background image

25

Appendix E

Software License Agreement

Wireless-N Ethernet Bridge with Dual-Band

If the modified program normally reads commands 

c. 

interactively  when  run,  you  must  cause  it,  when 

started running for such interactive use in the most 

ordinary way, to print or display an announcement 

including  an  appropriate  copyright  notice  and 

a notice that there is no warranty (or else, saying 

that  you  provide  a  warranty)  and  that  users  may 

redistribute  the  program  under  these  conditions, 

and  telling  the  user  how  to  view  a  copy  of 

this  License.  (Exception:  if  the  Program  itself  is 

interactive  but  does  not  normally  print  such  an 

announcement, your work based on the Program 

is not required to print an announcement.) 

These  requirements  apply  to  the  modified  work  as 

a  whole.  If  identifiable  sections  of  that  work  are  not 

derived  from  the  Program,  and  can  be  reasonably 

considered  independent  and  separate  works  in 

themselves,  then  this  License,  and  its  terms,  do  not 

apply to those sections when you distribute them as 

separate  works.  But  when  you  distribute  the  same 

sections as part of a whole which is a work based on 

the Program, the distribution of the whole must be on 

the terms of this License, whose permissions for other 

licensees extend to the entire whole, and thus to each 

and every part regardless of who wrote it. 
Thus, it is not the intent of this section to claim rights 

or contest your rights to work written entirely by you; 

rather, the intent is to exercise the right to control the 

distribution of derivative or collective works based on 

the Program. 
In  addition,  mere  aggregation  of  another  work  not 

based  on  the  Program  with  the  Program  (or  with  a 

work based on the Program) on a volume of a storage 

or distribution medium does not bring the other work 

under the scope of this License. 
You  may  copy  and  distribute  the  Program  (or  a 

3. 

work based on it, under Section 2) in object code or 

executable form under the terms of Sections 1 and 2 

above provided that you also do one of the following: 

Accompany  it  with  the  complete  corresponding 

a. 

machine-readable  source  code,  which  must  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 
Accompany it with a written offer, valid for at least 

b. 

three  years,  to  give  any  third  party,  for  a  charge 

no  more  than  your  cost  of  physically  performing 

source distribution, a complete machine-readable 

copy  of  the  corresponding  source  code,  to  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 

Accompany it with the information you received as 

c. 

to the offer to distribute corresponding source code. 

(This alternative is allowed only for noncommercial 

distribution and only if you received the program 

in  object  code  or  executable  form  with  such  an 

offer, in accord with Subsection b above.) 

The source code for a work means the preferred form 

of  the  work  for  making  modifications  to  it.  For  an 

executable  work,  complete  source  code  means  all 

the source code for all modules it contains, plus any 

associated  interface  definition  files,  plus  the  scripts 

used  to  control  compilation  and  installation  of  the 

executable. However, as a special exception, the source 

code  distributed  need  not  include  anything  that  is 

normally distributed (in either source or binary form) 

with the major components (compiler, kernel, and so 

on) of the operating system on which the executable 

runs,  unless  that  component  itself  accompanies  the 

executable. 
If  distribution  of  executable  or  object  code  is  made 

by  offering  access  to  copy  from  a  designated  place, 

then  offering  equivalent  access  to  copy  the  source 

code  from  the  same  place  counts  as  distribution  of 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code. 
You  may  not  copy,  modify,  sublicense,  or  distribute 

4. 

the  Program  except  as  expressly  provided  under 

this License. Any attempt otherwise to copy, modify, 

sublicense or distribute the Program is void, and will 

automatically terminate your rights under this License. 

However, parties who have received copies, or rights, 

from you under this License will not have their licenses 

terminated  so  long  as  such  parties  remain  in  full 

compliance. 
You are not required to accept this License, since you 

5. 

have not signed it. However, nothing else grants you 

permission to modify or distribute the Program or its 

derivative works. These actions are prohibited by law if 

you do not accept this License. Therefore, by modifying 

or distributing the Program (or any work based on the 

Program), you indicate your acceptance of this License 

to do so, and all its terms and conditions for copying, 

distributing or modifying the Program or works based 

on it. 
Each time you redistribute the Program (or any work 

6. 

based  on  the  Program),  the  recipient  automatically 

receives  a  license  from  the  original  licensor  to  copy, 

distribute  or  modify  the  Program  subject  to  these 

terms and conditions. You may not impose any further 

restrictions  on  the  recipients’  exercise  of  the  rights 

granted herein. You are not responsible for enforcing 

compliance by third parties to this License. 
If, as a consequence of a court judgment or allegation 

7. 

of  patent  infringement  or  for  any  other  reason  (not 

Summary of Contents for WET610N - Wireless-N EN Bridge

Page 1: ...USER GUIDE Wireless N Ethernet Bridge with Dual Band Model WET610N...

Page 2: ...ite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an olde...

Page 3: ...ss 11 Status About 11 Appendix A Troubleshooting 12 Appendix B Specifications 13 Appendix C Warranty Information 14 Limited Warranty 14 Exclusions and Limitations 14 Obtaining Warranty Service 14 Tech...

Page 4: ...Fi Protected Setup run the SetupWizard or refer to Wireless Basic Wireless Settings page 3 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It li...

Page 5: ...ss 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Page 6: ...ect a computer to the Bridge using an Ethernet connection to access the web based utility You will need to configure the Ethernet connection on the computer with a static IP address and subnet mask Th...

Page 7: ...to use wireless security keep the default Disabled NOTE Remember that each device in your wireless network MUST use the same security methodandpassphrase key orelsethewireless devices will not be abl...

Page 8: ...ed Setup Congratulations Method 1 Use this method if your router has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi...

Page 9: ...vey Wireless Security WPA Network Name SSID The name of the network you selected is automatically displayed Security Mode WPA Personal is automatically displayed Encryption WPA supports the TKIP encry...

Page 10: ...tion Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemax...

Page 11: ...no frame exchanges within this duration by the Block Acknowledgement ACK agreement The range is 0 to 65535 ms The default is 0 which disables the timeout Aggregation Window Size This option defines th...

Page 12: ...om the receiving device To use the RTS CTS option keep the default RTS CTS The None option may cause collisions between HT and legacy packets To use the None option select None To use the CTS2Self opt...

Page 13: ...sable the setting Keep the default Enabled to allow wireless access to the Bridge s web based utility or select Disabled to block wireless access to the utility Backup and Restore Backup To back up th...

Page 14: ...twork Name SSID The wireless network name or SSID is displayed BSSID The wireless MAC address of the connected wireless router or access point is displayed Radio Band The radio band of your wireless n...

Page 15: ...red Ethernet device will not communicate with another wireless enabled device such as a computer or printer Check the following Make sure the wireless enabled device is on the same wireless network as...

Page 16: ...dBm typical 130 Mbps HT20 270 Mbps HT40 Receive Sensitivity 802 11a 72 dBm typical 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm ty...

Page 17: ...This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this pr...

Page 18: ...custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This...

Page 19: ...umented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter This equipment should be installed and operated with minimum distance 2...

Page 20: ...con u pour fonctionner avec une 2 antenne ayant un gain maximal de 1 58 dBi 2 4 GHz et de 1 45 dBi 5 GHz Les antennes ayant un gain plus lev sont strictement interdites par Industrie Canada L imp danc...

Page 21: ...dace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho...

Page 22: ...it de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L liminat...

Page 23: ...einek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederl...

Page 24: ...pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaob...

Page 25: ...KSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSEN...

Page 26: ...if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Discl...

Page 27: ...etary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification f...

Page 28: ...ly used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution an...

Page 29: ...er in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later versi...

Page 30: ...and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others F...

Page 31: ...e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 32: ...ource code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely def...

Page 33: ...ties remain in full compliance You are not required to accept this License since you 9 have not signed it However nothing else grants you permission to modify or distribute the Library or its derivati...

Page 34: ...RY SERVICING REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 16 OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY A...

Page 35: ...he holder is Tim Hudson tjh cryptsoft com Copyright remains EricYoung s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be gi...

Reviews: