END CMD("__[I_F]__[CERTEND]") unsigned char[18]
Certificate Size unsgiend char[8]
Certificate Data End Message
(Host Device) Cerifiacate Data valiable Max 500byte Check sum unsigned char[2]
Message SUCCESS
(Device Host) SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Success Response Check sum unsigned char[2]
WLAN Mode Only CA Data CMD("__[I_F]__[CA_CERT]") CA Data Message
(Host Device) CA Data Size CA Data Check sum unsigned char[18]
unsgiend char[8]
valiable Max 500byte unsigned char[2]
unsigned char[18]
Certificate Data END CMD("__[I_F]__[CERTEND]") Certificate Data End Message Certificate Size unsgiend char[8]
(Host Device) Cerifiacate Data valiable Max 500byte Check sum unsigned char[2]
Message SUCCESS
(Device Host) SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Success Response Check sum unsigned char[2]
WLAN Mode Only Client Key Data Message Client Key Data CMD("__[I_F]__[CK_CERT]") unsigned char[18]
(Host Device) Client Key Data Size unsgiend char[8]
Client Key Data Data valiable Max 500byte 55 Certificate
(CA, Client Key, Client PEM, FAST PAC) Upload CA Upload Client Key Upload 2 3 1 2 3 1 Check sum unsigned char[2]
Certificate Data END CMD("__[I_F]__[CERTEND]") unsigned char[18]
Certificate Size unsgiend char[8]
Certificate Data End Message
(Host Device) Cerifiacate Data valiable Max 500byte Check sum unsigned char[2]
Message SUCCESS
(Device Host) SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Success Response Check sum unsigned char[2]
2 3 WLAN Mode Only Client PEM Data CMD("__[I_F]__[CP_CERT]") unsigned char[18]
Client PEM Data Size unsgiend char[8]
Client PEM Data 1 Message
(Host Device) Client PEM Data Data valiable Max 500byte Client PEM Upload 2 3 Check sum unsigned char[2]
Certificate Data END CMD("__[I_F]__[CERTEND]") unsigned char[18]
Certificate Size unsgiend char[8]
Certificate Data End Message
(Host Device) Cerifiacate Data valiable Max 500byte Check sum unsigned char[2]
Message SUCCESS
(Device Host) SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Success Response Check sum unsigned char[2]
WLAN Mode Only FAST PAC Data CMD("__[I_F]__[FP_CERT]") unsigned char[18]
FAST PAC Data Size unsgiend char[8]
FAST PAC Data 1 Message
(Host Device) FAST PAC Data Data valiable Max 500byte FAST PAC Upload 2 3 Check sum unsigned char[2]
Certificate Data END CMD("__[I_F]__[CERTEND]") unsigned char[18]
Certificate Size unsgiend char[8]
Certificate Data End Message
(Host Device) Cerifiacate Data valiable Max 500byte Check sum unsigned char[2]
Message SUCCESS
(Device Host) SUCCESS CMD("__[I_F]__[IF__SUC]") unsigned char[18]
Success Response Check sum unsigned char[2]
[Table 6.2.3.4] STX Command Frame Format (Serial & WLAN) 56 7. Technical Support, Warranty, and Precaution 7.1 Technical Support If you have any question regarding operation of the product, visit the message board on CMAX Wirelesss web site or send us an email at the following address:
E-mail: support@cmaxwireless.com For more information, visit our website at http://www.cmaxwireless.co.kr 7.2 Warranty 7.2.1 Refund Upon the customers request to refund the product within two weeks after purchase, CMAX Wireless will refund the product. 7.2.2 Free Repair Services For product failures occurring within one year after purchase, CMAX Wireless provides free repair services or exchange the product. However, if the product failure is due to users fault, repair service fees will be charged or the product will be replaced at users expense. 7.2.3 Charged Repair Services For product failures occurring after the warranty period (one year) or resulting from users fault, repair service fees will be charged and the product will be replaced at users expense. 7.3 Precaution CMAX Wireless is not responsible for product failures occurring due to users alternation of the product. Specifications of the product are subject to change without prior notice for performance improvement. CMAX Wireless does not guarantee successful operation of the product if the product was used under conditions deviating from the product specifications. 57 Reverse engineering of firmware and applications provided by CMAX Wireless is prohibited. Use of firmware and applications provided by CMAX Wireless for purposes other than those for which they were designed is prohibited. Do not use the product in an extremely cold or hot place or in a place where vibration is severe. Do not use the product in an environment in which humidity is high or a lot of oil exists. Do not use the product where there is caustic or combustible gas. CMAX Wireless does not guarantee normal operation of the product under the conditions a lot of noise exists. Do not use the product for a purpose that requires exceptional quality and reliability relating to users injuries or accidents - aerospace, aviation, health care, nuclear power, transportation, and safety purposes. CMAX Wireless is not responsible for any accident or damage occurring while using the product. 7.4 USA-Federal Communications Commission (FCC) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the distance between the equipment and the receiver.
- Connect the equipment to outlet on a circuit different from that to which the receiver is 58 connected.
- Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation. Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. 7.4.1 Labeling FCC ID: U5MCM-MS300 The proposed with FCC ID label format is to be placed on the module. If FCC ID is not visible when the module is installed into the system, Contains FCC ID: shall be placed on the outside of final host system. Caution: Exposure to Radio Frequency Radiation. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. COPYRIGHT NOTICE Copyright CMAX Wireless co., Ltd. All rights Reserved. For more information, visit our website at http://www.cmaxwireless.co.kr 59
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2011-08-12 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2011-08-12
|
||||
1 | Applicant's complete, legal business name |
BIXOLON Co.,Ltd.
|
||||
1 | FCC Registration Number (FRN) |
0016225153
|
||||
1 | Physical Address |
7th-8th FL, MiraeAsset Venture Tower, 20
|
||||
1 |
Seongnam-si, Gyeonggi-do, N/A
|
|||||
1 |
South Korea
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
c******@telefication.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
U5M
|
||||
1 | Equipment Product Code |
CM-MS300
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
J******** S****
|
||||
1 | Title |
Assistant Manager
|
||||
1 | Telephone Number |
+82-3********
|
||||
1 | Fax Number |
+82-3********
|
||||
1 |
j******@bixolon.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
CTK Co., Ltd
|
||||
1 | Physical Address |
South Korea
|
||||
1 | Telephone Number |
+82-3********
|
||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | WIFI Module | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Single Modular Approval | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
CTK Co., Ltd.
|
||||
1 | Name |
P****** Y********
|
||||
1 | Telephone Number |
82-31********
|
||||
1 | Fax Number |
82-31********
|
||||
1 |
j******@e-ctk.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 2412.00000000 | 2462.00000000 | 0.0056000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC