background image

49

Appendix E

Software License Agreement

RangePlus Wireless Router

Thus,  it  is  not  the  intent  of  this  section  to  claim 
rights or contest your rights to work written entirely 
by you; rather, the intent is to exercise the right to 
control the distribution of derivative or collective 
works based on the Library.

In  addition,  mere  aggregation  of  another  work 
not based on the Library with the Library (or with 
a  work  based  on  the  Library)  on  a  volume  of  a 
storage or distribution medium does not bring the 
other work under the scope of this License.

You may opt to apply the terms of the ordinary GNU 

3. 

General  Public  License  instead  of  this  License  to  a 
given copy of the Library. To do this, you must alter all 
the notices that refer to this License, so that they refer 
to  the  ordinary  GNU  General  Public  License,  version 
2, instead of to this License. (If a newer version than 
version 2 of the ordinary GNU General Public License 
has  appeared,  then  you  can  specify  that  version 
instead if you wish.) Do not make any other change in 
these notices.
Once  this  change  is  made  in  a  given  copy,  it  is 
irreversible for that copy, so the ordinary GNU General 
Public  License  applies  to  all  subsequent  copies  and 
derivative works made from that copy.

This option is useful when you wish to copy part of the 
code of the Library into a program that is not a library.

You may copy and distribute the Library (or a portion 

4. 

or derivative of it, under Section 2) in object code or 
executable  form  under  the  terms  of  Sections  1  and 
2  above  provided  that  you  accompany  it  with  the 
complete  corresponding  machine-readable  source 
code,  which  must  be  distributed  under  the  terms  of 
Sections 1 and 2 above on a medium customarily used 
for software interchange.
If  distribution  of  object  code  is  made  by  offering 
access to copy from a designated place, then offering 
equivalent  access  to  copy  the  source  code  from  the 
same  place  satisfies  the  requirement  to  distribute 
the  source  code,  even  though  third  parties  are  not 
compelled  to  copy  the  source  along  with  the  object 
code.

A program that contains no derivative of any portion 

5. 

of the Library, but is designed to work with the Library 
by being compiled or linked with it, is called a “work 
that uses the Library”. Such a work, in isolation, is not 
a  derivative  work  of  the  Library,  and  therefore  falls 
outside the scope of this License.
However,  linking  a “work  that  uses  the  Library”  with 
the  Library  creates  an  executable  that  is  a  derivative 
of  the  Library  (because  it  contains  portions  of  the 
Library), rather than a “work that uses the library”. The 
executable is therefore covered by this License. Section 
6 states terms for distribution of such executables.

When a “work that uses the Library” uses material from 
a header file that is part of the Library, the object code 
for the work may be a derivative work of the Library 
even  though  the  source  code  is  not. Whether  this  is 
true is especially significant if the work can be linked 
without the Library, or if the work is itself a library. The 
threshold for this to be true is not precisely defined by 
law.

If such an object file uses only numerical parameters, 
data structure layouts and accessors, and small macros 
and small inline functions (ten lines or less in length), 
then the use of the object file is unrestricted, regardless 
of whether it is legally a derivative work. (Executables 
containing this object code plus portions of the Library 
will still fall under Section 6.)

Otherwise, if the work is a derivative of the Library, you 
may distribute the object code for the work under the 
terms  of  Section  6.  Any  executables  containing  that 
work also fall under Section 6, whether or not they are 
linked directly with the Library itself.

As an exception to the Sections above, you may also 

6. 

combine or link a “work that uses the Library” with the 
Library to produce a work containing portions of the 
Library, and distribute that work under terms of your 
choice,  provided  that  the  terms  permit  modification 
of  the  work  for  the  customer’s  own  use  and  reverse 
engineering for debugging such modifications.
You  must  give  prominent  notice  with  each  copy  of 
the  work  that  the  Library  is  used  in  it  and  that  the 
Library  and  its  use  are  covered  by  this  License.  You 
must supply a copy of this License. If the work during 
execution displays copyright notices, you must include 
the  copyright  notice  for  the  Library  among  them,  as 
well as a reference directing the user to the copy of this 
License. Also, you must do one of these things:

Accompany  the  work  with  the  complete 

a) 

corresponding  machine-readable  source  code 
for  the  Library  including  whatever  changes  were 
used  in  the  work  (which  must  be  distributed 
under  Sections  1  and  2  above);  and,  if  the  work 
is  an  executable  linked  with  the  Library,  with  the 
complete  machine-readable  “work  that  uses  the 
Library”, as object code and/or source code, so that 
the  user  can  modify  the  Library  and  then  relink 
to produce a modified executable containing the 
modified  Library.  (It  is  understood  that  the  user 
who changes the contents of definitions files in the 
Library will not necessarily be able to recompile the 
application to use the modified definitions.)

Summary of Contents for RangePlus WRT110

Page 1: ...USER GUIDE RangePlus Wireless Router Model WRT110 EU ...

Page 2: ...ress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secur...

Page 3: ...ecurity VPN Passthrough 18 Access Restrictions Internet Access Policy 18 Applications and Gaming Single Port Forwarding 20 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Administration Diagnostics 25 Administration Factory Defaults 26 Admin...

Page 4: ...999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksys com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 38 Appendix E Software License Agreement 42 Software in Linksys Products 42 S...

Page 5: ... client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is enabled If the LED is flash...

Page 6: ...ermine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with the two sc...

Page 7: ...e MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each ...

Page 8: ...P address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the Web based utility use the default password admin You can set a new password from the Administration tab s Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears ...

Page 9: ...iod If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol PPTP...

Page 10: ...ive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet conne...

Page 11: ...n IP address enter the client s name in the Enter Client Name field Enter the IP address you want it to have in the Assign IP Address field Enter its MAC address in the To This MAC Address field Then click Add Clients Already Reserved A list of DHCP clients and their fixed local IP addresses will be displayed at the bottom of the screen If you want to remove a client from this list click Remove Cl...

Page 12: ...rver or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default setting Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO then sel...

Page 13: ...ork Static Routing sets up a fixed route to another network destination Setup Advanced Routing Advanced Routing NAT Enabled Disabled IfthisRouterishostingyournetwork s connection to the Internet keep the default Enabled If another router exists on your network select Disabled When the NAT setting is disabled dynamic routing will be enabled Dynamic Routing RIP Enabled Disabled This feature enables ...

Page 14: ...r added security you should change the default SSID linksys to a unique name Radio Band For best performance in a network using Wireless N Wireless G and Wireless B devices keep the default Auto 20 40MHz Channel For Wireless G and Wireless B networking only select Standard 20MHz Channel NOTE If you select Auto 20 40MHz Channel for the Radio Band setting then Wireless N can usetwochannels aprimaryo...

Page 15: ...IP and AES with dynamic encryption keys Select the type of algorithm AES or AES or TKIP The default is AES or TKIP Passphrase Enter a Passphrase of 8 63 characters Key Renewal Enter a Key Renewal period which instructs theRouterhowoftenitshouldchangetheencryptionkeys The default Group Key Renewal period is 3600 seconds WPA Enterprise This option features WPA used in coordination with a RADIUS serv...

Page 16: ...se the same WEP encryption method and encryption key or else your wireless network will not function properly RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default value is 1812 Shared Secret Enter the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64bits 10hexdigits or104 128bits 26he...

Page 17: ...eless Client List Click this to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List Then click Add To retrieve the most ...

Page 18: ...test possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default is Auto CTS Protection Mode The Router will automatically use CTS Clear To Send Protection Mode when your Wireless N and Wireless G products are experiencing severe problems and are not able to transmit to the Router in an...

Page 19: ...is feature to enable Java filtering Deselect the feature to allow Java usage ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language Select this feature to enable ActiveX filtering Deselect the feature to allow ActiveX usage Cookies A cookie is data stored on your computer and used by...

Page 20: ...Access Policy screen click Close Summary Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and select Enabled To create a policy follow steps 1 11 Repeat these steps to create additional policies one at a time Select a number from the 1 Access Policy drop down menu Enter a Policy Name in the field provided 2 To enable this policy select 3 E...

Page 21: ...tomize port services for common applications on this screen When users send these types of requests to your network via the Internet the Router will forward those requests to the appropriate servers computers Before using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation feature on the Basic Setup screen Applications and Gaming Single Port Forwardi...

Page 22: ...abled to enable port forwarding for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications Gaming Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers The IP address of the computer that sends the matching data is remembered by the Router so that whe...

Page 23: ... To retrieve the most up to date information click Refresh To exit this screen and return to the DMZ screen click Close Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencin...

Page 24: ...tails on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Online Games QoS Online Games Games Select the appropriate game Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your cha...

Page 25: ...a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s web based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To permit remote...

Page 26: ...can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disabled To monitor traffic between the network and the Internet select Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client...

Page 27: ...lick Close to return to the Diagnostics screen Diagnostics Traceroute Administration Factory Defaults The Administration Factory Defaults screen allows you to restore the Router s configuration to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures On...

Page 28: ...f required by your ISP this was entered on the Basic Setup screen Domain Name If required by your ISP this was entered on the Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Basic Setup screen Click Refresh to update the on screen information Status Local ...

Page 29: ... information about your wireless network Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed here Mode Displayed here is the wireless mode used by the network Network Name SSID Displayed here is the name of the wireless network which is also called the SSID Radio Band Shown here is the Radio Band setting selected on the Basic Wireless ...

Page 30: ...nsert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Options Click...

Page 31: ...nas 2 Detachable No RF Pwr EIRP in dBm 16 5 dBm Antenna Gain in dBi 1 8 dBi UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits 256 Bits Environmental Dimensions 148 x 36 x 170 mm Weight 334 g Power 12V 1A Certification FCC IC 03 Wi Fi 802 11b g WPA2 WMM O...

Page 32: ...t or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO ...

Page 33: ...ed under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction ...

Page 34: ...pparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and 1 This device must accept any interference including 2 interference that may cause undesired operation of the device To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than ...

Page 35: ...er adverse conditions Avis de non responsabilité concernant les appareils sans fil Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802 11 Les performances réelles peuvent varier notamment en fonction de la capacité du réseau sans fil du débit de la transmission de données de la portée et de la couverture Les performances dépendent de facteurs co...

Page 36: ...enkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követel...

Page 37: ... dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesi menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the EU a...

Page 38: ...um output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the st...

Page 39: ...nice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady S...

Page 40: ...ποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménag...

Page 41: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Page 42: ... prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s tem ...

Page 43: ... ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOT...

Page 44: ... fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING...

Page 45: ...o prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed un...

Page 46: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Page 47: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Page 48: ...or the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effect...

Page 49: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 50: ...rary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Wheth...

Page 51: ... modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such parties r...

Page 52: ...nerally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PA...

Page 53: ...yptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for comme...

Page 54: ...VER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution l...

Reviews: