background image

22

AppendixE:SoftwareEndUserLicenseAgreement

Schedule2-B

IfthisCiscoproductcontainsopensourcesoftwarelicensed

under Version 2.1 of the “GNU Lesser General Public

License”thenthelicensetermsbelowinthisSchedule2-B

willapplytothatopensourcesoftware.Thelicenseterms

belowinthisSchedule2-Barefromthepublicwebsiteat

http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

GNULESSERGENERALPUBLICLICENSE

Version2.1,February1999
Copyright(C)1991,1999FreeSoftwareFoundation,Inc.
51FranklinStreet,FifthFloor,Boston,MA02110-1301USA
Everyone is permitted to copy and distribute verbatim

copies of this license document, but changing it is not

allowed.
[ThisisthefirstreleasedversionoftheLesserGPL.Italso

countsasthesuccessoroftheGNULibraryPublicLicense,

version2,hencetheversionnumber2.1.]

Preamble

Thelicensesformostsoftwarearedesignedtotakeaway

your freedom to share and change it.  By contrast, the

GNU General Public Licenses are intended to guarantee

yourfreedomtoshareandchangefreesoftware--tomake

surethesoftwareisfreeforallitsusers.
This license, the Lesser General Public License, applies

to some specially designated software packages--

typically libraries--of the Free Software Foundation and

other authors who decide to use it. You can use it too,

but we suggest you first think carefully about whether

thislicenseortheordinaryGeneralPublicLicenseisthe

betterstrategytouseinanyparticularcase,basedonthe

explanationsbelow.
When we speak of free software, we are referring to

freedom of use, not price.  Our General Public Licenses

are designed to make sure that you have the freedom

todistributecopiesoffreesoftware(andchargeforthis

serviceifyouwish);thatyoureceivesourcecodeorcan

getitifyouwantit;thatyoucanchangethesoftwareand

use pieces of it in new free programs; and that you are

informedthatyoucandothesethings.
Toprotectyourrights,weneedtomakerestrictionsthat

forbiddistributorstodenyyoutheserightsortoaskyou

tosurrendertheserights.Theserestrictionstranslateto

certainresponsibilitiesforyouifyoudistributecopiesof

thelibraryorifyoumodifyit.
For example, if you distribute copies of the library,

whethergratisorforafee,youmustgivetherecipients

alltherightsthatwegaveyou.Youmustmakesurethat

they,too,receiveorcangetthesourcecode.Ifyoulink

othercodewiththelibrary,youmustprovidecomplete

objectfilestotherecipients,sothattheycanrelinkthem

withthelibraryaftermakingchangestothelibraryand

recompilingit.Andyoumustshowthemthesetermsso

theyknowtheirrights.
We protect your rights with a two-step method: (1) we

copyright the library, and (2) we offer you this license,

whichgivesyoulegalpermissiontocopy,distributeand/

ormodifythelibrary.
Toprotecteachdistributor,wewanttomakeitveryclear

thatthereisnowarrantyforthefreelibrary.Also,ifthe

library is modified by someone else and passed on, the

recipients should know that what they have is not the

original version, so that the original author’s reputation

willnotbeaffectedbyproblemsthatmightbeintroduced

byothers.
Finally, software patents pose a constant threat to the

existence of any free program.  We wish to make sure

that a company cannot effectively restrict the users of

a free program by obtaining a restrictive license from a

patentholder.Therefore,weinsistthatanypatentlicense

obtained for a version of the library must be consistent

withthefullfreedomofusespecifiedinthislicense.
MostGNUsoftware,includingsomelibraries,iscovered

bytheordinaryGNUGeneralPublicLicense.Thislicense,

theGNULesserGeneralPublicLicense,appliestocertain

designated libraries, and is quite different from the

ordinaryGeneralPublicLicense.Weusethislicensefor

certainlibrariesinordertopermitlinkingthoselibraries

intonon-freeprograms.
When a program is linked with a library, whether

statically or using a shared library, the combination of

thetwoislegallyspeakingacombinedwork,aderivative

of the original library.  The ordinary General Public

License therefore permits such linking only if the entire

combinationfitsitscriteriaoffreedom.TheLesserGeneral

PublicLicensepermitsmorelaxcriteriaforlinkingother

codewiththelibrary.
We call this license the“Lesser” General Public License

becauseitdoesLesstoprotecttheuser’sfreedomthan

the ordinary General Public License.  It also provides

otherfreesoftwaredevelopersLessofanadvantageover

competingnon-freeprograms.Thesedisadvantagesare

the reason we use the ordinary General Public License

formanylibraries.However,theLesserlicenseprovides

advantagesincertainspecialcircumstances.
For example, on rare occasions, there may be a special

need to encourage the widest possible use of a certain

library,sothatitbecomesade-factostandard.Toachieve

this,non-freeprogramsmustbeallowedtousethelibrary.

Amorefrequentcaseisthatafreelibrarydoesthesame

jobaswidelyusednon-freelibraries.Inthiscase,thereis

littletogainbylimitingthefreelibrarytofreesoftware

only,soweusetheLesserGeneralPublicLicense.
Inothercases,permissiontouseaparticularlibraryinnon-

freeprogramsenablesagreaternumberofpeopletouse

alargebodyoffreesoftware.Forexample,permissionto

usetheGNUCLibraryinnon-freeprogramsenablesmany

Summary of Contents for Valet Connector AM10

Page 1: ...user guide ...

Page 2: ...apter 2 Installation 2 Chapter 3 Wireless Network Configuration 4 Appendix A Troubleshooting 8 Appendix B Specifications 9 Appendix C Warranty Information 10 Appendix D Regulatory Information 12 Appendix E Software End User License Agreement 15 ...

Page 3: ...en the Valet Connector is plugged into the USB Extension Base or your laptop computer s USB port you can store the cap by attaching it to the Valet Connector Tostorethecap pushitontothetopoftheValetConnector until it fits snugly USB Extension Base The Valet Connector comes attached to its USB Extension Base Using the Valet Connector in its Base may often improve wireless signal performance especia...

Page 4: ...tup on the Valet Connector directly To do so perform the following steps for your specific operating system Windows 7 a Go to Start Computer and double click Cisco Valet Connector Setup b Double click Setup Windows Vista a Go to Start Computer and double click Cisco Valet Connector Setup b Double click Setup Windows XP a Go to Start My Computer and click Cisco Valet Connector Setup b Double click ...

Page 5: ...y Wi Fi Protected Access WPA WPA2 Enter the passphrase also known as a pre shared key Click Next Go to step 9 Enter the Wireless Password 8 Follow the on screen prompts to use your Easy Setup Key Click Next Insert your Easy Setup Key 9 The installation is complete Click Close You are Now Connected to Your Wireless Network NOTE If you have any problems during the installation process refer to the F...

Page 6: ...ouse pointer hovers over the icon the status information of your wireless connection appears Wireless Connection Status New Wireless Connection To connect to a different wireless network 1 Click the Wireless Network Configuration utility icon A list of available wireless networks appears Available Wireless Networks 2 Select your network and then click Connect Select Network 3 If your network does ...

Page 7: ...o a different wireless network 1 Right click the Wireless Network Configuration utility icon 2 Click Connect to a network Utility Menu 3 Select your network and then click Connect Select Network 4 If your network uses wireless security go to step 5 If your network does not use wireless security this screenappears Toconnecttoyourunsecurednetwork click Connect Anyway and go to step 7 Unsecured Netwo...

Page 8: ...o save your settings Click Close Connected to Network 8 The Set Network Location screen may appear This screen helps apply the correct settings for your type of location Select Home Work or Public location Select Network Location 9 This screen varies according to the selected location Click Close Network Settings Saved NOTE For help with the Wireless Network Configuration utility refer to Help and...

Page 9: ...able Wireless Network 3 Click Connect Anyway to connect theValet Connector to your network and then go to step 5 No Wireless Security 4 If your network uses Wired Equivalent Privacy WEP wireless security enter the WEP key in the Network key and Confirm network key fields If your network uses Wi Fi Protected Access WPA WPA2 wireless security enter the passphrase in the Network key and Confirm netwo...

Page 10: ...ert it into the computer s USB slot Your computer cannot communicate with the other computers on your wireless network 1 Make sure that the computers are powered on 2 Make sure that the Valet Connector is configured with the same Wireless Network Name also called the SSID or Service Set Identifier and wireless security settings as the other computers on your wireless network WEB If your questions ...

Page 11: ...0 20 MHz 92 dBm Typical MCS15 40 MHz 69 dBm Typical MCS0 40 MHz 90 dBm Typical Antenna Gain in dBi Antenna 1 0 33 dBi Antenna 2 1 4 dBi Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 15 x 1 00 x 0 49 79 9 x 25 4 x 12 4 mm Weight 0 39 oz 11 g Certification FCC UL CB CE Operating Temp 0 to 40 C 32 to 104 F Storage Temp 20 to 70 C 4 to 158 F Opera...

Page 12: ...d Limitations This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the product has been subjected to abnormal phys...

Page 13: ...and effect Obtaining Warranty Service If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purchased your product from a service provid...

Page 14: ...evicemaynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user FCC Radiation Expo...

Page 15: ... conforme aux limites d exposition aux radiofréquences établies pour un environnement non contrôlé Pour assurer le maintien de cette conformité l utilisateur doit suivre les consignes d utilisation décrites dans le présent manuel Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless network ...

Page 16: ... separarse de los residuos domésticos convencionales con vistas a su eliminación Es responsabilidad suya desechar este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición el gobierno y lasautoridadeslocales Aldesecharyreciclarcorrectamenteestos aparatos estará contribuyendo a evitar posibles consecuencias negativas para el medio amb...

Page 17: ...tions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a copy of the Cisco Software License Agreemen...

Page 18: ...sed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically granted to You in this Agreement are reserved by ...

Page 19: ...ances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgrades being delivered to You In addition Cisco reserves the right to Up...

Page 20: ...ure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com support Export Software including technical data may be subject to U S export control laws and regulations and or expor...

Page 21: ...rotection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by softw...

Page 22: ...ted under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above...

Page 23: ...ical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the ...

Page 24: ...se terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients ...

Page 25: ...he program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of t...

Page 26: ... work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline ...

Page 27: ...in in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License t...

Page 28: ...ermission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS N...

Page 29: ...their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRA...

Page 30: ... tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT ...

Page 31: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10021610NC AI ...

Reviews: