background image

Linksys E1000

Appendix E: Software End User License Agreement

46

Wireless-N Router

offensive or inappropriate .  Cisco makes no representations 
concerning any content contained in or accessed through 
the  Technology,  and  Cisco  will  not  be  responsible  or 
liable for the accuracy, copyright compliance, legality or 
decency of material contained in or accessed through the 
Technology .  

TO  THE  EXTENT  NOT  PROHIBITED  BY  APPLICABLE 
LAW,  ALL  IMPLIED  WARRANTIES  AND  CONDITIONS 
OF 

MERCHANTABILITY, 

SATISFACTORY 

QUALITY, 

NONINFRINGEMENT  OR  FITNESS  FOR  A  PARTICULAR 
PURPOSE  ARE  LIMITED  TO  THE  DURATION  OF  THE 
WARRANTY  PERIOD .  ALL  OTHER  EXPRESS  OR  IMPLIED 
CONDITIONS,  REPRESENTATIONS  AND  WARRANTIES  ARE 
DISCLAIMED . Some jurisdictions do not allow limitations 
on  how  long  an  implied  warranty  lasts,  so  the  above 
limitation  may  not  apply  to  You .  This  limited  warranty 
gives  You  specific  legal  rights,  and  You  may  also  have 
other rights which vary by jurisdiction .

Disclaimer of Liabilities.

  TO THE EXTENT NOT PROHIBITED 

BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE 
FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, 
INDIRECT,  CONSEQUENTIAL,  INCIDENTAL  OR  PUNITIVE 
DAMAGES,  REGARDLESS  OF  THE  THEORY  OF  LIABILITY 
(INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED 
TO  THE  USE  OF  OR  INABILITY  TO  USE  THE  PRODUCT, 
SOFTWARE  OR  ANY  SERVICES  PROVIDED  IN  RESPECT 
OF  SUCH  PRODUCT  OR  SOFTWARE,  EVEN  IF  CISCO  HAS 
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES .  
TO  THE  EXTENT  NOT  PROHIBITED  BY  APPLICABLE  LAW, 
IN  NO  EVENT  WILL  CISCO’S  LIABILITY  EXCEED  THE 
AMOUNT PAID BY YOU FOR THE PRODUCT .  IF YOU LIVE 
IN  THE  EUROPEAN  UNION,  REFERENCES  TO  “SPECIAL, 
INDIRECT,  CONSEQUENTIAL,  PUNITIVE  OR  INCIDENTAL 
DAMAGES”  SHALL  MEAN  ANY  LOSSES  WHICH  (i)  WERE 
NOT REASONABLY FORESEEABLE BY BOTH PARTIES, AND/
OR (ii) WERE KNOWN TO YOU BUT NOT TO US AND/OR (iii) 
WERE REASONABLY FORESEEABLE BY BOTH PARTIES BUT 
COULD  HAVE  BEEN  PREVENTED  BY  YOU  SUCH  AS,  FOR 
EXAMPLE  (BUT  WITHOUT  LIMITATION),  LOSSES  CAUSED 
BY VIRUSES, TROJANS OR OTHER MALICIOUS PROGRAMS, 
OR LOSS OF OR DAMAGE TO YOUR DATA .  THE FOREGOING 
LIMITATIONS  WILL  APPLY  WITH  RESPECT  TO  CISCO,  ITS 
DISTRIBUTORS, CONTRACTORS, AND AGENTS AND EVEN 
IF  ANY  WARRANTY  OR  REMEDY  PROVIDED  UNDER  THIS 
LIMITED  WARRANTY  FAILS  OF  ITS  ESSENTIAL  PURPOSE .  
NOTHING IN THIS SECTION SHALL LIMIT THE LIABILITY OF 
CISCO OR ITS DISTRIBUTORS, CONTRACTORS OR AGENTS 
IN RELATION TO DEATH OR PERSONAL INJURIES CAUSED 
BY THEIR NEGLIGENCE .

Indemnity.

    You  agree  that  Cisco  and  its  distributors, 

partners,  contractors  and  agents  shall  have  no  liability 
whatsoever  for  any  use  You  make  of  the  Technology . 
You  shall  indemnify  and  hold  harmless  Cisco  and  its 
distributors,  partners,  contractors  and  agents  from 
any  claims,  damages,  losses,  liabilities,  costs  and  fees 
(including reasonable attorney fees) arising from Your use 

of the Technology as well as from Your failure to comply 
with any term of this Agreement .

Technical  Support. 

  This  limited  warranty  is  neither 

a  service  nor  a  support  contract .    Information  about 
Cisco’s  current  technical  support  offerings  and  policies 
(including any fees for support services) can be found at 
www.myciscohome.com/support .  

Export. 

  Software,  including  technical  data,  may  be 

subject to U .S . export control laws and regulations and/or 
export or import regulations in other countries .  You agree 
to comply strictly with all such laws and regulations .

U.S. Government Users.

  The Software and Documentation 

qualify as “commercial items” as defined at 48 C .F .R . 2 .101 
and  48  C .F .R .  12 .212 .    All  Government  users  acquire  the 
Software  and  Documentation  with  only  those  rights 
herein that apply to non-governmental customers .  Use of 
either the Software or Documentation or both constitutes 
agreement  by  the  Government  that  the  Software  and 
Documentation  are  “commercial  computer  software” 
and  “commercial  computer  software  documentation,” 
and constitutes acceptance of the rights and restrictions 
herein .

General Terms.

  This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 
California, without reference to conflict of laws principles .  
The  United  Nations  Convention  on  Contracts  for  the 
International Sale of Goods will not apply . If any portion 
of this Agreement is found to be void or unenforceable, 
the  remaining  provisions  will  remain  in  full  force  and 
effect .  Each  party  recognizes  and  agrees  that  the 
warranty disclaimers and liability and remedy limitations 
in  this  Agreement  are  material  bargained  for  bases  of 
this  Agreement  and  that  they  are  reasonable  and  have 
been  taken  into  account  and  reflected  in  determining 
the  consideration  to  be  given  by  each  party  under  this 
Agreement  and  in  the  decision  by  each  party  to  enter 
into  this  Agreement .    Cisco’s  distributors,  contractors 
and  agents  are  intended  third  party  beneficiaries  under 
this  Agreement .    This  Agreement  constitutes  the  entire 
agreement  between  the  parties  with  respect  to  the 
Software  and  supersedes  any  conflicting  or  additional 
terms  contained  in  any  purchase  order  or  elsewhere .  
Except  as  set  forth  in  the  above  “License”  Section  or 
otherwise  expressly  provided  under  this  Agreement,  no 
amendment to or modification of this Agreement will be 
binding unless in writing and signed by Cisco and You .  

Linksys, Cisco and the Cisco Logo and other trademarks 
contained  in  the  Software  and  Documentation  are 
trademarks  or  registered  trademarks  of  Linksys,  Cisco, 
its  licensors  and  third  parties,  as  the  case  may  be .   You 
may  not  remove  or  alter  any  trademark,  trade  names, 
product  names,  logo,  copyright  or  other  proprietary 
notices,  legends,  symbols  or  labels  in  the  Software  and 
Documentation .    This  Agreement  does  not  authorize 

Summary of Contents for E1000

Page 1: ...Linksys E1000 Wireless N Router User Guide ...

Page 2: ...etup MAC Address Clone 18 Setup Advanced Routing 19 Wireless Basic Wireless Settings 19 Manual Setup 20 Wireless Wireless Security 21 Wireless Wireless MAC Filter 23 Wireless Advanced Wireless Settings 24 Security Firewall 25 Security VPN Passthrough 25 Access Restrictions Internet Access 26 Applications and Gaming Port Range Forwarding 28 Applications Gaming Port Range Triggering 28 Applications ...

Page 3: ...ent 41 FCC Radiation Exposure Statement 41 Safety Notices 41 Industry Canada Statement 41 Avis d Industrie Canada 41 Wireless Disclaimer 42 Avis de non responsabilité concernant les appareils sans fil 42 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 42 Appendix E Software End User License Agreement 43 Cisco Products 43 Sof...

Page 4: ...se the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup page 20 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection mad...

Page 5: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Page 6: ...s Install or run program General options Set up your Linksys Router Published by Cisco Consumer Products LLC Set AutoPlay defaults in Control Panel Open folder to view files using Windows Explorer Speed up my system using Windows ReadyBoost Set Up Your Linksys Router If you do not see this access setup on the CD directly To do so perform the following steps for your specific operating system Windo...

Page 7: ...up software is setting up the Router Please Wait 6 The installation is complete Click OK Installation is Complete NOTE If you have any problems during the installation process refer to the Frequently Asked Questions in the setup software or use a computer with an active Internet connection to visit www linksys com support Main Menu When Cisco Connect starts up the main menu appears Main Menu Statu...

Page 8: ... number of devices connected to the Router is displayed Add device To connect another computer or device to the Router click Add device and go to Computers and Other Devices page 6 Main Menu Parental Controls Parental controls restrict Internet access for up to five computers For the computers you select you can block or limit Internet access to specific times You can also block specific websites ...

Page 9: ...nect with the Easy Setup Key page 6 No I don t have an Easy Setup Key create a new one now If you want to create or update an Easy Setup Key select this option Click Next and go to Create or Update the Easy Setup Key page 7 I want to connect manually using my wireless settings If you want to connect manually without an Easy Setup Key select this option Click Next and go to Connect Manually page 7 ...

Page 10: ...r computers to the Router for more information refertoConnectwiththeEasySetupKey page 6 Click Close Easy Setup Key Has Been Updated Connect Manually 1 EntertheNetworkname SSID SecurityKey andSecurity Type settings on your wireless device SSID stands for Service Set Identifier To print this information click Print these settings Connecting a Device 2 After your device connects click Next 3 Enter a ...

Page 11: ...cret question and answer pair If you forget the password you can reset it by correctly answering the secret question Enter your question Answer Enter the answer to your secret question Click OK to save your settings 2 Select the computer whose parental controls you want to set up Then click OK Set Up Parental Controls For 3 The Parental controls main screen appears Parental Controls You have the f...

Page 12: ...a computer follow these instructions 1 Select the computer from the RestrictInternetaccesson list If the computer is not listed click Add to select the computer Parental Controls 2 The Block Internet access option offers the following Always To always block Internet access select this option Specific times To block Internet access during specific days and times select this option and set the sched...

Page 13: ...are sets up the password for the guest network To change the password click Change If you clicked Change the Change guest password screen appears Change Guest Password Enter a new guest password Enter a password of 4 32 characters Click Change to save your setting Total guests allowed By default 5 guests are allowed Internet access through the guest network Select the appropriate number of guests ...

Page 14: ...to the Router will need to be reconnected using the new name or password for more information refer to Computers and Other Devices page 6 If you clicked Change the Changing router name or password screen appears 1 To change the Router name or password click Yes Otherwise click No Changing Router Name or Password 2 Complete the following Router name Enter a name of 1 32 characters Password Enter a ...

Page 15: ...ssword to access the browser based utility Copy password To copy the password to the Clipboard click this option Advanced Settings Click OK to open the web browser and access the browser based utility For more information refer to How to Access the Browser Based Utility page 13 How to Exit Cisco Connect To exit Cisco Connect click Close on the main menu Main Menu How to Access Cisco Connect Window...

Page 16: ...reen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 32 Click OK to continue Login Screen NOTE You can also access the browser based utility through Cisco Connect For more in...

Page 17: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Page 18: ...has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select th...

Page 19: ...our local network Router IP IP Address The Router s IP address as seen by your network is displayed The default Router IP address is 192 168 1 1 Subnet Mask The Router s Subnet Mask as seen by your network is displayed URL Address To access the browser based utility you enter the Router s IP address or URL address The default is http my E1000 If you want to change the default enter a new URL addre...

Page 20: ...matically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will provide you with at least one DNS Server IP address If you wish to use another enter that IP address in one of these fields You can enter u...

Page 21: ...n is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Because it is dynamic it will change Status The status of th...

Page 22: ...te This Entry to delete a static route Enter Route Name Enter a name for the Route here using a maximum of 25 alphanumeric characters Destination LAN IP The Destination LAN Local Area Network IP is the address of the remote network or host to which you want to assign a static route Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion and which...

Page 23: ...eep the default Auto SSID Broadcast When wireless clients survey the local area for wireless networks to associate with they will detect the SSID broadcast by the Router To broadcast the Router s SSID keep the default Enabled If you do not want to broadcast the Router s SSID then select Disabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected...

Page 24: ... wireless security settings configure the security of your wireless network s The Router supports the following wireless security options WPA WPA2 Mixed Mode default WPA2 Personal WPA Personal WEP and RADIUS WPA stands for Wi Fi Protected Access WEP stands for Wireless Equivalent Privacy RADIUS stands for Remote Authentication Dial In User Service The default option is WPA WPA2 mixed mode which al...

Page 25: ...e WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually RADIUS This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router NOTE If you are using WEP encryption each device in your wireless network MUST use the same WEP encryption method and encryption key or else your wireless ...

Page 26: ...etwork Select this option to allow wireless access by MAC address This option is disabled by default MAC Address Filter List Wireless Client List Click this option to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Se...

Page 27: ...he rate of data transmission should be set depending on the speed of your wireless network Select from a range of transmission speeds or keep the default Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client N Transmission Rate The N Trans...

Page 28: ...ult Filter IDENT Port 113 The Filter IDENT Identification option keeps port 113 from being scanned by devices outside of your local network This option is enabled by default Disable it to allow port 113 to be scanned Web Filters Proxy Use of WAN proxy servers may compromise the Gateway s security Denying Proxy will disable access to any WAN proxy servers Select this option to enable proxy filterin...

Page 29: ...electing a policy from the drop down menu will display that policy s settings To delete a policy select that policy s number and click DeleteThisPolicy Toviewallthepolicies click Summary Summary The policies are listed with the following information No Policy Name Access Days Time and status Enabled To enable a policy select Enabled To delete a policy click Delete Click Save Settings to save your ...

Page 30: ...o block is not listed or you want to edit a service s settings enter the application s name in the Application Name field Enter its range in the Port Range fields Select its protocol from the Protocol drop down menu Then click Add To modify a service select it from the Applications list Change its Application Name Port Range and or Protocol setting Then click Modify To delete a service select it f...

Page 31: ...resses to the designated computers use the DHCP Reservation option on the BasicSetup screen refer to DHCPReservation page16 If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding For each entry complete the following Application Name Enter the name you wish to give the application Each name can be up to 12 characters S...

Page 32: ...you want to specify an IP address or range of IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by IP address select IP Address and enter the IP address in the field provided If you want to specify the DMZ host by MAC address select MAC Address and enter the MAC address in the field provided To retrieve this inform...

Page 33: ...s accessing the network For example if you want your gaming console to have higher priority accessing the Internet than your computer you can assign their priority levels using their respective MAC addresses Voice Device Voice devices require a higher priority level You can assign a higher priority level to voice devices using their respective MAC addresses Summary This lists the QoS entries you h...

Page 34: ...opriate priority High Medium Recommended Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Voice Device QoS Voice Device Enter a Name Enter a name for your voice device MAC Address Enter the MAC address of your voice device Priority Select the appropriate priority High Recommended Medium Normal or Low Click Add to save your changes Your new entry will appe...

Page 35: ...utside the local network select Enabled You must have the Remote Management option enabled as well Otherwise keep the default Disabled Allowed Remote IP Address If you want to be able to access the Router from any external IP address select Any IP Address If you want to specify an external IP address or range of IP addresses then select the second option and complete the fields provided Remote Man...

Page 36: ... traffic The Security log displays the login information for the browser based utility The DHCP Client Log displays the local DHCP server status information Click Save the Log to save this information to a file on your computer s hard drive Click Refresh to update the log Click Clear to clear all the information that is displayed Administration Diagnostics The diagnostic tests Ping and Traceroute ...

Page 37: ... have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Administration Factory Defaults Factory Defaults Restore All Settings To reset the Router s settings to the defaults click this button and then follow the on screen instructions Any settings you have saved will be lost when the default settings are restored Administrat...

Page 38: ...n Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen For a DHCP connection select Release IP Address or Renew IP Address as appropriate to release or renew...

Page 39: ... to the Local Network screen click Close Status Wireless Network The Wireless Network screen displays information about your wireless network Status Wireless Network Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode is displayed NetworkName SSID The name of the wireless network which is also called the SSID is displayed Channe...

Page 40: ...the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the cable modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions The c...

Page 41: ...nternet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 7 95 x 1 34 x 6 3 202 x 34 x 160 mm Unit Weight 9 81 oz 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 32 to 104 F 0 to 40 C Storage Temp 4 to 140 F 20 to 60 ...

Page 42: ...rice of the software media EXCLUSIONS AND LIMITATIONS This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the pro...

Page 43: ...g provisions shall remain in full force and effect OBTAINING WARRANTY SERVICE If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purc...

Page 44: ...A is firmware limited to channels 1 through 11 Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimming pool WARNING Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning WARNING This product contains lead known to the State of California to cause cancer and birth defects or other reproducti...

Page 45: ...of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities Correct disposal and recycling will help prevent potential negative consequences to the environment and human health For more detailed information about the disposal of your old equipment please contact your local authorities waste disposal service or the shop w...

Page 46: ...tes You agree to all of the terms and conditions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a ...

Page 47: ...p The Technology and Documentation are licensed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically grant...

Page 48: ... product and or Software may become inaccessible There may be circumstances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgr...

Page 49: ...sts and fees including reasonable attorney fees arising from Your use of the Technology as well as from Your failure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com suppor...

Page 50: ... your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that wha...

Page 51: ... or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the...

Page 52: ... distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program...

Page 53: ...sh that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if...

Page 54: ... means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it ...

Page 55: ... code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by...

Page 56: ...equirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered...

Page 57: ...en in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License wh...

Page 58: ...ved from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXP...

Page 59: ...ude an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL E...

Page 60: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10012110NC JL ...

Reviews: