background image

AsiaRF                                                               

  AWM002 

47 

www.asiarf.com 

Avoidance 

CSMA/CD 

Carrier  Sense  Multiple  Access/  Collision 
Detection 

DDNS 

Dynamic Domain Name Server 

DH 

Diffie-Hellman Algorithm 

DHCP 

Dynamic Host Configuration Protocol 

DSSS 

Direct Sequence Spread Spectrum 

EAP 

Extensible Authentication Protocol 

ESP 

Encapsulating Security Payload 

FCC 

Federal Communications Commission 

FTP 

File Transfer Protocol 

IEEE 

Institute  of  Electrical  and  Electronic 
Engineers 

IKE 

Internet Key Exchange 

IP 

Internet Protocol 

ISM 

Industrial, Scientific and Medical 

LAN 

Local Area Network 

MAC 

Media Access Control 

MD5 

Message Digest 5 

NAT 

Network Address Translation 

NT 

Network Termination 

NTP 

Network Time Protocol 

Summary of Contents for AWM002

Page 1: ...AsiaRF AWM002 1 www asiarf com User s Manual Version 1 0 WiFi AP Router Module...

Page 2: ...to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential in...

Page 3: ...rence received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s a...

Page 4: ...TION 2 1 HOW TO START 7 2 2 LED INDICATOR AND PORT DESCRIPTION 9 2 3 POSITION SLIDE SWITCH 9 2 4 RESET BUTTON 9 2 5 PIN DEFINITION 9 CHAPTER 3 FIRMWARE SETUP 3 1 DEFAULT CONFIGURATION 12 3 2 CONFIGURE...

Page 5: ...C ACCESS 21 3 4 4 MEDIA 21 3 4 5 SECURITY 21 3 4 5 1 FIREWALL 22 3 4 5 2 WEBSITE BLOCK 22 3 4 5 3 MAC FILTER 22 3 4 5 4 ACCESS RESTRICTIONS 22 3 4 5 5 PORT TRIGGERING 23 3 4 5 6 DOS 24 3 4 6 1 VISUAL...

Page 6: ...MODE 30 3 6 1 LAN SETTING 31 CHAPTER 4 FREQUENTLY ASKED QUESTIONS FAQ 4 1 WHAT AND HOW TO FIND MY PC S IPAND MAC ADDRESS 32 4 2 WHAT IS WIRELESS LAN 33 4 3 WHAT ARE ISM BANDS 33 4 4 HOW DOES WIRELESS...

Page 7: ...THENTICATION 42 4 18 WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL TKIP 43 4 19 WHAT IS ADVANCED ENCRYPTION STANDARD AES 43 4 20 WHAT IS INTER ACCESS POINT PROTOCOL IAPP 43 4 21 WHAT IS WIRELESS DISTRIBUTIO...

Page 8: ...Mbps transmission rate It supports three working modes AP Client and Router The default mode is AP Client mode can be easily switched by sliding the side switch AWM002 can be powered from either DC 3...

Page 9: ...evision water shower for planets automation controller surveillance camera baby mornitor Industrial Control Machine control Power saving control Timer automatic You can link with internet and do any y...

Page 10: ...GHz subject to local regulations Number of Selectable Channels 802 11n 20MHz 40MHz 802 11b g USA Canada FCC 11 channels 2 412GHz 2 462GHz Europe CE 13 channels 2 412GHz 2 472GHz Japan TELEC 14 channel...

Page 11: ...E by request Power consumption Pin input 3 3V 460mA 1 2V 500mA LDO Total 5V 550mA Above are the peak average is like 5V 300mA depend on the system design Weight 30g Dimension 25x35 mm Storage Temperat...

Page 12: ...PoE for ADSL Transparent Bridge Networking DHCP Client Relay Server Dynamic DNS NTP Client DNS Cache Proxy Firewall PPTP L2TP IPSec MAC IP Port Filter Virtual Server DMZ Content Filter Forbid BT Forbi...

Page 13: ...odes High security WEP64 128 TKIP WPA WPA2 AES mixed 802 11i 802 1X Authentication with RADIUS Client QoS WMM WMM PS 1 4 Package contents The package contains the following items 1 AWM002 1 AWM002 Bas...

Page 14: ...1 Put the AWM002 Module on Base board and linked with a small PCB antenna 2 Connect Power Adaptor to get the 12V 1A power LEDs will turn on and flashing 3 Wait around one minute the WiFi signal start...

Page 15: ...AsiaRF AWM002 8 www asiarf com...

Page 16: ...nt in WPS mode 3 WLAN Indicates the WIRELESS LAN is connected 4 WAN Indicates an Ethernet cable is connected into WAN port 5 LAN Indicate an Ethernet cable is connected into the LAN port 6 TX Indicate...

Page 17: ...selection 14 13 USB_D 1 2V 16 15 1 2V GPIO 19 18 17 TX0 GPIO 18 20 19 TX0 GPIO 17 22 21 RX0 LINK0_LED 24 23 RX0 II Description Pin Pin Description I2 SCLK 2 1 PCMFS I2 SWS 4 3 PCMCLK I2 SSDO 6 5 PCMD...

Page 18: ...w asiarf com Double row 1 27mm pitch on the 35mm side 2 Reserved Available for use 3 Reserved is ACTIVE LOW 4 LEDs and WPS Reset to Default are active LOW Reset Reset to default function is share AP C...

Page 19: ...connection type can be setup in WAN page by using Static IP DHCP Auto config PPPoE and Transparent Bridge LAN port is for LAN and wireless is LAN also Wireless AP Client In this mode the device is sup...

Page 20: ...cable to the AWM002 LAN port and your notebook computer 2 Power up to AWM002 3 Open Internet Explorer from your notebook computer 4 Enter http 10 10 1 1 5 Enter the Username and Password If this is t...

Page 21: ...s the most information of the router Log is System Information System warming and System Log records can let engineer or user to look the turn on record and other linking devices Interface is the stat...

Page 22: ...AsiaRF AWM002 15 www asiarf com You can adjust Brightness Contract Saturation Hue White Balance Auto Gamma Power line frequency White Balance Temperature Sharpness Backlight Compensation JPG quality...

Page 23: ...and Standard Wireless AP mode By switch you can see what mode you are using now 3 4 Wireless Router Transparent Bridge Mode 3 4 1 WAN 3 4 1 1 Setup Default is DHCP means can get IP address from the m...

Page 24: ...MAC clone Change MAC address to the other MAC address for fitting ISP s identified 3 4 1 4 DDNS Dynamic DNS is for you to register one address in DNS server for you from internet to get link back this...

Page 25: ...tomatically Bind automatically when DHCP server allocates IP address and deletes at lease time The addresses manually binded are also play a role at the same time This function applies to the places t...

Page 26: ...AsiaRF AWM002 19 www asiarf com 3 4 2 3 DHCP table DHCP Table Display all IP address allocated by current DHCP server 3 4 3 Wireless...

Page 27: ...less function Broadcast and not broadcast SSID set SSID name and etc 3 4 3 2 Security The types of wireless security mode are as followings and you couls select as the need Disable Open System WPA WPA...

Page 28: ...4 3 4 WPS There are Enable and Disable 3 4 3 5 Station List 3 4 3 6 MAC Access MAC Access can limit the linking of Wireless by MAC Like allow or deny the MAC list you input here 3 4 4 Media You can se...

Page 29: ...specilly for some open servers such as virtual server DMZ and etc enabling router firewall function can block malicious attacks and prevent DoS attack 3 4 5 2 Website Block Select website block Enable...

Page 30: ...e data packet will be disposed by discarded by router no matter the source port or destination port of data packet within this range 3 4 5 5 Port Triggering In the Port block you could block some port...

Page 31: ...rmal situation Threshold is150 packets second Prevent ICMP flood attack Prevent ICMP flood attack Set maximum rate of ICMP packet according to visit capacity of server in normal situation Threshold is...

Page 32: ...enabling this Prevent source IP spoofing attack Prevent source IP spoofing attack attack by enabling this Prevent ARP Deception Enable ARP deception function by enabling this The shorter the interval...

Page 33: ...ugh the firewall You can configure virtual server on the router to change it 3 4 6 2 Application Application Some softwares are needed multiple Internet connections such as IP telephone video conferen...

Page 34: ...t virtual server If the router received a request from the external network it will check whether there is a virtual server match in the list according to port of the external service firstly if there...

Page 35: ...ww asiarf com 3 4 7 1 Table Display the current routing table 3 4 7 2 Static Allow user define the path routing to the other host or network 3 4 8 Admin 3 4 8 1 Management UPnP Universal Plug and Play...

Page 36: ...enable 3 4 8 2 Time setting 3 4 8 3 Backup Restore Setting s backup and restore 3 4 8 4 Firmware Upgrade 3 4 8 5 Restart 3 4 8 4 Factory Default 3 4 8 5 Password Administration password setting 3 5 W...

Page 37: ...g the SSID encryption method Click the one you want to link and remember the encryption mode input the security part and press Apply The router will be restarted after restarted in Status you can see...

Page 38: ...AsiaRF AWM002 31 www asiarf com 3 6 Wireless AP mode Wireless and all Ethernet ports are in the same IP section 3 6 1 LAN setting...

Page 39: ...eparated by periods Each number can be zero to 255 For example 191 168 1 254 could be an IP address The MAC Media Access Control address is your computer s unique hardware number On an Ethernet LAN it...

Page 40: ...frequency bands that the Federal Communications Commission FCC authorized for wireless LANs The ISM bands are located at 915 13 MHz 2450 50 MHz and 5800 75 MHz 4 4 How does wireless networking work T...

Page 41: ...ode also called peer to peer mode or an Independent Basic Service Set or IBSS is simply a set of 802 11 wireless stations that communicate directly with one another without using an access point or an...

Page 42: ...BSSID A six byte address that distinguishes a particular a particular access point from others Also know as just SSID Serves as a network ID or name 4 6 What is ESSID The Extended Service Set ID ESSID...

Page 43: ...What are the Open System and Shared Key authentications IEEE 802 11 supports two subtypes of network authentication services open system and shared key Under open system authentication any wireless st...

Page 44: ...et key that is shared between a mobile station e g a laptop with a wireless Ethernet card and an access point i e a base station The secret key is used to encrypt packets before they are transmitted a...

Page 45: ...eads to low fragment overhead Hence there is a trade off between spatial re use and fragment overhead Fragment threshold is the maximum packet size used for fragmentation Packets larger than the size...

Page 46: ...CA transmission mechanism the transmitting station sends out an RTS packet to the receiving station and waits for the receiving station to send back a CTS Clear to Send packet before sending the actu...

Page 47: ...ween beacon transmissions Before a station enters power save mode the station needs the beacon interval to know when to wake up to receive the beacon and learn whether there are buffered frames at the...

Page 48: ...2 11b adapter Generally if your client hardware supports operation with SSID disabled it s not a bad idea to run that way to enhance network security However it s no replacement for WEP MAC filtering...

Page 49: ...re update for the operating system For enterprise networks an authentication server typically one that supports RADIUS and the selected EAP authentication protocol will be added to the network 4 16 Wh...

Page 50: ...2 11i encryption standard for wireless LANs TKIP is the next generation of WEP the Wired Equivalency Protocol which is used to secure 802 11 wireless LANs TKIP provides per packet key mixing a message...

Page 51: ...hanges It also uses Layer 2 frames to update the forwarding tables of Layer 2 devices 4 21 What is Wireless Distribution System WDS The Wireless Distribution System feature allows WLAN AP to talk dire...

Page 52: ...maller one of MTU and the peer s MRU The default is value 1400 4 24 What is Clone MAC Address Clone MAC address is designed for your special application that request the clients to register to a serve...

Page 53: ...Virtual Private Network It is designed for creating point to point private link via shared or public network 4 28What is IPSEC IPSEC is the abbreviation of IP Security It is used to transferring data...

Page 54: ...trum EAP Extensible Authentication Protocol ESP Encapsulating Security Payload FCC Federal Communications Commission FTP File Transfer Protocol IEEE Institute of Electrical and Electronic Engineers IK...

Page 55: ...SNR Signal to Noise Ratio SSID Service Set Identification TCP Transmission Control Protocol TFTP Trivial File Transfer Protocol TKIP Temporal Key Integrity Protocol UPNP Universal Plug and Play VPN Vi...

Page 56: ...d on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and rec...

Page 57: ...rized as an unintentional radiator under the Declaration of Conformity procedure without a transmitter certified module and a module is added the host manufacturer is responsible for ensuring that the...

Reviews: