background image

Linksys E1000

Appendix E: Software End User License Agreement

44

Wireless-N Router

or provided in or with the applicable Cisco product, and 
(b) any upgrades, updates, bug fixes or modified versions 
(“Upgrades”)  or  backup  copies  of  the  Software  supplied 
to You by Cisco or an authorized reseller (whether or not 
for a fee), provided You already hold a valid license to the 
original software and have paid any applicable fee for the 
Upgrade . 

“Documentation”  means  all  documentation  and  other 
related materials supplied by Cisco to You pursuant to this 
Agreement .

“Technology”  shall  mean  the  Software  and  Services 
collectively .

License  Restrictions.

    Other  than  as  set  forth  in  this 

Agreement,  You  may  not,  nor  permit  anyone  else  to, 
directly  or  indirectly  (i)  make,  distribute,  or,  except  in 
connection with the use of Your Cisco product, copy the 
Software  or  its  related  Documentation,  or  electronically 
transfer  the  Software  or  Documentation  from  one 
computer to another or over a network; (ii) alter, merge, 
modify,  adapt,  decrypt  or  translate  the  Software  or 
related  Documentation,  or  decompile,  reverse  engineer, 
disassemble,  or  otherwise  reduce  or  attempt  to  reduce 
the  Software  to  a  human-perceivable  form  (except  to 
the  extent  expressly  permitted  by  law  notwithstanding 
this provision or except to the extent that Cisco is legally 
required to permit such specific activity pursuant to any 
applicable open source license); (iii) share, sell, rent, lease, 
or  sublicense  the  Software  or  related  Documentation; 
(iv) modify the Software or create derivative works based 
upon the Software; (v) if You make a backup copy of the 
Software  and  Documentation,  You  must  reproduce  all 
copyright notices and any other proprietary legends found 
on the original Software and Documentation; (vi) use the 
Technology for management of a business network with 
more  than  8  computers;  (vii)  use  the  Software  under 
any  circumstances  for  competitive  evaluation,  including 
developing  competing  software;  (ix)  to  the  extent 
permitted  under  applicable  law,  assign,  sublicense  or 
otherwise transfer the Technology unless the prospective 
assignee, sublicensee or transferee expressly agrees to all 
the terms and conditions under this Agreement .

The Technology and Documentation contain trade secrets 
and/or copyrighted materials of Cisco or its suppliers .  You 
will not disclose or make available such trade secrets or 
copyrighted material in any form to any third party .  

In the event that You fail to comply with this Agreement, 
the  license  granted  to You  will  automatically  terminate, 
at  which  time  You  must  immediately  (i)  stop  using  the 
Technology and the Cisco product in which the Software 
is  embedded,  or  (ii)  uninstall  the  Software  and  destroy 
all copies of the Software and Documentation where the 
Technology  is  purchased  separately .  All  other  rights  of 
both  parties  and  all  other  provisions  of  this  Agreement 
will survive this termination .

Ownership.

    The  Technology  and  Documentation  are 

licensed  and  not  sold  to You  by  Cisco  and  the  relevant 
third parties set forth in Schedule 2 .  Cisco, its suppliers 
and  its  licensors  respectively  retain  all  right,  title  and 
interest, including all copyright and intellectual property 
rights,  in  and  to,  the  Technology  and  Documentation 
and  all  copies,  derivatives  and  portions  thereof .    All 
rights  not  specifically  granted  to You  in  this  Agreement 
are  reserved  by  Cisco  and  its  licensors .   Your  use  of  any 
software product from an entity other than Cisco that may 
have  been  recommended  by  Cisco  is  governed  by  such 
software product’s end user license agreement .

Third Party Services, Links and Advertising.

  Cisco may 

provide  from  within  the  Software  links  to  web  sites  or 
third  party  software  products .    In  addition,  third  party 
Services may be provided with the Software which may be 
subject to terms and conditions from the provider of the 
Service .  Cisco makes no representations as to the quality, 
suitability, functionality, or legality of any sites or products 
to  which  links  may  be  provided  or  third  party  Services, 
and You hereby waive any claim You might have against 
Cisco  with  respect  to  such  sites  or  third  party  software 
products  or  Services .   Your  correspondence  or  business 
dealings  with,  or  participation  in  promotions  of  third 
parties found through the Software and any other terms, 
conditions, warranties, or representations associated with 
such  dealings,  are  solely  between  You  and  such  third 
party .  You agree that Cisco is not responsible or liable for 
any loss or damage of any sort incurred as the result of any 
such dealings or as the result of the presence of such third 
party  links,  products  or  services  in  the  Cisco  Software, 
and Cisco may discontinue or modify the Services or links 
offered at any time .

Collection  and  Processing  of  Information.

  You  agree 

that  Cisco  and/or  its  affiliates  may,  from  time  to  time, 
collect and process information about Your Cisco product 
and/or  the  Software  and/or  Your  use  of  either  in  order 
(i)  to  enable  Cisco  to  offer You  Upgrades;  (ii)  to  provide 
support  and  assistance  with  Your  product  and/or  the 
Software;  (iii)  to  ensure  that  Your  Cisco  product  and/or 
the Software is being used in accordance with the terms 
of  this  Agreement;  (iv)  to  provide  improvements  to  the 
way Cisco delivers technology to You and to other Cisco 
customers;  (v)  to  provide  reports  regarding  the  status 
and health of the network, including network traffic and 
application  usage;  (vi)  to  enable  Cisco  to  comply  with 
the terms of any agreements it has with any third parties 
regarding Your Cisco product and/or Software; and/or (vii) 
to  enable  Cisco  to  comply  with  all  applicable  laws  and/
or  regulations,  or  the  requirements  of  any  regulatory 
authority or government agency . Cisco and/ or its affiliates 
may collect and process this information provided that it 
does not identify You personally .  You agree that Cisco has 
no responsibility or liability for the deletion of or failure to 
store any data or other information related to Your Cisco 
product, Software or related Services .

Summary of Contents for E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...etup MAC Address Clone 18 Setup Advanced Routing 19 Wireless Basic Wireless Settings 19 Manual Setup 20 Wireless Wireless Security 21 Wireless Wireless MAC Filter 23 Wireless Advanced Wireless Settings 24 Security Firewall 25 Security VPN Passthrough 25 Access Restrictions Internet Access 26 Applications and Gaming Port Range Forwarding 28 Applications Gaming Port Range Triggering 28 Applications ...

Page 3: ...ent 41 FCC Radiation Exposure Statement 41 Safety Notices 41 Industry Canada Statement 41 Avis d Industrie Canada 41 Wireless Disclaimer 42 Avis de non responsabilité concernant les appareils sans fil 42 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 42 Appendix E Software End User License Agreement 43 Cisco Products 43 Sof...

Page 4: ...se the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup page 20 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection mad...

Page 5: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 6: ...s Install or run program General options Set up your Linksys Router Published by Cisco Consumer Products LLC Set AutoPlay defaults in Control Panel Open folder to view files using Windows Explorer Speed up my system using Windows ReadyBoost Set Up Your Linksys Router If you do not see this access setup on the CD directly To do so perform the following steps for your specific operating system Windo...

Page 7: ...up software is setting up the Router Please Wait 6 The installation is complete Click OK Installation is Complete NOTE If you have any problems during the installation process refer to the Frequently Asked Questions in the setup software or use a computer with an active Internet connection to visit www linksys com support Main Menu When Cisco Connect starts up the main menu appears Main Menu Statu...

Page 8: ... number of devices connected to the Router is displayed Add device To connect another computer or device to the Router click Add device and go to Computers and Other Devices page 6 Main Menu Parental Controls Parental controls restrict Internet access for up to five computers For the computers you select you can block or limit Internet access to specific times You can also block specific websites ...

Page 9: ...nect with the Easy Setup Key page 6 No I don t have an Easy Setup Key create a new one now If you want to create or update an Easy Setup Key select this option Click Next and go to Create or Update the Easy Setup Key page 7 I want to connect manually using my wireless settings If you want to connect manually without an Easy Setup Key select this option Click Next and go to Connect Manually page 7 ...

Page 10: ...r computers to the Router for more information refertoConnectwiththeEasySetupKey page 6 Click Close Easy Setup Key Has Been Updated Connect Manually 1 EntertheNetworkname SSID SecurityKey andSecurity Type settings on your wireless device SSID stands for Service Set Identifier To print this information click Print these settings Connecting a Device 2 After your device connects click Next 3 Enter a ...

Page 11: ...cret question and answer pair If you forget the password you can reset it by correctly answering the secret question Enter your question Answer Enter the answer to your secret question Click OK to save your settings 2 Select the computer whose parental controls you want to set up Then click OK Set Up Parental Controls For 3 The Parental controls main screen appears Parental Controls You have the f...

Page 12: ...a computer follow these instructions 1 Select the computer from the RestrictInternetaccesson list If the computer is not listed click Add to select the computer Parental Controls 2 The Block Internet access option offers the following Always To always block Internet access select this option Specific times To block Internet access during specific days and times select this option and set the sched...

Page 13: ...are sets up the password for the guest network To change the password click Change If you clicked Change the Change guest password screen appears Change Guest Password Enter a new guest password Enter a password of 4 32 characters Click Change to save your setting Total guests allowed By default 5 guests are allowed Internet access through the guest network Select the appropriate number of guests ...

Page 14: ...to the Router will need to be reconnected using the new name or password for more information refer to Computers and Other Devices page 6 If you clicked Change the Changing router name or password screen appears 1 To change the Router name or password click Yes Otherwise click No Changing Router Name or Password 2 Complete the following Router name Enter a name of 1 32 characters Password Enter a ...

Page 15: ...ssword to access the browser based utility Copy password To copy the password to the Clipboard click this option Advanced Settings Click OK to open the web browser and access the browser based utility For more information refer to How to Access the Browser Based Utility page 13 How to Exit Cisco Connect To exit Cisco Connect click Close on the main menu Main Menu How to Access Cisco Connect Window...

Page 16: ...reen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 32 Click OK to continue Login Screen NOTE You can also access the browser based utility through Cisco Connect For more in...

Page 17: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 18: ...has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select th...

Page 19: ...our local network Router IP IP Address The Router s IP address as seen by your network is displayed The default Router IP address is 192 168 1 1 Subnet Mask The Router s Subnet Mask as seen by your network is displayed URL Address To access the browser based utility you enter the Router s IP address or URL address The default is http my E1000 If you want to change the default enter a new URL addre...

Page 20: ...matically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will provide you with at least one DNS Server IP address If you wish to use another enter that IP address in one of these fields You can enter u...

Page 21: ...n is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Because it is dynamic it will change Status The status of th...

Page 22: ...te This Entry to delete a static route Enter Route Name Enter a name for the Route here using a maximum of 25 alphanumeric characters Destination LAN IP The Destination LAN Local Area Network IP is the address of the remote network or host to which you want to assign a static route Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion and which...

Page 23: ...eep the default Auto SSID Broadcast When wireless clients survey the local area for wireless networks to associate with they will detect the SSID broadcast by the Router To broadcast the Router s SSID keep the default Enabled If you do not want to broadcast the Router s SSID then select Disabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected...

Page 24: ... wireless security settings configure the security of your wireless network s The Router supports the following wireless security options WPA WPA2 Mixed Mode default WPA2 Personal WPA Personal WEP and RADIUS WPA stands for Wi Fi Protected Access WEP stands for Wireless Equivalent Privacy RADIUS stands for Remote Authentication Dial In User Service The default option is WPA WPA2 mixed mode which al...

Page 25: ...e WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually RADIUS This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router NOTE If you are using WEP encryption each device in your wireless network MUST use the same WEP encryption method and encryption key or else your wireless ...

Page 26: ...etwork Select this option to allow wireless access by MAC address This option is disabled by default MAC Address Filter List Wireless Client List Click this option to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Se...

Page 27: ...he rate of data transmission should be set depending on the speed of your wireless network Select from a range of transmission speeds or keep the default Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client N Transmission Rate The N Trans...

Page 28: ...ult Filter IDENT Port 113 The Filter IDENT Identification option keeps port 113 from being scanned by devices outside of your local network This option is enabled by default Disable it to allow port 113 to be scanned Web Filters Proxy Use of WAN proxy servers may compromise the Gateway s security Denying Proxy will disable access to any WAN proxy servers Select this option to enable proxy filterin...

Page 29: ...electing a policy from the drop down menu will display that policy s settings To delete a policy select that policy s number and click DeleteThisPolicy Toviewallthepolicies click Summary Summary The policies are listed with the following information No Policy Name Access Days Time and status Enabled To enable a policy select Enabled To delete a policy click Delete Click Save Settings to save your ...

Page 30: ...o block is not listed or you want to edit a service s settings enter the application s name in the Application Name field Enter its range in the Port Range fields Select its protocol from the Protocol drop down menu Then click Add To modify a service select it from the Applications list Change its Application Name Port Range and or Protocol setting Then click Modify To delete a service select it f...

Page 31: ...resses to the designated computers use the DHCP Reservation option on the BasicSetup screen refer to DHCPReservation page16 If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding For each entry complete the following Application Name Enter the name you wish to give the application Each name can be up to 12 characters S...

Page 32: ...you want to specify an IP address or range of IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by IP address select IP Address and enter the IP address in the field provided If you want to specify the DMZ host by MAC address select MAC Address and enter the MAC address in the field provided To retrieve this inform...

Page 33: ...s accessing the network For example if you want your gaming console to have higher priority accessing the Internet than your computer you can assign their priority levels using their respective MAC addresses Voice Device Voice devices require a higher priority level You can assign a higher priority level to voice devices using their respective MAC addresses Summary This lists the QoS entries you h...

Page 34: ...opriate priority High Medium Recommended Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Voice Device QoS Voice Device Enter a Name Enter a name for your voice device MAC Address Enter the MAC address of your voice device Priority Select the appropriate priority High Recommended Medium Normal or Low Click Add to save your changes Your new entry will appe...

Page 35: ...utside the local network select Enabled You must have the Remote Management option enabled as well Otherwise keep the default Disabled Allowed Remote IP Address If you want to be able to access the Router from any external IP address select Any IP Address If you want to specify an external IP address or range of IP addresses then select the second option and complete the fields provided Remote Man...

Page 36: ... traffic The Security log displays the login information for the browser based utility The DHCP Client Log displays the local DHCP server status information Click Save the Log to save this information to a file on your computer s hard drive Click Refresh to update the log Click Clear to clear all the information that is displayed Administration Diagnostics The diagnostic tests Ping and Traceroute ...

Page 37: ... have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Administration Factory Defaults Factory Defaults Restore All Settings To reset the Router s settings to the defaults click this button and then follow the on screen instructions Any settings you have saved will be lost when the default settings are restored Administrat...

Page 38: ...n Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen For a DHCP connection select Release IP Address or Renew IP Address as appropriate to release or renew...

Page 39: ... to the Local Network screen click Close Status Wireless Network The Wireless Network screen displays information about your wireless network Status Wireless Network Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode is displayed NetworkName SSID The name of the wireless network which is also called the SSID is displayed Channe...

Page 40: ...the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the cable modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions The c...

Page 41: ...nternet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 7 95 x 1 34 x 6 3 202 x 34 x 160 mm Unit Weight 9 81 oz 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 32 to 104 F 0 to 40 C Storage Temp 4 to 140 F 20 to 60 ...

Page 42: ...rice of the software media EXCLUSIONS AND LIMITATIONS This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the pro...

Page 43: ...g provisions shall remain in full force and effect OBTAINING WARRANTY SERVICE If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purc...

Page 44: ...A is firmware limited to channels 1 through 11 Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimming pool WARNING Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning WARNING This product contains lead known to the State of California to cause cancer and birth defects or other reproducti...

Page 45: ...of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities Correct disposal and recycling will help prevent potential negative consequences to the environment and human health For more detailed information about the disposal of your old equipment please contact your local authorities waste disposal service or the shop w...

Page 46: ...tes You agree to all of the terms and conditions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a ...

Page 47: ...p The Technology and Documentation are licensed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically grant...

Page 48: ... product and or Software may become inaccessible There may be circumstances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgr...

Page 49: ...sts and fees including reasonable attorney fees arising from Your use of the Technology as well as from Your failure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com suppor...

Page 50: ... your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that wha...

Page 51: ... or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the...

Page 52: ... distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program...

Page 53: ...sh that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if...

Page 54: ... means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it ...

Page 55: ... code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by...

Page 56: ...equirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered...

Page 57: ...en in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License wh...

Page 58: ...ved from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXP...

Page 59: ...ude an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL E...

Page 60: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10012110NC JL ...

Reviews: