AsiaRF AWM002 WiFi AP Router Module User Manual
AsiaRF Ltd. WiFi AP Router Module Users Manual
AsiaRF >
Users Manual

AsiaRF AWM002
1
www.asiarf.com
User’s Manual
Version: 1.0
WiFi AP Router Module

AsiaRF AWM002
2
www.asiarf.com
Copyright Statement
Trademarks
Copyright @2013
Contents are subject to change without notice.
All trademarks belong to their respective proprietors.
Copyright Statement
THIS DOCUMENT CONTAINS OF PROPRIETARY TECHNICAL
INFORMATION THAT IS THE PROPERTY OF THIS COMPANY. AND
NO PART OF THIS DOCUMENTATION MAY BE REPRODUCED,
STORED IN A RETRIEVAL SYSTEM OR TRANSMITTED IN ANY
FORM OR BY ANY MEANS, ELECTRICAL OR MECHANICAL, BY
PHOTOCOPYING, RECORDING, OR OTHERWISE, WITHOUT THE
PRIOR WRITTEN CONSENT OF THIS COMPANY.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for
a Class B digital device, pursuant to Part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If
this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of
the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.

AsiaRF AWM002
3
www.asiarf.com
- Connect the equipment into an outlet on a circuit different from
that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for
help.
This device complies with Part 15 of the FCC Rules. Operation is
subject to the following two conditions: (1) This device may not cause
harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by
the party responsible for compliance could void the user's authority to
operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth
for an uncontrolled environment. This equipment should be installed
and operated with minimum distance 20cm between the radiator &
your body.
This transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.

AsiaRF AWM002
4
www.asiarf.com
Contents
CHAPTER 1 INTRODUCTION
1.1 INTRODUCTION .............................................................. 1
1.2 HARDWARE FEATURES ................................................... 3
1.3 SOFTWARE FEATURES .................................................... 5
1.4 PACKAGE CONTENTS ...................................................... 6
CHAPTER 2 HARDWARE INSTALLATION
2.1 HOW TO START .............................................................. 7
2.2 LED INDICATOR AND PORT DESCRIPTION ...................... 9
2.3 POSITION SLIDE SWITCH ................................................ 9
2.4 RESET BUTTON .............................................................. 9
2.5 PIN DEFINITION ............................................................. 9
CHAPTER 3 FIRMWARE SETUP
3.1 DEFAULT CONFIGURATION ........................................... 12
3.2 CONFIGURE AWM002 ................................................. 13
3.2.1 STATUS ..................................................................... 14
3.4.1.2 BREAK-DETECTION ............................................... 17
3.4.1.3 MAC-CLONE ......................................................... 17
3.4.1.4 DDNS ................................................................... 17
3.4.2 LAN ......................................................................... 17
3.4.2.1 SETUP .................................................................... 17
3.4.2.2 BINDING ................................................................ 18
3.4.2.3 DHCP-TABLE ........................................................ 19
3.4.3 WIRELESS ................................................................. 19

AsiaRF AWM002
5
www.asiarf.com
3.4.3.1 BASIC .................................................................... 20
3.4.3.2 SECURITY .............................................................. 20
3.4.3.3 ADVANCED ............................................................ 20
3.4.3.4 WDS ..................................................................... 20
3.4.3.4 WPS ...................................................................... 21
3.4.3.5 STATION LIST ........................................................ 21
3.4.3.6 MAC ACCESS ........................................................ 21
3.4.4 MEDIA ...................................................................... 21
3.4.5 SECURITY ................................................................. 21
3.4.5.1 FIREWALL .............................................................. 22
3.4.5.2 WEBSITE-BLOCK ................................................... 22
3.4.5.3 MAC-FILTER ......................................................... 22
3.4.5.4 ACCESS-RESTRICTIONS ......................................... 22
3.4.5.5 PORT-TRIGGERING ................................................ 23
3.4.5.6 DOS ....................................................................... 24
3.4.6.1 VISUAL SERVER..................................................... 26
3.4.6.2 APPLICATION ......................................................... 26
3.4.6.3 DMZ ..................................................................... 27
3.4.6.4 NAT ...................................................................... 27
3.4.7 ROUTING .................................................................. 27
3.4.7.1 TABLE .................................................................... 28
3.4.7.2 STATIC ................................................................... 28
3.4.8 ADMIN ...................................................................... 28
3.4.8.1 MANAGEMENT....................................................... 28

AsiaRF AWM002
6
www.asiarf.com
3.4.8.2 TIME-SETTING ....................................................... 29
3.4.8.3 BACKUP & RESTORE .............................................. 29
3.4.8.4 FIRMWARE UPGRADE ............................................. 29
3.4.8.5 RESTART ................................................................ 29
3.4.8.4 FACTORY DEFAULT ................................................ 29
3.4.8.5 PASSWORD ............................................................. 29
3.5 WIRELESS AP CLIENT MODE ........................................ 29
3.5.1 WIFI WAN ............................................................... 30
3.6 WIRELESS AP MODE .................................................... 30
3.6.1 LAN SETTING ........................................................... 31
CHAPTER 4 FREQUENTLY ASKED QUESTIONS (FAQ)
4.1 WHAT AND HOW TO FIND MY PC’S IP AND MAC
ADDRESS? .......................................................................... 32
4.2 WHAT IS WIRELESS LAN? ........................................... 33
4.3 WHAT ARE ISM BANDS? .............................................. 33
4.4 HOW DOES WIRELESS NETWORKING WORK? ................ 33
4.5 WHAT IS BSSID? ......................................................... 35
4.6 WHAT IS ESSID? ......................................................... 35
4.7 WHAT ARE POTENTIAL FACTORS THAT MAY CAUSES
INTERFERENCE? ................................................................. 35
4.8 WHAT ARE THE OPEN SYSTEM AND SHARED KEY
AUTHENTICATIONS? ........................................................... 36
4.9 WHAT IS WEP? ............................................................ 37
4.10 WHAT IS FRAGMENT THRESHOLD? ............................ 37

AsiaRF AWM002
7
www.asiarf.com
4.11 WHAT IS RTS (REQUEST TO SEND) THRESHOLD? ...... 39
4.12 WHAT IS BEACON INTERVAL? .................................... 40
4.13 WHAT IS PREAMBLE TYPE? ........................................ 40
4.14 WHAT IS SSID BROADCAST? ..................................... 41
4.15 WHAT IS WI-FI PROTECTED ACCESS (WPA)? ............ 41
4.16 WHAT IS WPA2? ........................................................ 42
4.17 WHAT IS 802.1X AUTHENTICATION? .......................... 42
4.18 WHAT IS TEMPORAL KEY INTEGRITY PROTOCOL
(TKIP)? ............................................................................. 43
4.19 WHAT IS ADVANCED ENCRYPTION STANDARD (AES)?
.......................................................................................... 43
4.20 WHAT IS INTER-ACCESS POINT PROTOCOL (IAPP)? .. 43
4.21 WHAT IS WIRELESS DISTRIBUTION SYSTEM (WDS)? 44
4.22 WHAT IS UNIVERSAL PLUG AND PLAY (UPNP)? ......... 44
4.23 WHAT IS MAXIMUM TRANSMISSION UNIT (MTU) SIZE?
.......................................................................................... 45
4.24 WHAT IS CLONE MAC ADDRESS? .............................. 45
4.25 WHAT IS DDNS? ....................................................... 45
4.26 WHAT IS NTP CLIENT? .............................................. 46
4.27 WHAT IS VPN? .......................................................... 46
4.28WHAT IS IPSEC? ........................................................ 46
CHAPTER5 TERMINOLOGY

AsiaRF AWM002
1
www.asiarf.com
Chapter 1 Introduction
1.1 Introduction
Thank you for purchasing AWM002 WiFi AP Router
Module Multi-purpose Wireless device.
AWM002 is a tiny WiFi AP/Router Module with up to
150Mbps transmission rate. It supports three working modes:
AP Client, and Router.
The default mode is AP Client mode can be easily
switched by sliding the side switch.
AWM002 can be powered from either DC 3.3V 460mA
and 1.2V 500mW power input. The Base board is powered by
DC 12V 1A.
This Module could be installed in any electronic devices for
directly controlled.
Home Automation
power switch
air conditioner
heater

AsiaRF AWM002
2
www.asiarf.com
coffee machine
television
water shower for planets
automation controller
surveillance camera, baby mornitor
Industrial Control
Machine control
Power saving control
Timer automatic
You can link with internet and do any you want from 3G
linking or any place in the world.

AsiaRF AWM002
3
www.asiarf.com
1.2 Hardware Features
Standard
IEEE 802.11 b/g/n standards
compliant
Wireless LAN
1T1R Mode
Connector Pins
Pitch
1.27mm
Antenna
iPex Connector *1 ( PIFA optional )
30-pin Interface
USB*1 ( Host )
UART*1
GPIOs
VCC/GND
I2S
I2C
PCM
Frequency Range
2.400 ~ 2.4835GHz ( subject to local
regulations)
Number of
Selectable
Channels
802.11n 20MHz/40MHz ;
802.11b/g
USA, Canada (FCC):11 channels
(2.412GHz~2.462GHz)
Europe (CE): 13 channels
(2.412GHz~2.472GHz)
Japan (TELEC): 14 channels
(2.412GHz~2.4835GHz)
Data Rate
802.11n: up to 150Mbps
802.11b: 1, 2, 5,5, 11Mbps
802.11g: 6, 9, 12, 18, 24, 36, 48,
54Mbps
Coverage Area
Up to 6 times faster then existing
802.11 b/g products
Transmit
Power(EIRP)
11n HT40 MCS7 : +11 dBm
11b CCK: +15 dBm
11g OFDM: +12 dBm
Receiver
-66dBm at HT40 MCS7

AsiaRF AWM002
4
www.asiarf.com
Sensitivity
-73dBm at 54Mpbs
-86dBm at 11Mpbs
Certifications
FCC/CE by request
Power
consumption
Pin input: 3.3V 460mA, 1.2V
500mA(LDO)
Total: 5V 550mA
Above are the peak, average is like
5V 300mA, depend on the system
design.
Weight
30g
Dimension
25x35 mm
Storage
Temperature
-20 to 85℃
Storage Humidity
0 to 85%
Operation
Temperature
0 to 70℃
Operation
Humidity
0 to 80%

AsiaRF AWM002
5
www.asiarf.com
1.3 Software Features
WAN
WiFi WAN
Static IP
DHCP Client
PPPoE (for ADSL)
Transparent Bridge
Networking
DHCP Client/Relay/Server
Dynamic DNS
NTP Client
DNS Cache/Proxy
Firewall:
PPTP
L2TP
IPSec
MAC/IP/Port Filter
Virtual Server
DMZ
Content Filter
Forbid BT
Forbid Mule
WIFI
2 Transmit and 2 Receive paths (2T2R)
20MHz/40MHz bandwidth
Support Hidden SSID

AsiaRF AWM002
6
www.asiarf.com
Support WPS
Clock rate up to 400MHz Legacy and
High Throughput Modes
High security: WEP64/128,TKIP,
WPA,WPA2 AES,mixed, 802.11i
802.1X Authentication with RADIUS
Client
QoS-WMM, WMM-PS
1.4 Package contents
The package contains the following items
1 AWM002
1 AWM002 Base Board
1 AC/DC Adapter
Input: 110~240V 50/60Hz,
Output: 12V 1A adapter
1 Quick Installation Guide

AsiaRF AWM002
7
www.asiarf.com
Chapter 2 Hardware Installation
2.1 How to start
After you unpack the box, please make sure all the
components are completed.
Follow the below setup to setup the AWM002:
1. Put the AWM002 Module on Base board and linked
with a small PCB antenna.
2. Connect Power Adaptor to get the 12V 1A power.
LEDs will turn on and flashing.
3. Wait around one minute the WiFi signal start
flashing, you can see the WiFi signal from your
computer or mobile device with WiFi function.
4. Link WiFi or link RJ45 cable, log into the IP address
10.10.1.1 or 10.10.10.254, input admin/admin log in.

AsiaRF AWM002
8
www.asiarf.com

AsiaRF AWM002
9
www.asiarf.com
2.2 LED Indicator and Port Description
LED indicators description on front panel: (From R to L)
1. PWR: Indicates AWM002 is power on.
2. WPS: Flashing indicates AWM002 is negotiating
with the client in WPS mode.
3. WLAN: Indicates the WIRELESS LAN is
connected.
4. WAN: Indicates an Ethernet cable is connected
into WAN port.
5. LAN: Indicate an Ethernet cable is connected into
the LAN port.
6. TX: Indicate the data transfer.
7. RX: Indicated the data received.
2.3 Position Slide Switch, Customized by option.
2.4 Reset button
2.5 PIN DEFINITION
I
Description
Pin
Pin
Description
+3.3V
2
1
+3.3V
UART_Rx
4
3
GND
UART_Tx
6
5
Reserved

AsiaRF AWM002
10
www.asiarf.com
GND
8
7
WPS/Reset to Default #
LED_WLAN#
10
9
GND
LED_WPS#
12
11
USB_D+
AP/Client
selection
14
13
USB_D-
1.2V
16
15
1.2V
GPIO #19
18
17
TX0+
GPIO #18
20
19
TX0-
GPIO #17
22
21
RX0+
LINK0_LED
24
23
RX0-
II
Description
Pin
Pin
Description
I2SCLK
2
1
PCMFS
I2SWS
4
3
PCMCLK
I2SSDO
6
5
PCMDRX
I2SSDI
8
7
PCMDTX
I2C_SCLK
10
9
I2C_SD
RX1+
12
11
TX1+
RX1-
14
13
TX1-
GND
16
15
GND
Size:
1. Size: 25*35 mm

AsiaRF AWM002
11
www.asiarf.com
Double row 1.27mm pitch on the 35mm
side
2. Reserved: Available for use
3. Reserved is ACTIVE LOW
4. LEDs and WPS/Reset to Default are active LOW
Reset /Reset to default function is share AP/Client selection
pin

AsiaRF AWM002
12
www.asiarf.com
Chapter 3 Firmware Setup
This chapter is to describe how to configure AWM002
to setup different modes: Wireless Router (Transparent
Bridge), AP Client and Wireless AP mode.
Operation Mode:
Wireless Router (Transparent Bridge): In
this mode, the Ethernet WAN port is for WAN.
The connection type can be setup in WAN
page by using Static IP, DHCP (Auto config),
PPPoE, and Transparent Bridge. LAN port is
for LAN and wireless is LAN also.
Wireless AP Client: In this mode, the device
is supposed to connect to internet or the other
wireless router via Wireless WAN. The NAT is
enabled and PCs in LAN ports share the same
IP to ISP through WAN port.
3.1 Default Configuration
IP address
10.10.1.1 or 10.10.10.254
Subnet mask
255.255.255.0
Username
admin
Password
admin
Operation Mode
AP Client

AsiaRF AWM002
13
www.asiarf.com
DHCP
On
SSID
AWM002 / WioData
Channel
Smart select
Security
Off
3.2 Configure AWM002
1. Connect the Ethernet cable to the AWM002 LAN
port and your notebook/computer.
2. Power up to AWM002.
3. Open Internet Explorer from your
notebook/computer
4. Enter: http://10.10.1.1
5. Enter the Username and Password. If this is the
first time use, than enter “admin” and “admin” on
both username and password.
6. The following screen will show up and follow the
instruction

AsiaRF AWM002
14
www.asiarf.com
3.2.1 Status
This directory is included Summary, Log, Interface,
and Video.
Summary shows the most information of the router.
Log is System Information, System warming, and
System Log records can let engineer or user to look the
turn on record and other linking devices.
Interface is the statistics of network.
Video you can see the image when you plug the web
camera into AWM002 base board USB port as below.

AsiaRF AWM002
15
www.asiarf.com
You can adjust Brightness, Contract, Saturation, Hue,
White Balance Auto, Gamma, Power line frequency, White
Balance Temperature, Sharpness, Backlight Compensation,
JPG quality.

AsiaRF AWM002
16
www.asiarf.com
3.3 Mode
Three modes you can see, Wireless Router
(Gateway), Wireless AP Client, and Standard Wireless
AP mode. By switch, you can see what mode you are
using now.
3.4 Wireless Router (Transparent Bridge) Mode
3.4.1 WAN
3.4.1.1 Setup
Default is DHCP, means can get IP address from the
main router or ISP. There are four selections:
Static (fixed IP)
DHCP (Auto config)
PPPoE (ADSL)
Transparent Bridge

AsiaRF AWM002
17
www.asiarf.com
3.4.1.2 Break-Detection
Default is disable, it is send a message to Gateway to
reboot the linking.
3.4.1.3 MAC-clone
Change MAC address to the other MAC address for
fitting ISP’s identified.
3.4.1.4 DDNS
Dynamic DNS is for you to register one address in
DNS server for you from internet to get link back this
router. For more detail, please search in searching engine.
3.4.2 LAN
3.4.2.1 Setup
LAN you can set up the IP address and LAN’s DHCP
server.

AsiaRF AWM002
18
www.asiarf.com
3.4.2.2 Binding
Binding: Including 3 functions: allocating IP address
by DHCP server based on IP&MAC that added, setting
static ARP table. And to control of users modify IP or
MAC address strictly. Bind Automatically: Bind
automatically when DHCP server allocates IP address and
deletes at lease time. The addresses manually binded are
also play a role at the same time. This function applies to
the places that constantly changing computer. Before using
'Show', we suggest you to scan the network first to make
sure that all LAN IP & MAC addresses are binded. Show:
Bind new IP&MAC that never added automatically.
Import: Batch import IP&MAC address.

AsiaRF AWM002
19
www.asiarf.com
3.4.2.3 DHCP-table
DHCP Table: Display all IP address allocated by
current DHCP server.
3.4.3 Wireless

AsiaRF AWM002
20
www.asiarf.com
There are Basic, Security, Advanced, WDS, WPS,
Station List, and MAC Access.
3.4.3.1 Basic
Set wireless connection basic information, you could
set enable and disable wireless function, Broadcast and not
broadcast SSID, set SSID name and etc.
3.4.3.2 Security
The types of wireless security mode are as followings,
and you couls select as the need.
Disable
Open System
WPA
WPA-PSK
WPA2
WPA2-PSK
WPAPSKWPA2PSK (WPA-PSK and
WPA2-PSK)
WPA1WPA2(WPAand WPA2)
3.4.3.3 Advanced
Set advanced information of wireless connection.
3.4.3.4 WDS
There are Disable, Lazy mode, Bridge mode, and

AsiaRF AWM002
21
www.asiarf.com
Repeater mode.
3.4.3.4 WPS
There are Enable and Disable.
3.4.3.5 Station List
3.4.3.6 MAC Access
MAC Access can limit the linking of Wireless by
MAC. Like allow or deny the MAC list you input here.
3.4.4 Media
You can set up Video and Audio setting
here.
3.4.5 Security

AsiaRF AWM002
22
www.asiarf.com
3.4.5.1 Firewall
After enabling firewall, it can prevent internet
malicious attacks to roter or computers in LAN and ensure
safe operation of router computers in LAN. Especilly for
some open servers (such as virtual server, DMZ and etc.),
enabling router firewall function can block malicious
attacks and prevent DoS attack.
3.4.5.2 Website-Block
Select website block Enable, add to the list and
click “apply” to save.
3.4.5.3 MAC-Filter
In “MAC filter”, you could forbid the added MAC
address and also just allow the added MAC address
passing router.
3.4.5.4 Access-Restrictions

AsiaRF AWM002
23
www.asiarf.com
In the “Access-Restrictions”, you could block or
accept some ports passing router and effectively block
virus by controlling port range. Notes: The ports here
include source port and destination port. So, the data
packet will be disposed by discarded by router no matter
the source port or destination port of data packet within
this range.
3.4.5.5 Port-Triggering
In the “Port block, you could block some ports
passing router and effectively block virus by controlling
port range. Notes: The ports here include source port and
destination port. So, the data packet will be disposed by
discarded by router no matter the source port or destination

AsiaRF AWM002
24
www.asiarf.com
port of data packet within this range.
3.4.5.6 DoS
Items
Description
Forbid/Enable
Forbid or Enable the function of
preventing DOS attack.
Prevent SYN flood
attack
Prevent Syn Flood attack. Set maximum
rate of Syn packet according to visit
capacity of server in normal situation.
Threshold is150 packets/second.
Prevent UDP flood
attack
Prevent UDP flood attack. Set
maximum rate of UDP packet according
to visit capacity of server in normal
situation. Threshold is150
packets/second.
Prevent ICMP flood
attack
Prevent ICMP flood attack. Set
maximum rate of ICMP packet
according to visit capacity of server in
normal situation. Threshold is150
packets/second.
Prevent IP
Prevent IP attack by enabling this.
Prevent Land
attack
Prevent Land attack by enabling this.。
Prevent Tear Drop
attack
Prevent Tear Drop attack by enable this.
Prevent Smurf
attack
Prevent Smurf attack by enabling this.
Prevent Ping of
Death attack
Prevent Ping of Death attack by
enabling this.
Prevent ICMP
Fragment
Prevent ICMP Fragment attack by
enabling this.
Prevent unknown
protocol
Prevent unknown protocol attack by
enabling this.

AsiaRF AWM002
25
www.asiarf.com
Items
Description
Prevent Fraggle
Attack
Prevent Fraggle ICMP Fragment attack
by enabling this.
Prevent source IP
spoofing attack
Prevent source IP spoofing attack
attack by enabling this.
Prevent ARP
Deception
Enable ARP deception function by
enabling this. The shorter the interval is,
the better preventing ARP deception
virus is. But it influences system a lot.
Please select according the need.

AsiaRF AWM002
26
www.asiarf.com
3.4.6 Server
3.4.6.1 Visual Server
Virtual Server: Because of its integrated firewall, the
router with default configuration doesn't allow computers
from Internet access LAN computer through the firewall.
You can configure virtual server on the router to change it.
3.4.6.2 Application
Application: Some softwares are needed multiple
Internet connections, such as IP telephone, video
conference and so on, and normally the firewall will block
these connections. In order to make these softwares work
normally, the firewall must know what kind of situation
need to open multiple connections. Through the definition

AsiaRF AWM002
27
www.asiarf.com
of special applications, when the firewall found a 'Trigger
Port' to be opened by a computer, it allows connections
from Internet to pass through the corresponding 'external
port' to be established.
3.4.6.3 DMZ
The DMZ host computer actually is a default virtual
server. If the router received a request from the external
network, it will check whether there is a virtual server
match in the list according to port of the external service
firstly, if there is, put forward the corresponding request to
the host, if not, put forward the corresponding request to
the DMZ host. When the DMZ host is not set, it will
discard the request.
3.4.6.4 NAT
Outside network IP address will be one-to-one
mapping to inside network address.
3.4.7 Routing

AsiaRF AWM002
28
www.asiarf.com
3.4.7.1 Table
Display the current routing table.
3.4.7.2 Static
Allow user define the path routing to the other host or
network.
3.4.8 Admin
3.4.8.1 Management
UPnP(Universal Plug and Play)the protocol for

AsiaRF AWM002
29
www.asiarf.com
DLNA, the purpose is let smart electronic devices
communicated with each other.
Remote is administration from WAN control.
System Log function default is enable.
3.4.8.2 Time-setting
3.4.8.3 Backup & Restore
Setting’s backup and restore.
3.4.8.4 Firmware Upgrade
3.4.8.5 Restart
3.4.8.4 Factory Default
3.4.8.5 Password
Administration password setting.
3.5 Wireless AP Client mode
Ethernet and wireless are as a LAN connected with
PC or client devices, another Wireless Interface work as a
WAN port connected with other wireless AP or router.

AsiaRF AWM002
30
www.asiarf.com
3.5.1 WiFi WAN
When you have a WiFi network, you can use this as a
WiFi repeater. Press “search AP”, there is a window pop
up with the list of active WiFi AP router, including the
SSID, encryption method.
Click the one you want to link and remember the
encryption mode, input the security part and press
“Apply”.
The router will be restarted, after restarted, in Status
you can see the linked successful or not. If not, do check
the encryption setting again.
3.6 Wireless AP mode
LAN and WAN port work as LAN port only.
Wireless is LAN also. All the IP addresses are the same IP
section.

AsiaRF AWM002
31
www.asiarf.com
3.6 Wireless AP mode
Wireless and all Ethernet ports are in the same IP section.
3.6.1 LAN setting

AsiaRF AWM002
32
www.asiarf.com
Chapter 4 Frequently Asked Questions (FAQ)
4.1 What and how to find my PC’s IP and MAC address?
IP address is the identifier for a computer or device
on a TCP/IP network. Networks using the TCP/IP protocol
route messages based on the IP address of the destination.
The format of an IP address is a 32-bit numeric address
written as four numbers separated by periods. Each
number can be zero to 255. For example, 191.168.1.254
could be an IP address.
The MAC (Media Access Control) address is your
computer's unique hardware number. (On an Ethernet
LAN, it's the same as your Ethernet address.) When you're
connected to the Internet from your computer (or host as
the Internet protocol thinks of it), a correspondence table
relates your IP address to your computer's physical (MAC)
address on the LAN.
To find your PC’s IP and MAC address,
Open the Command program in the
Microsoft Windows.
Type in ipconfig /all then press the Enter
button.

AsiaRF AWM002
33
www.asiarf.com
Your PC’s IP address is the one entitled IP
Address and your PC’s MAC address is the
one entitled Physical Address.
4.2 What is Wireless LAN?
A wireless LAN (WLAN) is a network that allows
access to Internet without the need for any wired
connections to the user’s machine.
4.3 What are ISM bands?
ISM stands for Industrial, Scientific and Medical;
radio frequency bands that the Federal Communications
Commission (FCC) authorized for wireless LANs. The
ISM bands are located at 915 +/- 13 MHz, 2450 +/- 50
MHz and 5800 +/- 75 MHz.
4.4 How does wireless networking work?
The 802.11 standard define two modes: infrastructure
mode and ad hoc mode. In infrastructure mode, the
wireless network consists of at least one access point
connected to the wired network infrastructure and a set of
wireless end stations. This configuration is called a Basic
Service Set (BSS). An Extended Service Set (ESS) is a set
of two or more BSSs forming a single subnetwork. Since

AsiaRF AWM002
34
www.asiarf.com
most corporate WLANs require access to the wired LAN
for services (file servers, printers, Internet links) they will
operate in infrastructure mode.
Example 1: wireless Infrastructure Mode
Ad hoc mode (also called peer-to-peer mode or an
Independent Basic Service Set, or IBSS) is simply a set of
802.11 wireless stations that communicate directly with
one another without using an access point or any
connection to a wired network. This mode is useful for
quickly and easily setting up a wireless network anywhere
that a wireless infrastructure does not exist or is not
required for services, such as a hotel room, convention

AsiaRF AWM002
35
www.asiarf.com
center, or airport, or where access to the wired network is
barred (such as for consultants at a client site).
Example 2: wireless Ad Hoc Mode
4.5 What is BSSID?
A six-byte address that distinguishes a particular a
particular access point from others. Also know as just
SSID. Serves as a network ID or name.
4.6 What is ESSID?
The Extended Service Set ID (ESSID) is the name of
the network you want to access. It is used to identify
different wireless networks.
4.7 What are potential factors that may causes
interference?
Factors of interference:

AsiaRF AWM002
36
www.asiarf.com
Obstacles: walls, ceilings, furniture… etc.
Building Materials: metal door, aluminum studs.
Electrical devices: microwaves, monitors and
electrical motors.
Solutions to overcome the interferences:
Minimizing the number of walls and ceilings.
Position the WLAN antenna for best reception.
Keep WLAN devices away from other electrical
devices, eg: microwaves, monitors, electric
motors, … etc.
Add additional WLAN Access Points if
necessary.
4.8 What are the Open System and Shared Key
authentications?
IEEE 802.11 supports two subtypes of network
authentication services: open system and shared key.
Under open system authentication, any wireless station can
request authentication. The station that needs to
authenticate with another wireless station sends an
authentication management frame that contains the identity
of the sending station. The receiving station then returns a
frame that indicates whether it recognizes the sending
station. Under shared key authentication, each wireless
station is assumed to have received a secret shared key
over a secure channel that is independent from the 802.11

AsiaRF AWM002
37
www.asiarf.com
wireless network communications channel.
4.9 What is WEP?
An optional IEEE 802.11 function offers frame
transmission privacy similar to a wired network. The
Wired Equivalent Privacy generates secret shared
encryption keys that both source and destination stations
can use to alert frame bits to avoid disclosure to
eavesdroppers.
WEP relies on a secret key that is shared between a
mobile station (e.g. a laptop with a wireless Ethernet card)
and an access point (i.e. a base station). The secret key is
used to encrypt packets before they are transmitted, and an
integrity check is used to ensure that packets are not
modified in transit.
4.10 What is Fragment Threshold?
The proposed protocol uses the frame fragmentation
mechanism defined in IEEE 802.11 to achieve parallel
transmissions. A large data frame is fragmented into
several fragments each of size equal to fragment threshold.
By tuning the fragment threshold value, we can get

AsiaRF AWM002
38
www.asiarf.com
varying fragment sizes. The determination of an efficient
fragment threshold is an important issue in this scheme. If
the fragment threshold is small, the overlap part of the
master and parallel transmissions is large. This means the
spatial reuse ratio of parallel transmissions is high. In
contrast, with a large fragment threshold, the overlap is
small and the spatial reuse ratio is low. However high
fragment threshold leads to low fragment overhead. Hence
there is a trade-off between spatial re-use and fragment
overhead.
Fragment threshold is the maximum packet size used
for fragmentation. Packets larger than the size
programmed in this field will be fragmented.
If you find that your corrupted packets or asymmetric
packet reception (all send packets, for example). You may
want to try lowering your fragmentation threshold. This
will cause packets to be broken into smaller fragments.
These small fragments, if corrupted, can be resent faster
than a larger fragment. Fragmentation increases overhead,
so you'll want to keep this value as close to the maximum
value as possible.

AsiaRF AWM002
39
www.asiarf.com
4.11 What is RTS (Request To Send) Threshold?
The RTS threshold is the packet size at which packet
transmission is governed by the RTS/CTS transaction. The
IEEE 802.11-1997 standard allows for short packets to be
transmitted without RTS/CTS transactions. Each station
can have a different RTS threshold. RTS/CTS is used
when the data packet size exceeds the defined RTS
threshold. With the CSMA/CA transmission mechanism,
the transmitting station sends out an RTS packet to the
receiving station, and waits for the receiving station to
send back a CTS (Clear to Send) packet before sending the
actual packet data.
This setting is useful for networks with many clients.
With many clients, and a high network load, there will be
many more collisions. By lowering the RTS threshold,
there may be fewer collisions, and performance should
improve. Basically, with a faster RTS threshold, the
system can recover from problems faster. RTS packets
consume valuable bandwidth, however, so setting this
value too low will limit performance.

AsiaRF AWM002
40
www.asiarf.com
4.12 What is Beacon Interval?
In addition to data frames that carry information from
higher layers, 802.11 includes management and control
frames that support data transfer. The beacon frame, which
is a type of management frame, provides the "heartbeat" of
a wireless LAN, enabling stations to establish and maintain
communications in an orderly fashion.
Beacon Interval represents the amount of time
between beacon transmissions. Before a station enters
power save mode, the station needs the beacon interval to
know when to wake up to receive the beacon (and learn
whether there are buffered frames at the access point).
4.13 What is Preamble Type?
There are two preamble types defined in IEEE 802.11
specification. A long preamble basically gives the decoder
more time to process the preamble. All 802.11 devices
support a long preamble. The short preamble is designed to
improve efficiency (for example, for VoIP systems). The
difference between the two is in the Synchronization field.
The long preamble is 128 bits, and the short is 56 bits.

AsiaRF AWM002
41
www.asiarf.com
4.14 What is SSID Broadcast?
Broadcast of SSID is done in access points by the
beacon. This announces your access point (including
various bits of information about it) to the wireless world
around it. By disabling that feature, the SSID configured in
the client must match the SSID of the access point.
Some wireless devices don't work properly if SSID
isn't broadcast (for example the D-link DWL-120 USB
802.11b adapter). Generally if your client hardware
supports operation with SSID disabled, it's not a bad idea
to run that way to enhance network security. However it's
no replacement for WEP, MAC filtering or other
protections.
4.15 What is Wi-Fi Protected Access (WPA)?
Wi-Fi’s original security mechanism, Wired
Equivalent Privacy (WEP), has been viewed as insufficient
for securing confidential business communications. A
longer-term solution, the IEEE 802.11i standard, is under
development. However, since the IEEE 802.11i standard is
not expected to be published until the end of 2003, several
members of the WI-Fi Alliance teamed up with members

AsiaRF AWM002
42
www.asiarf.com
of the IEEE 802.11i task group to develop a significant
near-term enhancement to Wi-Fi security. Together, this
team developed Wi-Fi Protected Access.
To upgrade a WLAN network to support WPA,
Access Points will require a WPA software upgrade.
Clients will require a software upgrade for the network
interface card, and possibly a software update for the
operating system. For enterprise networks, an
authentication server, typically one that supports RADIUS
and the selected EAP authentication protocol, will be
added to the network.
4.16 What is WPA2?
It is the second generation of WPA. WPA2 is based
on the final IEEE 802.11i amendment to the 802.11
standard.
4.17 What is 802.1x Authentication?
802.1x is a framework for authenticated MAC-level
access control, defines Extensible Authentication Protocol
(EAP) over LANs (WAPOL). The standard encapsulates
and leverages much of EAP, which was defined for dial-up

AsiaRF AWM002
43
www.asiarf.com
authentication with Point-to-Point Protocol in RFC 2284.
Beyond encapsulating EAP packets, the 802.1x
standard also defines EAPOL messages that convey the
shared key information critical for wireless security.
4.18 What is Temporal Key Integrity Protocol (TKIP)?
The Temporal Key Integrity Protocol, pronounced
tee-kip, is part of the IEEE 802.11i encryption standard for
wireless LANs. TKIP is the next generation of WEP, the
Wired Equivalency Protocol, which is used to secure
802.11 wireless LANs. TKIP provides per-packet key
mixing, a message integrity check and a re-keying
mechanism, thus fixing the flaws of WEP.
4.19 What is Advanced Encryption Standard (AES)?
Security issues are a major concern for wireless
LANs, AES is the U.S. government’s next-generation
cryptography algorithm, which will replace DES and
3DES.
4.20 What is Inter-Access Point Protocol (IAPP)?
The IEEE 802.11f Inter-Access Point Protocol (IAPP)

AsiaRF AWM002
44
www.asiarf.com
supports Access Point Vendor interoperability, enabling
roaming of 802.11 Stations within IP subnet.
IAPP defines messages and data to be exchanged
between Access Points and between the IAPP and high
layer management entities to support roaming. The IAPP
protocol uses TCP for inter-Access Point communication
and UDP for RADIUS request/response exchanges. It also
uses Layer 2 frames to update the forwarding tables of
Layer 2 devices.
4.21 What is Wireless Distribution System (WDS)?
The Wireless Distribution System feature allows
WLAN AP to talk directly to other APs via wireless
channel, like the wireless bridge or repeater service.
4.22 What is Universal Plug and Play (uPNP)?
UPnP is an open networking architecture that consists
of services, devices, and control points. The ultimate goal
is to allow data communication among all UPnP devices
regardless of media, operating system, programming
language, and wired/wireless connection.

AsiaRF AWM002
45
www.asiarf.com
4.23 What is Maximum Transmission Unit (MTU) Size?
Maximum Transmission Unit (MTU) indicates the
network stack of any packet is larger than this value will
be fragmented before the transmission. During the PPP
negotiation, the peer of the PPP connection will indicate its
MRU and will be accepted. The actual MTU of the PPP
connection will be set to the smaller one of MTU and the
peer’s MRU. The default is value 1400.
4.24 What is Clone MAC Address?
Clone MAC address is designed for your special
application that request the clients to register to a server
machine with one identified MAC address.
Since that all the clients will communicate outside
world through the WLAN Outdoor Broadband Router, so
have the cloned MAC address set on the WLAN Outdoor
Broadband Router will solve the issue.
4.25 What is DDNS?
DDNS is the abbreviation of Dynamic Domain Name
Server. It is designed for user own the DNS server with
dynamic WAN IP address.

AsiaRF AWM002
46
www.asiarf.com
4.26 What is NTP Client?
NTP client is designed for fetching the current
timestamp from internet via Network Time protocol. User
can specify time zone, NTP server IP address.
4.27 What is VPN?
VPN is the abbreviation of Virtual Private Network.
It is designed for creating point-to point private link via
shared or public network.
4.28What is IPSEC?
IPSEC is the abbreviation of IP Security. It is used to
transferring data securely under VPN.
Chapter 5 Terminology
3DES
Triple Data Encryption Standard
AES
Advanced Encryption Standard
ANSI
American National Standards Institute
AP
Access Point
CCK
Complementary Code Keying
CSMA/CA
Carrier Sense Multiple Access/ Collision

AsiaRF AWM002
47
www.asiarf.com
Avoidance
CSMA/CD
Carrier Sense Multiple Access/ Collision
Detection
DDNS
Dynamic Domain Name Server
DH
Diffie-Hellman Algorithm
DHCP
Dynamic Host Configuration Protocol
DSSS
Direct Sequence Spread Spectrum
EAP
Extensible Authentication Protocol
ESP
Encapsulating Security Payload
FCC
Federal Communications Commission
FTP
File Transfer Protocol
IEEE
Institute of Electrical and Electronic
Engineers
IKE
Internet Key Exchange
IP
Internet Protocol
ISM
Industrial, Scientific and Medical
LAN
Local Area Network
MAC
Media Access Control
MD5
Message Digest 5
NAT
Network Address Translation
NT
Network Termination
NTP
Network Time Protocol

AsiaRF AWM002
48
www.asiarf.com
PPTP
Point to Point Tunneling Protocol
PSD
Power Spectral Density
RF
Radio Frequency
SHA1
Secure Hash Algorithm
SNR
Signal to Noise Ratio
SSID
Service Set Identification
TCP
Transmission Control Protocol
TFTP
Trivial File Transfer Protocol
TKIP
Temporal Key Integrity Protocol
UPNP
Universal Plug and Play
VPN
Virtual Private Network
WDS
Wireless Distribution System
WEP
Wired Equivalent Privacy
WLAN
Wireless Local Area Network
WPA
Wi-Fi Protected Access
This device complies with the following radio frequency and safety standards.
Important to OEM Manufacturer:
This following FCC Warning must be included in the HOST User Manual.
FCC Warning
This device complies with Part 15 of the FCC Rules. Operation is
subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE 1: This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates, uses
and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the interference by one or more of
the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
-Consult the dealer or an experienced radio/TV technician for help.
NOTE 2: Any changes or modifications to this unit not expressly approved by the party
responsible for compliance could void the user's authority to operate the equipment.
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. End users must follow the specific operating instructions for satisfying RF exposure
compliance.
Note 1: This module certified that complies with RF exposure requirment under mobile or fixed
condition, this module is to be installed only in portable or mobile or fixed applications.
A mobile device is defined as a transmitting device designed to be used in other than fixed
locations and to generally be used in such a way that a separation distance of at least 20
centimeters is normally maintained between the transmitter's radiating structure(s) and the body of
the user or nearby persons. Transmitting devices designed to be used by consumers or workers
that can be easily re-located, such as wireless devices associated with a personal computer, are
considered to be mobile devices if they meet the 20 centimeter separation requirement.
A fixed device is defined as a device is physically secured at one location and is not able to be
easily moved to another location.
Note 2: Any modifications made to the module will void the Grant of Certification, this module is
limited to OEM installation only and must not be sold to end-users, end-user has no manual
instructions to remove or install the device, only software or operating procedure shall be placed
in the end-user operating manual of final products.
Note 3: The device must not transmit simultaneously with any other antenna or transmitter.
Note 4: To ensure compliance with all non-transmitter functions the host manufacturer is
responsible for ensuring compliance with the module(s) installed and fully operational. For
example, if a host was previously authorized as an unintentional radiator under the Declaration of
Conformity procedure without a transmitter certified module and a module is added, the host
manufacturer is responsible for ensuring that the after the module is installed and operational the
host continues to be compliant with the Part 15B unintentional radiator requirements. Since this
may depend on the details of how the module is integrated with the host, AsiaRF Co., Ltd. shall
provide guidance to the host manufacturer for compliance with the Part 15B requirements.
Note 5: FCC ID label on the final system must be labeled with “Contains FCC ID:
TKZAWM002” or “Contains transmitter module FCC ID: TKZAWM002”.
The transmitter module must be installed and used in strict accordance with the manufacturer's
instructions as described in the user documentation that comes with the host product. AsiaRF Co.,
Ltd. is responsible for the compliance of the module in all final hosts.
WARNING:
This device will only installed in this host device as below:
Manufacturer: Venitek Ltd.
Address: B08, 14/F, WAH HEN COMM CENTRE, NO.383, HENNESSY RD., WANCHAI,
HONGKONG
Product Name: WiFi IP Camera & Storage AP Router
Model: AWAPN2411