background image

35

Wireless-G Broadband Router with SpeedBooster

Appendix E

Software License Agreement

your Linksys product and/or the Software is being used in 

accordance with the terms of this Agreement; (iii) to provide 

improvements to the way Linksys delivers technology to 

you and to other Linksys customers; (iv) to enable Linksys 

to comply with the terms of any agreements it has with 

any  third  parties  regarding  your  Linksys  product  and/or 

Software and/or (v) to enable Linksys to comply with all 

applicable  laws  and/or  regulations,  or  the  requirements 

of  any  regulatory  authority  or  government  agency. 

Linksys  and/  or  its  affiliates  may  collect  and  process 

this  information  provided  that  it  does  not  identify  you 

personally. Your  use  of  your  Linksys  product  and/or  the 

Software constitutes this consent by you to Linksys and/

or its affiliates’ collection and use of such information and, 

for EEA customers, to the transfer of such information to a 

location outside the EEA.

Software  Upgrades  etc.

  If  the  Software  enables  you  to 

receive  Upgrades,  you  may  elect  at  any  time  to  receive 

these  Upgrades  either  automatically  or  manually.  If  you 

elect  to  receive  Upgrades  manually  or  you  otherwise 

elect not to receive or be notified of any Upgrades, you 

may  expose  your  Linksys  product  and/or  the  Software 

to  serious  security  threats  and/or  some  features  within 

your  Linksys  product  and/or  Software  may  become 

inaccessible.  There  may  be  circumstances  where  we 

apply an Upgrade automatically in order to comply with 

changes  in  legislation,  legal  or  regulatory  requirements 

or as a result of requirements to comply with the terms 

of  any  agreements  Linksys  has  with  any  third  parties 

regarding your Linksys product and/or the Software. You 

will always be notified of any Upgrades being delivered 

to  you. The  terms  of  this  license  will  apply  to  any  such 

Upgrade unless the Upgrade in question is accompanied 

by  a  separate  license,  in  which  event  the  terms  of  that 

license will apply.

Open  Source  Software.

  The  GPL  or  other  open  source 

code incorporated into the Software and the open source 

license for such source code are available for free download 

at 

http://www.linksys.com/gpl

. If You would like a copy 

of the GPL or other open source code in this Software on a 

CD, Linksys will mail to You a CD with such code for $9.99 

plus the cost of shipping, upon request.

Term  and  Termination.

 You  may  terminate  this  License 

at  any  time  by  destroying  all  copies  of  the  Software 

and  documentation.  Your  rights  under  this  License  will 

terminate immediately without notice from Linksys if You 

fail to comply with any provision of this Agreement.

Limited  Warranty.

  The  warranty  terms  and  period 

specified  in  the  applicable  Linksys  Product  User  Guide 

shall also apply to the Software.

Disclaimer of Liabilities.

 IN NO EVENT WILL LINKSYS OR 

ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE 

OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 

INCIDENTAL  OR  PUNITIVE  DAMAGES,  REGARDLESS  OF 

CAUSE  (INCLUDING  NEGLIGENCE),  ARISING  OUT  OF 

OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO  USE  THE 

SOFTWARE,  EVEN  IF  LINKSYS  HAS  BEEN  ADVISED  OF 

THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL 

LINKSYS’  LIABILITY  EXCEED  THE  AMOUNT  PAID  BY  YOU 

FOR THE  PRODUCT. The  foregoing  limitations  will  apply 

even if any warranty or remedy under this Agreement fails 

of its essential purpose. Some jurisdictions do not allow 

the exclusion or limitation of incidental or consequential 

damages,  so  the  above  limitation  or  exclusion  may  not 

apply to You.

Export.

 Software, including technical data, may be subject 

to U.S. export control laws and regulations and/or export 

or  import  regulations  in  other  countries.  You  agree  to 

comply strictly with all such laws and regulations.

U.S. Government Users.

 The Software and documentation 

qualify as “commercial items” as defined at 48 C.F.R. 2.101 

and  48  C.F.R.  12.212.  All  Government  users  acquire  the 

Software  and  documentation  with  only  those  rights 

herein that apply to non-governmental customers.

General Terms.

 This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 

California, without reference to conflict of laws principles. 

The  United  Nations  Convention  on  Contracts  for  the 

International Sale of Goods will not apply. If any portion 

of this Agreement is found to be void or unenforceable, 

the  remaining  provisions  will  remain  in  full  force  and 

effect. This Agreement constitutes the entire agreement 

between  the  parties  with  respect  to  the  Software  and 

supersedes any conflicting or additional terms contained 

in any purchase order or elsewhere.

END OF SCHEDULE 1

Schedule 2

If  this  Linksys  product  contains  open  source  software 

licensed  under  Version  2  of  the  “GNU  General  Public 

License” then the license terms below in this Schedule 2 

will apply to that open source software. The license terms 

below in this Schedule 2 are from the public web site at 

http://www.gnu.org/copyleft/gpl.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991 
Copyright © 1989, 1991 Free Software Foundation, Inc. 
51  Franklin  Street,  Fifth  Floor,  Boston,  MA  02110-1301, 

USA
Everyone  is  permitted  to  copy  and  distribute  verbatim 

copies  of  this  license  document,  but  changing  it  is  not 

allowed.

Preamble

The licenses for most software are designed to take away 

your  freedom  to  share  and  change  it.  By  contrast,  the 

Summary of Contents for Linksys WRT54GS2

Page 1: ...USER GUIDE Wireless G Broadband Router with SpeedBooster Model WRT54GS2 ...

Page 2: ...ebsite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Net...

Page 3: ...Wireless MAC Filter 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming Port Triggering 18 Applications and Gaming DMZ 18 Applications and Gaming QoS 18 Administration Management 19 Administration Log 20 Administration Diagnostics 20 Administration Factory Defaults 21...

Page 4: ...ices 28 Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 30 Appendix E Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 ...

Page 5: ...device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Green The Wireless LED lights up when the wireless feature is enabled If the LED is flashing the...

Page 6: ...ctions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with ...

Page 7: ...ive you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in your home so that only those computers can...

Page 8: ...92 168 1 1 in the Address field Then press Enter A password request screen appears Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the web based utility enter the password you created during the Setup Wizard If you did not create a new password use the default password admin You can set a new password from the Administration tab s Management s...

Page 9: ...nutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often yo...

Page 10: ... you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Internet Connection Type Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server This ...

Page 11: ...imum Number of DHCP Users Enter the maximum number of computers that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased th...

Page 12: ...isplayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here Click Save Settings to apply your changes or click Cancel Changes to cancel your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Becaus...

Page 13: ... wireless networks You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet Select set number To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determinedpathwaythatn...

Page 14: ... devices in your network select Disabled Wireless Network Name SSID The SSID is the network name shared among all points in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security...

Page 15: ...reless Wireless Security The Wireless Security settings configure the security of your wireless network There are six wireless security mode options supported by the Router WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise RADIUS and WEP WPA stands for Wi Fi Protected Access which is a security standard stronger than WEP encryption WPA2 is a more advanced more secure version of WPA WEP sta...

Page 16: ...eout Enter a Key Renewal Timeout period which instructs the Router how often it should change the encryption keys The default Key Renewal Timeout period is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router Security Mode WPA2 Enterprise WPA Algorithm WPA2 supports two encryption m...

Page 17: ...Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter WirelessMACFilter Tof...

Page 18: ...tiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send Protection Modeshouldremaindisabledunlessyouarehavingsevere problems with your Wireless G products not being able to transmit to the Router in an environment with heavy 802 11b traffic This function boosts the Router s ability to catch all Wireless G tra...

Page 19: ...ted by default Deselect this feature to disable it Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select Filter Internet NAT Redirection to filter Internet NAT redirection This feature is not selected by default Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local net...

Page 20: ...k 4 Edit List of PCs to select which computers will be affectedbythepolicy The ListofPCsscreenappears You can select a computer by MAC Address or IP Address You can also enter a range of IP Addresses if you want this policy to affect a group of computers After making yourchanges clickSaveSettingstoapplyyourchanges or Cancel Changes to cancel your changes Then click Close List of PCs Select the app...

Page 21: ...gs to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming Port Range Forward The Applications Gaming Port Range Forward screen allows you to set up public services on your network such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are anyapplicationsthatuseInternetaccesstoperformfunctions...

Page 22: ...ncel your changes Applications and Gaming DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forward feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all ...

Page 23: ...low common game application ports to have a higher priority These games include but are not limited to Counter Strike Half Life Age of Empires EverQuest Quake2 Quake3 and Diablo II The default setting is unselected Application Name Enter the name you wish to give the application in the Application Name field Priority Select Highest High Medium or Low to assign priority to the application The defau...

Page 24: ...emote access select this feature UPnP UPnP Keep the default Enable to enable the UPnP feature otherwise select Disable Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disable To monitor traff...

Page 25: ...ade Firmware screen allows you to upgrade the Router s firmware Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use Administration Upgrade Firmware Before upgrading the firmware download the Router s firmware upgrade file from the Linksys website www linksys com Then extract the file Upgrade Firmware Please select a fil...

Page 26: ...creen Click Refresh to update the on screen information Status Local Network The Status Local Network screen displays the status of your network Status Local Network Local Network MAC Address The Router s MAC Address as seen on your local Ethernet network is displayed IP Address The Router s IP Address as it appears on your local Ethernet network is displayed Subnet Mask The current subnet mask co...

Page 27: ... mode Mixed G Only B Only or Disabled used by the network is displayed SSID As entered on the Wireless Basic Wireless Settings screen the wireless network name or SSID is displayed DHCP Server The status of the DHCP server function is displayed Channel As entered on the Wireless Basic Wireless Settings screen The channel on which your wireless network is broadcasting is displayed Encryption Functi...

Page 28: ...SL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Opt...

Page 29: ... Antennas Detachable y n No RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits Environmental Dimensions 7 99 x 1 38 x 6 30 203 x 35 x 160 mm Weight 9 88 oz 280 g Power External 12V DC 0 5A Certifications FCC UL ICES 003 RSS210 CE Wi...

Page 30: ...gs This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITE...

Page 31: ...es custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www l...

Page 32: ...ontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use on...

Page 33: ...allé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless netw...

Page 34: ...opská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místní...

Page 35: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Page 36: ...lavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ni...

Page 37: ...ácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje o...

Page 38: ...LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART ...

Page 39: ...sys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE...

Page 40: ...prietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be dist...

Page 41: ...he terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a ...

Page 42: ...o time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publis...

Page 43: ...warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company can...

Page 44: ...rary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the L...

Page 45: ...of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is...

Page 46: ...y not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such...

Page 47: ...oftware generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNES...

Page 48: ...cludes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free...

Page 49: ...TION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distr...

Reviews: