background image

Chapter 3

Advanced Configuration

24

Simultaneous Dual-Band Wireless-N Gigabit Router

User Management

By default the Router creates two users, 

admin

 and 

guest

.

The users are listed by User Name and Group.

Create  New  User 

To  create  a  new  user,  click  this 

button.  The 

User  Account 

screen  appears.  Proceed  to 

Create or Edit a User Account

page 24

.

Edit 

To  change  the  settings  of  a  user  account,  click 

Edit

,  and  the 

User  Account 

screen  appears.  Proceed  to 

Create or Edit a User Account

page 24

.

Delete 

To delete a user, click this button.

Group Management

By default the Router creates two user groups, 

admin

 and 

guest

The  groups  are  listed  by  Group  Name  and  Access  level. 
There are two levels of access, r & w (read-and-write) and 
r (read-only).

Create New Group 

To create a new group of users, click 

this button. The 

Group Account 

screen appears. Proceed to 

Create or Edit a Group Account

page 24

.

Edit 

To change the description or access rights of a group, 

click 

Edit

, and the 

Group Account 

screen appears. Proceed 

to 

Create or Edit a Group Account

page 24

.

Delete 

To delete a group, click this button.

Create or Edit a User Account

User Account

User Account

User Name 

Create a name for the user.

Full Name 

Enter the actual name of the user.

Description 

Enter keywords to describe the user.

Password 

Enter  the  password  that  the  user  will  use  for 

login

Confirm Password 

Enter the password again to confirm.

Group Member 

Select the appropriate user group.

Account  Disabled 

To  temporarily  disable  an  account, 

select this option.

Click 

Save Settings 

to apply your changes, or click 

Cancel 

to clear your changes. Click 

Close

 to exit the screen.

On  the 

Administration

  screen,  click 

Save  Settings

  to 

apply your changes, or click 

Cancel Changes

 to clear your 

changes.

Create or Edit a Group Account

Group Account

Group Account

Group Name 

Create a name for the group.

Description 

Enter keywords to describe the group.

Access 

Select the appropriate level of access, 

read and 

write 

or 

read only

.

Click 

Save Settings

 to apply your changes, or click 

Cancel 

to clear your changes. Click 

Close

 to exit the screen.

On  the 

Administration

  screen,  click 

Save  Settings

  to 

apply your changes, or click 

Cancel Changes

 to clear your 

changes.

Summary of Contents for Linksys WRT610N

Page 1: ...USER GUIDE Simultaneous Dual Band Wireless N Gigabit Router Model WRT610N ...

Page 2: ... in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksysbycisco com Linksys International www linksysbycisco com international Glossary www linksysbycisco com glossary Network Security www linksysbycisco com security ...

Page 3: ...k 20 Storage Media Server 21 Storage FTP Server 22 Storage Administration 23 Access Restrictions Internet Access 25 Applications and Gaming Port Range Forwarding 26 Applications Gaming Port Range Triggering 27 Applications and Gaming DMZ 27 Applications and Gaming QoS 28 Administration Management 30 Administration Log 31 Administration Diagnostics 31 Administration Factory Defaults 32 Administrati...

Page 4: ... Safety Notices 46 Industry Canada Statement 46 Restrictions in the 5 GHz Band 46 Avis d Industrie Canada 47 Restrictions dans la bande 5 GHz 47 Wireless Disclaimer 47 Avis de non responsabilité concernant les appareils sans fil 47 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 48 Appendix F Software End User License Agreem...

Page 5: ...use the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network s To use Wi Fi Protected Setup run the Setup Wizard or refer to Wi Fi Protected Setup page 13 Wi Fi Protected Setup LED Blue Amber The LEDflashesbluefortwominutesduringtheWi Fi ProtectedSetupprocessandlightsupbluewhen the Wi Fi Protected Setup process is successful The LED lights up amber if...

Page 6: ...175 56 mm 6 91 inches Two screws are needed to mount the Router Suggested Mounting Hardware 2 5 3 0 mm 4 5 mm 1 1 5 mm Note Mounting hardware illustrations are not true to scale NOTE Linksys is not responsible for damages incurred by unsecured wall mounting hardware Follow these instructions 1 Determine where you want to mount the Router Make sure that the wall you use is smooth flat dry and sturd...

Page 7: ...s 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each comp...

Page 8: ...indows XP users will see a similar screen Leave the User name field blank Then enter the password you set up during the Setup Wizard If you did not run the Setup Wizard then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 30 Click OK to continue Password Screen Setup Basic Setup The first screen that appears ...

Page 9: ...can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field ...

Page 10: ...d of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is...

Page 11: ...ts with the following information Client Name Interface IP Address and MAC Address DHCP Reservation Select Clients from DHCP Table Click the Select check box to reserve a client s IP address Then click Add Clients Manually Adding Client To manually assign an IP address enter the client s name in the Enter Client Name field Enter the IP address you want it to have in the Assign IP Address field Ent...

Page 12: ...t is useful when you are hosting your own website FTP server or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www tzo com If you do not want to use this feature keep the default Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu ...

Page 13: ...outing NAT Enabled Disabled IfthisRouterishostingyournetwork s connection to the Internet keep the default Enabled If another router exists on your network select Disabled When the NAT setting is disabled dynamic routing will be enabled Dynamic Routing RIP Enabled Disabled This feature enables the Router to automatically adjust to physical changes in the network s layout and exchange routing table...

Page 14: ...he following Unique Network Name SSID Wireless security settings refer to 5 GHz or 2 4 GHz Wireless Security page 14 Decide which computers and other wireless devices should join which network Wireless N devices support both the 5 GHz and 2 4 GHz bands so they can join either the 5 GHz or 2 4 GHz network Wireless G and Wireless B devices support only the 2 4 GHz band so they should join the 2 4 GH...

Page 15: ...annel to select keep the default Auto Standard Channel 5 GHz Select the channel for Wireless A and Wireless N 5GHz networking If you selected 40MHz only or Auto 20MHz or 40MHz for the Channel Width setting then the Standard Channel will be a secondary channel for Wireless N 5GHz If you are not sure which channel to select keep the default Auto Standard Channel 2 4 GHz Select the channel for Wirele...

Page 16: ... a stronger security standard than WEP Wireless Equivalent Privacy and WPA2 is even more secure than WPA RADIUS is Remote Authentication Dial In User Service 5 GHz or 2 4 GHzWireless Security Wireless security is strongly recommended and WPA2 is thestrongestmethodavailable UseWPA2ifitissupported by all of your wireless devices Security Mode Select the security method for each wireless network If y...

Page 17: ... the Router and the server Key Renewal Enter a Key Renewal period which instructs the Router how often it should change the encryption keys The default is 3600 seconds WPA Enterprise This option features WPA used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router WPA Enterprise Encryption WPA uses TKIP an encryption method with dynamic enc...

Page 18: ...ts Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 4 If you did not enter a Passphrase enter the WEP key s manually TX Key Select a default TX Transmit Key choose which Key to use The default is 1 WEP WEP is a basic encryption method which is not as secure as WPA IMPORTANT If you are using WEP encryption each device in your wireless network MUST use the s...

Page 19: ... Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List Then click Add To update the on screen information click Refresh To exit this screen and return to the Wireless MAC Filter screen clic...

Page 20: ...smission Power Select the appropriate level of transmission power High Medium or Low In most cases keep the default High CTS Protection Mode The Router automatically uses CTS Clear To Send Protection Mode when your Wireless N andWireless G devices are experiencing severe problems and are not able to transmit to the Router in an environmentwithheavy802 11btraffic Thisoptionboosts the Router s abili...

Page 21: ...ramming language for websites If you deny Java you run the risk of not having access to Internet sites created using this programming language Select this option to enable Java filtering Deselect the feature to allow Java usage ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language S...

Page 22: ...red Folder Shared Disk IP Address The IP address of the disk is displayed Summary To view a list of shared folders click this option For each shared folder the Display Name Partition and Shared Folder location are displayed Edit To change the access settings of a shared folder click this option and the Shared Folder screen appears Proceed to Create or Edit a Shared Folder page 20 Delete To delete ...

Page 23: ...ou have UPnP AV enabled or DLNA certified devices in your home then you can use the Router as a media server Examples of UPnP AV enabled devices include a digital media adapter a gaming console with a built in media player or a digital picture frame For example if you have a digital media adapter that sends content to your entertainment system then the digital media adapter can locate the Router u...

Page 24: ...Storage FTP Server The storage options are available when a USB storage device is connected to the USB port of the Router The FTP Server tab creates an FTP server that can be accessed from the Internet or your local network Storage FTP Server Setup Server Name The default server name of the Router is WRT610N FTP Server Select Enabled to use the Router as an FTP server Otherwise select Disabled An ...

Page 25: ...on Access Specify which user groups have read and write or read only access to the folder To create user groups refer to Create or Edit a Group Account page 24 Available Groups To allow a group access to the folder select it and then click the button Groups with Access To block a group from accessing the folder select it and then click the button Click Save Settings to apply your changes or click ...

Page 26: ...eed to Create or Edit a Group Account page 24 Delete To delete a group click this button Create or Edit a User Account User Account User Account User Name Create a name for the user Full Name Enter the actual name of the user Description Enter keywords to describe the user Password Enter the password that the user will use for login Confirm Password Enter the password again to confirm Group Member...

Page 27: ...which PCs will be affected by the policy The ListofPCs screen appears You can select a PC by MAC address or IP address You can also enter a range of IP addresses if you want this policy to affect a group of PCs After making your changes click Save Settings to apply your changes or click Cancel Changes to clear your changes Then click Close List of PCs 5 Select the appropriate option Deny or Allow ...

Page 28: ...th the Internet application documentation for more information Internal Port Enter the internal port number used by the server or Internet application Check with the Internet application documentation for more information Protocol Select the protocol s used for this application TCP UDP or Both To IP Address For each application enter the IP address of the computer that should receive the requests ...

Page 29: ...mber s needed Forwarded Range For each application enter the starting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Enabled Select Enabled to enable port triggering Click Save Settings to apply your changes or click Cancel Changes to clear your changes Applications and Gaming DMZ The DMZ feature allows one ...

Page 30: ...normal bandwidth select Low Depending on the application a few attempts may be needed to set the appropriate bandwidth priority Enabled Disabled To use the QoS policies you set select Enabled Otherwise select Disabled Category Select one of the following categories Applications Online Games MAC Address Ethernet Port or Voice Device Proceed to the instructions for your selection Summary This lists ...

Page 31: ...r the port range that the game will be using You can have up to three ranges to define for this bandwidth allocation Port numbers can range from 1 to 65535 Check your application s documentation for details on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommended Normal or Low Click Apply to save your changes Your new ...

Page 32: ...nt screen allows the network s administrator to manage specific Router functions for access and security Administration Management Router Password Router Access To ensure the Router s security you will be asked for your password when you access the Router s browser based utility The default is admin Router Password Enter a new password for the Router Re enter to confirm Enter the password again to...

Page 33: ...nt to be able to make manual changes to the Router while using the UPnP feature Otherwise select Disabled Allow Users to Disable Internet Access Select Enabled if you want to be able to prohibit any and all Internet connections Otherwise keep the default Disabled Backup and Restore Backup Configurations To back up the Router s configuration settings click this button and follow the on screen instr...

Page 34: ...ute Administration Factory Defaults The Factory Defaults screen allows you to restore the Router s configuration to its factory default settings Factory Defaults Restore Factory Defaults To reset the Router s settings to the default values select Restore Factory Defaults Any settings you have saved will be lost when the default settings are restored Administration Factory Defaults NOTE Donotrestor...

Page 35: ...ntered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen For a DHCP connection select Release IP Address or Renew IP Address as appropriate to release or renew a DHCP lease For a PPPoE or similar connection select Connec...

Page 36: ... mode used by the network is displayed NetworkName SSID Thenameofthewirelessnetwork which is also called the SSID is displayed Radio Band The Radio Band setting selected on the Basic Wireless Settings screen is displayed Wide Channel The Wide Channel setting selected on the Basic Wireless Settings screen is displayed Standard Channel The Standard Channel setting selected on the Basic Wireless Sett...

Page 37: ...lowing steps these steps are specific to Internet Explorer but are similar for other browsers 1 Select Tools Internet Options 2 Click the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the ca...

Page 38: ... the workgroup name of your computer 5 Click Save Settings In Windows XP you do not see the Router in the My Network Places screen In the Network Tasks section click Show icons for networked UPnP devices If the Router does not appear follow these instructions 1 Go to Start Control Panel Firewall 2 Click the Exceptions tab 3 Select UPnP Framework 4 Click OK In Windows XP you do not see your USB sto...

Page 39: ...T610N the server name of the Router Enter Server Name of Router NOTE Another option is to use the IP address of the Router In the Address field enter the local IP address of the Router xxx xxx xxx xxx The default is 192 168 1 1 You can change this IP address on the Setup Basic Setup screen refer to Setup Basic Setup page 6 3 On the login screen enter your account user name and password For the adm...

Page 40: ...On your desktop double click the Network icon Network Icon NOTE If the My Computer icon is not displayed then go to Start All Programs Accessories Windows Explorer 2 In the Address field enter WRT610N the server name of the Router Enter Server Name of Router NOTE Another option is to use the IP address of the Router In the Address field enter the local IP address of the Router xxx xxx xxx xxx The ...

Page 41: ...e Address field enter WRT610N the server name of the Router Enter Server Name of Router NOTE Another option is to use the IP address of the Router In the Address field enter the local IP address of the Router xxx xxx xxx xxx The default is 192 168 1 1 You can change this IP address on the Setup Basic Setup screen refer to Setup Basic Setup page 6 3 A login screen may appear If prompted enter your ...

Page 42: ...ed Users Only To manage access to the USB storage device you can create shared folders user groups and user accounts Access the Browser Based Utility To access the browser based utility launch the web browser on your computer and enter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave th...

Page 43: ...Groups column and then click the button NOTE Specify which user groups have read and write or read only access to the shared folders 9 To block a group from accessing the shared folder select it from the Groups with Access column and then click the button 10 Click Save Settings to apply your changes or click Cancel Changes to clear your changes Click Close to exit the screen and return to the Disk...

Page 44: ...er 5 In the Full Name field enter the actual name of the user 6 In the Description field enter keywords to describe the user 7 In the Password and Confirm Password fields enter the password that the user will use for login 8 From the Group Member drop down menu select the appropriate user group NOTE To temporarily disable an account select Account Disabled 9 Click Save Settings to apply your chang...

Page 45: ...reless N 40 MHz Max 12 0 dBm All Rates UNII 3 5725 5850 GHz 802 11a Max 17 5 dBm High Rates 802 11a Max 20 0 dBm Low Rates Wireless N 20 MHz Max 17 5 dBm High Rates Wireless N 20 MHz Max 20 0 dBm Low Rates Wireless N 40 MHz Max 17 5 dBm High Rates Wireless N 40 MHz Max 21 0 dBm Low Rates Receive Sensitivity 2 4 GHz 11 Mbps 87 dBm Typical 54 Mbps 77 dBm Typical MCS15 20 MHz 71 dBm Typical MCS15 40 ...

Page 46: ...uct assembly seal has been removed or damaged b the product has been altered or modified except by Linksys c the product damage was caused by use with non Linksys products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Linksys e the product has been subjected to abnormal physical or electrical stress misuse negligence or accident f ...

Page 47: ...our area can be found by clicking the Contact Us link on the home page of www linksysbycisco com Have your product serial number and proof of purchase on hand when calling A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS If you are requested to return your product you will be given a Return Materials Authorization RMA number You are responsible for properly packaging and s...

Page 48: ...es with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimm...

Page 49: ...une antenne ayant un gain maximal de 4 dBi à 2 4 GHz et de 3 5 dBi à 5 GHz Les antennes ayant un gain plus élevé sont strictement interdites par Industrie Canada L impédance d antenne requise est de 50 ohms Du fait que les radars haute puissance ont la priorité dans les bandes 5 250 5 350 MHz et 5 650 5 850 MHz ils pourraient causer des interférences ou endommager les périphériques réseau sans fil...

Page 50: ...vropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo míst...

Page 51: ...μα από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchet...

Page 52: ...elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking n...

Page 53: ...pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganj...

Page 54: ...HE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE T...

Page 55: ... service Cisco makes no representations as to the quality suitability functionality or legality of any sites or products to which links may be provided or third party services and you hereby waive any claim you might have against Cisco with respect to such sites or third party software products or services Your correspondence or business dealings with or participation in promotions of third partie...

Page 56: ...y change certain settings in your Internet browser software including the default settings for search provider and source of DNS error pages and may direct erroneous URLs to an error landing page hosted by Cisco Youmayoptoutofthesesettingsbynotacceptingthemas part of the installation process or by requesting a change to your software settings in the error process Installing the software and changi...

Page 57: ... portion of this Agreement is found to be void or unenforceable the remaining provisions will remain in full force and effect This Agreement constitutes the entire agreement between the parties with respect to the Software and supersedes any conflicting or additional terms contained in any purchase order or elsewhere Linksys Cisco and the Cisco Logo and other trademarks contained in the Software a...

Page 58: ...er the rights These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know the...

Page 59: ...ons for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not ba...

Page 60: ...s this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software ...

Page 61: ...and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate t...

Page 62: ...nd data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it eitherverbatimorwithmodificationsand ortranslated straightforwardly into another language Hereinafter tra...

Page 63: ...er the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object ...

Page 64: ...pen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilit...

Page 65: ...n as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of th...

Page 66: ...ay OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributions of any form whatsoever must retain the following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT ...

Page 67: ... written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT L...

Reviews: