WiFi1500CF Plug-In Hardware User Guide JA03-UM-WiFi
Page 10 Rev: P00 Date: 03/13/14
© Copyright 2014 Janus Remote Communications
Specifications subject to change without notice
All Rights Reserved See website for latest revision. Not intended for life support applications.
3. WiFi Module Continued
3.2 WiFi Module Operations continued
3.2.2 Operation examples
3.2.2.3 Auto Connect
In the example below, the GS1500M module is configured to connect to an access point, the auto connect feature is
enabled, and the settings are stored in a profile. When re-started, the unit will connect to the access point whereupon
serial data can be transferred to and from a remote IP address.
AT+NDHCP=1
DHCP enable
AT+WAUTO=0,<SSID>
Set auto wireless parameters (0=infrastructure).
AT+NAUTO=1,1,<Destination IP>,<Port>
Set auto network parameters (TCP server).
ATC1
Set the auto connect mode
AT&W0
Save the configuration in profile 0
AT&Y0
Set to load profile 0 at start-up
At this point the GS1500M module should be restarted, either by pulling the RESET pin (WiFi1500CF pin 47)
low or by removing and re-establishing power to the unit. The GS1500M will respond with its network settings
upon successfully associating with the wireless network. Serial data can now be sent to and from the GS1500
via the serial port. A telnet session or a simple TCP terminal can be opened at the client (destination IP) to
demonstrate the sending and receiving of serial data.
In order to terminate the Auto Connect session, enter a sequence of three ‘+’ (plus) symbols followed by one
second of no data being entered. Following this the command mode will be available.
3.3 WiFi Module Firmware
The GS1500M WiFi module can be loaded with several versions of the S2W (Serial-to-WiFi) application firmware.
Because of limited memory, certain features are only exclusively available in specific firmware loads. By default,
the module is loaded with the Web Provisioning firmware. The table below illustrates the features available on the
available firmware loads:
Firmware
Notes
Enterprise Security (EAP)
SPI Mode 0
Enables SPI interface
Web Server Provisioning
DEFAULT
Wi-Fi Protected Setup (WPS)
RF Test
Contact Janus about providing the WiFi1500CF with firmware loads other than the default Web Server Provisioning version.