background image

Appendix E

Software Licence Agreement

45

Dual-Band Wireless-N Gigabit Router

If the modified program normally reads commands 

c. 

interactively  when  run,  you  must  cause  it,  when 

it  has  started  running  for  such  interactive  use 

in  the  most  ordinary  way,  to  print  or  display  an 

announcement including an appropriate copyright 

notice  and  a  notice  that  there  is  no  warranty  (or 

else, saying that you provide a warranty) and that 

users  may  redistribute  the  program  under  these 

conditions and telling the user how to view a copy 

of this Licence. (Exception: if the Program itself is 

interactive  but  does  not  normally  print  such  an 

announcement, your work based on the Program 

is not required to print an announcement). 

These  requirements  apply  to  the  modified  work  as 

a  whole.  If  identifiable  sections  of  that  work  are  not 

derived  from  the  Program  and  can  be  reasonably 

considered  independent  and  separate  works  in 

themselves,  then  this  Licence  and  its  terms,  do  not 

apply to those sections when you distribute them as 

separate  works.  But  when  you  distribute  the  same 

sections as part of a whole which is a work based on 

the Program, the distribution of the whole must be on 

the terms of this Licence, whose permissions for other 

licensees extend to the entire whole and thus to each 

and every part regardless of who wrote it. 
Thus, it is not the intent of this section to claim rights 

or contest your rights to work written entirely by you; 

rather, the intent is to exercise the right to control the 

distribution of derivative or collective works based on 

the Program. 
In  addition,  mere  aggregation  of  another  work  not 

based  on  the  Program  with  the  Program  (or  with  a 

work based on the Program) on a volume of a storage 

or distribution medium does not bring the other work 

under the scope of this Licence. 
You  may  copy  and  distribute  the  Program  (or  a 

3. 

work based on it, under Section 2) in object code or 

executable form under the terms of Sections 1 and 2 

above provided that you also do one of the following: 

Accompany  it  with  the  complete  corresponding 

a. 

machine-readable  source  code,  which  must  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 
Accompany it with a written offer, valid for at least 

b. 

three  years,  to  give  any  third  party,  for  a  charge 

no  more  than  your  cost  of  physically  performing 

source distribution, a complete machine-readable 

copy  of  the  corresponding  source  code,  to  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 

Accompany  it  with  the  information  you  received 

c. 

as to the offer to distribute corresponding source 

code.  (This  alternative  is  allowed  only  for  non-

commercial  distribution  and  only  if  you  received 

the  program  in  object  code  or  executable  form 

with  such  an  offer,  in  accord  with  Subsection  b 

above). 

The source code for a work means the preferred form 

of  the  work  for  making  modifications  to  it.  For  an 

executable  work,  complete  source  code  means  all 

the source code for all modules it contains, plus any 

associated  interface  definition  files,  plus  the  scripts 

used  to  control  compilation  and  installation  of  the 

executable. However, as a special exception, the source 

code  distributed  need  not  include  anything  that  is 

normally distributed (in either source or binary form) 

with the major components (compiler, kernel and so 

on) of the operating system on which the executable 

runs,  unless  that  component  itself  accompanies  the 

executable. 
If  distribution  of  executable  or  object  code  is  made 

by  offering  access  to  copy  from  a  designated  place, 

then  offering  equivalent  access  to  copy  the  source 

code  from  the  same  place  counts  as  distribution  of 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code. 
You  may  not  copy,  modify,  sublicense  or  distribute 

4. 

the  Program  except  as  expressly  provided  under 

this Licence. Any attempt otherwise to copy, modify, 

sublicense  or  distribute  the  Program  is  void  and  will 

automatically terminate your rights under this Licence. 

However, parties who have received copies or rights, 

from you under this Licence will not have their licenses 

terminated  so  long  as  such  parties  remain  in  full 

compliance. 
You are not required to accept this Licence, since you 

5. 

have not signed it. However, nothing else grants you 

permission to modify or distribute the Program or its 

derivative works. These actions are prohibited by law if 

you do not accept this Licence. Therefore, by modifying 

or distributing the Program (or any work based on the 

Program), you indicate your acceptance of this Licence 

to do so and all its terms and conditions for copying, 

distributing or modifying the Program or works based 

on it. 
Each time you redistribute the Program (or any work 

6. 

based  on  the  Program),  the  recipient  automatically 

receives  a  license  from  the  original  licensor  to  copy, 

distribute  or  modify  the  Program  subject  to  these 

terms and conditions. You may not impose any further 

restrictions  on  the  recipients'  exercise  of  the  rights 

granted herein. You are not responsible for enforcing 

compliance by third parties to this Licence. 

Summary of Contents for Linksys WRT320N

Page 1: ...USER GUIDE Dual Band Wireless N Gigabit Router Model WRT320N ...

Page 2: ...address or email address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Sec...

Page 3: ...urity Firewall 18 Security VPN Passthrough 19 Access Restrictions Internet Access 19 Applications and Gaming Single Port Forwarding 20 Applications and Gaming Port Range Forwarding 21 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 22 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Administration Diagnostics 26 Administration Factory Defau...

Page 4: ...Declaration of Conformity with Regard to EU Directive 1999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksys com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 38 Appendix E Software...

Page 5: ...rocess Make sure the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is enabled...

Page 6: ... Determine where you want to mount the Router 1 Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical socket Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Manoeuvre the Router so the wall mount slots line up 4 with the t...

Page 7: ...nable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer ...

Page 8: ...ult IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the Web based utility use the default password admin You can set a new password from the Administration tab s Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that app...

Page 9: ...number of minutes you want to elapse before your Internet connection terminates The default Max Idle Time is 15 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how o...

Page 10: ...n the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only Internet Connection Type Telstra Cable Server IP Address This is the IP a...

Page 11: ...on t want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address DHCP Reservation You will see a list of DHCP clients with the following information Client Name Interface IP Address and MAC Address DHCP Reservation Select Clients from DHCP Table Click the Select tick box to reser...

Page 12: ... you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default setting Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO then select TZO com The features available on the DDNS screen will vary depend...

Page 13: ...ing Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setu...

Page 14: ...sic Wireless Settings section To use Wi Fi Protected Setup select Wi Fi Protected Setup Proceed to the Wi Fi Protected Setup section BasicWireless Settings Wireless Basic Wireless Settings Manual Setup Wireless Band This is used to select the 2 4 GHz or 5 0 GHz band Network Mode From this drop down menu you can select the wireless standards running on your network If you have Wireless N Wireless G...

Page 15: ...e asks for the Router s PIN number Enter the PIN number listed on this screen It is also 1 listed on the label on the bottom of the Router After the client device has been configured click 2 OK Then refer back to your client device or its documentation for further instructions The Wi Fi Protected Setup Status Network Name SSID Security Encryption and Passphrase are displayed at the bottom of the s...

Page 16: ...only be used when a RADIUS server is connected to the Router Security Mode WPA Enterprise RADIUS Server Enter the IP Address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default value is 1812 Shared Secret Enter the key shared between the Router and the server Key Renewal Enter a Key Renewal period which instructs the Router how often it should change the encrypt...

Page 17: ... the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64bits 10hexdigits or104 128bits 26hexdigits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually WEP WEP is a basic encryption method which is not as secure as WPA...

Page 18: ...er Wireless devices will be able to communicate with the Router but not with each other To use this function select Enabled AP Isolation is disabled by default Frame Burst Enabling this option should provide your network with greater performance depending on the manufacturer of your wireless products To use this option keep the default Enabled Otherwise select Disabled Authentication Type The defa...

Page 19: ...should remain at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only a minor reduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After ...

Page 20: ...l PPTP allows the Point to Point Protocol PPP to be tunnelled through an IP network To allow PPTP tunnels to pass through the Router keep the default Enabled L2TP Passthrough Layer 2 Tunneling Protocol is the method used to enable Point to Point sessions via the Internet on the Layer 2 level To allow L2TP tunnels to pass through the Router keep the default Enabled Click Save Settings to apply your...

Page 21: ...elnet You can block up to three applications per policy From the Applications list select the application you want to block Then click the button to move it to the Blocked List To remove an application from the Blocked List select it and click the button If the application you want to block is not listed or you 10 want to edit a service s settings enter the application s name in the Application Na...

Page 22: ...efore using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation feature on the Basic Setup screen If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding To forward a port enter the information on each line for the criteria required Application Name In this field enter the...

Page 23: ...on Enabled Disabled To disable DMZ hosting select Disabled To expose one PC select Enabled Then configure the following settings Source IP Address If you want any IP address to be the source select Any IP Address If you want to specify an IP address or range of IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by I...

Page 24: ...ow Click Add to save your changes Your new entry will appear in the Summary list Add a New Application QoS Add a New Application Enter a Name Enter any name to indicate the name of the entry Port Range Enter the port range that the application will be using For example if you want to allocate bandwidth for FTP you can enter 21 21 If you need services for an application that uses from 1000 to 1250 ...

Page 25: ...outer Access To ensure the Router s security you will be asked for your password when you access the Router s web based utility The default is admin Router Password Enter a new password for the Router Re enter to confirm Enter the password again to confirm Web Access Web Utility Access HTTP HyperText Transport Protocol is the communications protocol used to connect to servers on the World Wide Web...

Page 26: ...any and all Internet connections Otherwise keep the default setting Disabled Backup and Restore Backup Configurations To back up the Router s configuration settings click this button and follow the on screen instructions Restore Configurations To restore the Router s configuration settings click this button and follow the on screen instructions You must have previously backed up the Router s confi...

Page 27: ...ostics Ping TracerouteTest The Traceroute test tests the performance of a connection IP or URL Address Enter the address of the PC whose connection you wish to test Start to Traceroute To run the test click this button The Traceroute Test screen will show if the test was successful Click Close to return to the Diagnostics screen Diagnostics Traceroute Administration Factory Defaults The Administra...

Page 28: ...t to Upgrade After you have selected the appropriate file click this button and follow the on screen instructions Status Router The Router screen displays information about the Router and its current settings Status Router Router Information Firmware Version This is the version number of the Router s current firmware Firmware Verification This shows the MD5 value generated during code compilation ...

Page 29: ...at have been assigned IP addresses by the Router The list can be sorted by Client Name Interface IP Address MAC Address and Expired Time how much time is left for the current IP address To remove a DHCP client click Delete To retrieve the most up to date information click Refresh To exit this screen and return to the Local Network screen click Close Status Wireless Network The Wireless Network scr...

Page 30: ...m and then insert the setup CD into your computer Click Setup and follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Int...

Page 31: ...ennas 3 RF Pwr EIRP in dBm 17 dBm Antenna Gain in dBi Main Antenna 1 5 dBi Third Antenna 2 2 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits 128 Bit Environmental Dimensions 202 x 160 x 34 mm 7 95 x 6 3 x 1 34 Weight 10 58 oz 0 30 kg Power 12 V Certification FCC CE IC 03 Wi Fi Operating Temp 0 to 40 C 32 to 104 F Storage Temp 20 to 60 C 4 to 140 F Operating Humidity 10 to ...

Page 32: ...or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO TH...

Page 33: ...covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdic...

Page 34: ...tal apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and 1 This device must accept any interference including 2 interference that may cause undesired operation of the device To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more ...

Page 35: ...d other adverse conditions Avis de non responsabilité concernant les appareils sans fil Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802 11 Les performances réelles peuvent varier notamment en fonction de la capacité du réseau sans fil du débit de la transmission de données de la portée et de la couverture Les performances dépendent de facteu...

Page 36: ...nys tenkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető kö...

Page 37: ...s ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesi menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the ...

Page 38: ...maximum output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with t...

Page 39: ... směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úř...

Page 40: ...ο οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des mé...

Page 41: ...t berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmag...

Page 42: ...zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje opr...

Page 43: ...YS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF AN...

Page 44: ...ted Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA TURNOVER OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING NEGLIGENCE ARISING OUT OF OR RELATED TO THE USE OF OR I...

Page 45: ...r that redistributors of a free program will individually obtain patent licences in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This Licence ap...

Page 46: ... terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received c as to the offer to distribute corresponding source code This alternative is allowed only for non commercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code ...

Page 47: ...e Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this Licence which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published b...

Page 48: ...recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this licence which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make ...

Page 49: ...and modification are not covered by this Licence they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Libra...

Page 50: ...rties are not compelled to copy the source along with the object code A program that contains no derivative of any portion 5 of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this Licence However linking a work th...

Page 51: ...requirement contradicts the licence restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute You may place library facilities that are a work based 7 on the Library side by side in a single library together with other library facilities not covere...

Page 52: ...itten in the body of this Licence The Free Software Foundation may publish revised 13 and or new versions of the Lesser General Public Licence from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this Licence...

Page 53: ... in their names without prior written permission of the OpenSSL Project Redistributions of any form whatsoever must retain 6 thefollowingacknowledgment Thisproductincludes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIE...

Page 54: ...y Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO ...

Reviews: