Cisco Linksys WAP610N User Manual Download Page 31

28

Appendix E

Software End User License Agreement

Wireless-N Access Point with Dual-Band

Disclaimer of Liabilities

. TO THE EXTENT NOT PROHIBITED 

BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE 
FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, 
INDIRECT,  CONSEQUENTIAL,  INCIDENTAL  OR  PUNITIVE 
DAMAGES,  REGARDLESS  OF  THE  THEORY  OF  LIABILITY 
(INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED 
TO  THE  USE  OF  OR  INABILITY  TO  USE  THE  PRODUCT, 
SOFTWARE  OR  ANY  SERVICES  PROVIDED  IN  RESPECT 
OF  SUCH  PRODUCT  OR  SOFTWARE,  EVEN  IF  CISCO  HAS 
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 
TO  THE  EXTENT  NOT  PROHIBITED  BY  APPLICABLE  LAW, 
IN  NO  EVENT  WILL  CISCO’S  LIABILITY  EXCEED  THE 
AMOUNT  PAID  BY YOU  FOR THE  PRODUCT.  IF YOU  LIVE 
IN  THE  EUROPEAN  UNION,  REFERENCES  TO  “SPECIAL, 
INDIRECT,  CONSEQUENTIAL,  PUNITIVE  OR  INCIDENTAL 
DAMAGES” SHALL MEAN ANY LOSSES WHICH (i) WERE NOT 
REASONABLY FORESEEABLE BY BOTH PARTIES, AND/OR (ii) 
WERE KNOWN TO YOU BUT NOT TO US AND/OR (iii) WERE 
REASONABLY FORESEEABLE BY BOTH PARTIES BUT COULD 
HAVE BEEN PREVENTED BY YOU SUCH AS, FOR EXAMPLE 
(BUT WITHOUT LIMITATION), LOSSES CAUSED BY VIRUSES, 
TROJANS OR OTHER MALICIOUS PROGRAMS, OR LOSS OF 
OR DAMAGE TO YOUR DATA. The foregoing limitations will 
apply even if any warranty or remedy provided under this 
limited warranty fails of its essential purpose. 

Technical  Support

.  This  limited  warranty  is  neither 

a  service  nor  a  support  contract.  Information  about 
Cisco’s  current  technical  support  offerings  and  policies 
(including any fees for support services) can be found at 

www.linksysbycisco.com/support

Export

. Software, including technical data, may be subject 

to U.S. export control laws and regulations and/or export 
or  import  regulations  in  other  countries.  You  agree  to 
comply strictly with all such laws and regulations.

U.S. Government Users.

 The Software and Documentation 

qualify as “commercial items” as defined at 48 C.F.R. 2.101 
and  48  C.F.R.  12.212.  All  Government  users  acquire  the 
Software  and  Documentation  with  only  those  rights 
herein that apply to non-governmental customers. Use of 
either the Software or Documentation or both constitutes 
agreement  by  the  Government  that  the  Software  and 
Documentation  are  “commercial  computer  software” 
and  “commercial  computer  software  documentation,” 
and constitutes acceptance of the rights and restrictions 
herein.

General Terms

. This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 
California, without reference to conflict of laws principles. 
The  United  Nations  Convention  on  Contracts  for  the 
International Sale of Goods will not apply. If any portion 
of this Agreement is found to be void or unenforceable, 
the  remaining  provisions  will  remain  in  full  force  and 
effect. This Agreement constitutes the entire agreement 
between  the  parties  with  respect  to  the  Software  and 

supersedes any conflicting or additional terms contained 
in any purchase order or elsewhere. 

Linksys, Cisco and the Cisco Logo and other trademarks 
contained  in  the  Software  and  Documentation  are 
trademarks  or  registered  trademarks  of  Linksys,  Cisco, 
its  licensors  and  third  parties,  as  the  case  may  be.  You 
may  not  remove  or  alter  any  trademark,  trade  names, 
product  names,  logo,  copyright  or  other  proprietary 
notices,  legends,  symbols  or  labels  in  the  Software  and 
Documentation.  This  Agreement  does  not  authorize 
you  to  use  Cisco’s  or  its  licensors’  names  or  respective 
trademarks.

END OF SCHEDULE 1

Schedule 2 

Network Magic Features

Network  Magic  License  Restrictions.

  Other  than  as 

set  forth  in  this  Agreement  or  as  otherwise  permitted 
by  Cisco,  you  may  not  install  or  execute  the  Network 
Magic Software on any non-personal computer product, 
including, but not limited to, a Web appliance, set top box, 
handheld device, phone, Web pad device, or any device 
running the Microsoft Windows CE operating system.

Terms of Service for Subscription Licenses

. These Terms 

of Service only apply if you have obtained a subscription 
license to Network Magic as specified in your order. Such 
subscription licenses may subject you to fees which you 
are responsible for paying in order to continue to subscribe 
to the Services.

1.  Network  Magic  Cancellation

.  You  may  cancel  the 

Services  at  any  time.  If  you  cancel  the  Services,  Cisco 
will not be obligated to provide you any Network Magic 
product Upgrades. If you cancel the Services, Cisco may 
delete  data  relating  to  you  or  your  use  of  the  Services 
from  Cisco  or  its  suppliers’  servers.  To  the  extent  not 
prohibited by applicable law, you understand and agree 
that cancellation of your Services is your sole remedy with 
respect to any dispute with Cisco.

2. Modifications

. Cisco may modify or cancel the terms 

of this Agreement or the price, content, or nature of the 
Services (including discontinuing the Services program), 
upon  notice  to  you.  If  Cisco  modifies  any  of  these 
terms,  you  may  cancel  the  Service  by  providing  written 
notice  to  Cisco  via  www.networkmagic.com/support 
of  such  cancellation  and  uninstalling  the  Software  and 
discontinuing your use of the Service. Cisco may provide 
notice by e-mail, via Network Magic, or by publishing the 
changes on its Web site. 

3.  Email  Notification

.  Cisco  may  send  you  email  from 

time  to  time  to  let  you  know  about  new  products  and 
services that are available to you. You will be able to opt-
out  of  receiving  these  emails  using  the  link  provided 
within  the  email.  Cisco  reserves  the  right,  however,  to 

Summary of Contents for Linksys WAP610N

Page 1: ...USER GUIDE Wireless N Access Point with Dual Band Model WAP610N ...

Page 2: ...or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossa...

Page 3: ...ration Firmware Upgrade 12 Status Access Point 13 Status Wireless Network 13 Status About 13 Appendix A Troubleshooting 14 Appendix B Specifications 15 Appendix C Warranty Information 16 Limited Warranty 16 Appendix D Regulatory Information 18 FCC Statement 18 FCC Radiation Exposure Statement 18 Safety Notices 18 Industry Canada Statement 19 Restrictions in the 5 GHz Band 19 Avis d Industrie Canad...

Page 4: ...e Wi Fi Protected Setup run the Setup Wizard or refer to Wireless Basic Wireless Settings on page 4 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It lights up blue when wireless security is enabled If there is an error during the Wi Fi Protected Setup process then the LED lights up amber Make sure the client device supports Wi Fi Protected S...

Page 5: ...dress filtering Linksys routers and access points give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each com...

Page 6: ...lt settings The Access Point will then request an IP address from the DHCP server usually the network router After you have determined the Access Point s IP address launch your web browser and enter the Access Point s IP address in the Address field Press Enter A password request screen appears Non Windows XP users will see a similar screen Leave the User name field blank Enter the password you cr...

Page 7: ...rk If you haveWireless N Wireless G andWireless B devices in your network keep the default Mixed If you have only Wireless N devices select Wireless N Only If you have only Wireless G and Wireless B devices in your network select Wireless B G Only If you have only Wireless G devices select Wireless G Only If you have only Wireless B devices select Wireless B Only Network Name SSID The SSID is the ...

Page 8: ...3 characters Key Renewal Enter a Key Renewal period which instructs the Access Point how often it should change the encryption keys The default Key Renewal period is 3600 seconds Click Save Settings to apply your changes or click Cancel Changes to cancel your changes WPA2 Personal WPA2 is a more advanced more secure version of WPA Security Mode WPA2 Personal Encryption WPA2 supports two encryption...

Page 9: ...od is 3600 seconds Click Save Settings to apply your changes or click Cancel Changes to cancel your changes WEP WEP is a basic encryption method which is not as secure as WPA or WPA2 Security Mode WEP Encryption Select a level of WEP encryption 40 64 bits 10 hex digits or 104 128 bits 26 hex digits The default is 40 64 bits 10 hex digits Key 1 Enter the WEP key of your network Tx Key Key 1 is the ...

Page 10: ...uests the Access Point s PIN number a On the client s Wi Fi Protected Setup screen enter the PIN number listed on the Access Point s Wi Fi Protected Setup screen Then click Register or the appropriate button The PIN number is also listed on the label on the bottom of the Access Point b After the client device has been configured click OK Then refer back to your client device or its documentation f...

Page 11: ...gregation This option defines whether or not the MAC layer will accept an ADDBA request The default is Yes Select No to disable this option Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemaximum size of the aggregate in bytes The range is 0 to 16000 The d...

Page 12: ...defines the maximum number of packets transmitted without getting ACKs The range is 0 to 64 The default is 64 CW Min for STA This option defines the minimum contention window limit from which the random backoff is computed for an STA in BSS The range is 15 to 1023 The default is 15 CW Max for STA This option defines the maximum contention window limit from which the random backoff is computed for ...

Page 13: ...r of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 2 The default is 2 Max Aggregation Size This option defines the maximum size of the aggregate in bytes The range is 0 to 16000 The default is 10000 Timeout Interval This option defines the timeout period in which the aggregate should be closed with a closing condition before ...

Page 14: ...work You can select from a range of transmission speeds or you can select Auto to have the Access Point automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Access Point and a wireless client The default is Auto N Transmission Rate The N Transmission Rate setting is available if the Network...

Page 15: ...ireless If you are using the Access Point in a public domain where you are giving wireless access to your guests you can disable wireless access to the Access Point s browser based utility If you do this you will only be able to access the browser based utility via a wired connection Keep the default Enabled to allow wireless access to the Access Point s browser based utility or select Disabled to...

Page 16: ...network is displayed Subnet Mask The Subnet Mask configured for your local network is displayed Default Gateway The Default Gateway configured for your local network is displayed Status Wireless Network Information about your wireless network is displayed Status Wireless Network MAC Address The Access Point s MAC Address as seen on your local wireless network is displayed Mode The wireless mode us...

Page 17: ...e Static IP Address Subnet Mask and Default Gateway fields 5 Click Save Settings The browser based utility does not accept your password Check the following The password is case sensitive Make sure that you are using the correct case s when entering the password If you forget your password you can reset the Access Point to its factory defaults Press and hold the Access Point s Reset button for app...

Page 18: ...eceive Sensitivity 802 11a 72 dBm typical in dBm 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm typical MCS15 5 0 GHz Antenna Gain in dBi 2 4 GHz 1 58 5 GHz 1 45 Wireless Security WEP Wi Fi Protected Access 2 WPA2 Wireless MAC Filtering Security Key Bits Up to 128 Bit Encryption OS Requirements Windows XP Vista or Vista 64 Bit Edit...

Page 19: ... product or software will be uninterrupted or error free Also due to the continual development of new techniques for intruding upon and attacking networks Linksys does not warrant that the product software or any equipment system or network on which the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software o...

Page 20: ...sys Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge Customers outside of the United States of America and Canada are responsible for all shipping and handling charges custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then cur...

Page 21: ... s Consult a dealer or an experienced radio TV technician for assistance FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment For operation within the 5 15 5 25GHz frequency range it is restricted to indoor environments FCC Radiation Exposure Statement This equipment complies with FCC radia...

Page 22: ...Section shall notbecapableoftransmittingintheband5600 5650MHz so that Environment Canada weather radars operating in this band are protected Avis d Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB 003 et RSS210 du Canada L utilisation de ce dispositif est autorisée seulement aux conditions suivantes 1 il ne doit pas produire de brouillage et 2 il doit accepter tou...

Page 23: ...truction operating system used mix of wireless products used interference and other adverse conditions Avis de non responsabilité concernant les appareils sans fil Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802 11 Les performances réelles peuvent varier notamment en fonction de la capacité du réseau sans fil du débit de la transmission de d...

Page 24: ...ropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místn...

Page 25: ...ό το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des...

Page 26: ...lt berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietma...

Page 27: ...zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje op...

Page 28: ...FTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE ...

Page 29: ...ice Cisco makes no representations as to the quality suitability functionality or legality of any sites or products to which links may be provided or third party services and you hereby waive any claim you might have against Cisco with respect to such sites or third party software products or services Your correspondence or business dealings with or participation in promotions of third parties fou...

Page 30: ...nge certain settings in your Internet browser software including the default settings for search provider and source of DNS error pages and may direct erroneous URLs to an error landing page hosted by Cisco Youmayoptoutofthesesettingsbynotacceptingthemas part of the installation process or by requesting a change to your software settings in the error process Installing the software and changing th...

Page 31: ...ion of this Agreement is found to be void or unenforceable the remaining provisions will remain in full force and effect This Agreement constitutes the entire agreement between the parties with respect to the Software and supersedes any conflicting or additional terms contained in any purchase order or elsewhere Linksys Cisco and the Cisco Logo and other trademarks contained in the Software and Do...

Page 32: ...e rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their ri...

Page 33: ...or other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based o...

Page 34: ...s section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software throu...

Page 35: ...harge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to cer...

Page 36: ...ta to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it eitherverbatimorwithmodificationsand ortranslated straightforwardly into another language Hereinafter translat...

Page 37: ...e terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code ...

Page 38: ...hat this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities n...

Page 39: ...if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this Li...

Page 40: ...enSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributions of any form whatsoever must retain the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMIT...

Page 41: ... Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO P...

Reviews: