background image

27

Appendix E

Software License Agreement

Wireless-N Ethernet Bridge with Dual-Band

Copyright (C) 1991, 1999 Free Software Foundation, Inc. 
51  Franklin  Street,  Fifth  Floor,  Boston,  MA  02110-1301, 

USA
Everyone  is  permitted  to  copy  and  distribute  verbatim 

copies  of  this  license  document,  but  changing  it  is  not 

allowed.
[This is the first released version of the Lesser GPL. It also 

counts as the successor of the GNU Library Public License, 

version 2, hence the version number 2.1.]

Preamble

The licenses for most software are designed to take away 

your freedom to share and change it. By contrast, the GNU 

General  Public  Licenses  are  intended  to  guarantee  your 

freedom  to  share  and  change  free  software—to  make 

sure the software is free for all its users.
This license, the Lesser General Public License, applies to 

some specially designated software packages—typically 

libraries—of  the  Free  Software  Foundation  and  other 

authors who decide to use it. You can use it too, but we 

suggest you first think carefully about whether this license 

or the ordinary General Public License is the better strategy 

to use in any particular case, based on the explanations 

below.
When  we  speak  of  free  software,  we  are  referring  to 

freedom  of  use,  not  price.  Our  General  Public  Licenses 

are  designed  to  make  sure  that  you  have  the  freedom 

to distribute copies of free software (and charge for this 

service if you wish); that you receive source code or can 

get it if you want it; that you can change the software and 

use  pieces  of  it  in  new  free  programs;  and  that  you  are 

informed that you can do these things.
To protect your rights, we need to make restrictions that 

forbid distributors to deny you these rights or to ask you 

to  surrender  these  rights. These  restrictions  translate  to 

certain responsibilities for you if you distribute copies of 

the library or if you modify it.
For  example,  if  you  distribute  copies  of  the  library, 

whether gratis or for a fee, you must give the recipients 

all the rights that we gave you. You must make sure that 

they, too, receive or can get the source code. If you link 

other code with the library, you must provide complete 

object files to the recipients, so that they can relink them 

with the library after making changes to the library and 

recompiling it. And you must show them these terms so 

they know their rights.
We  protect  your  rights  with  a  two-step  method:  (1)  we 

copyright  the  library,  and  (2)  we  offer  you  this  license, 

which gives you legal permission to copy, distribute and/

or modify the library.
To protect each distributor, we want to make it very clear 

that there is no warranty for the free library. Also, if the 

library  is  modified  by  someone  else  and  passed  on,  the 

recipients  should  know  that  what  they  have  is  not  the 

original  version,  so  that  the  original  author’s  reputation 

will not be affected by problems that might be introduced 

by others.
Finally,  software  patents  pose  a  constant  threat  to  the 

existence  of  any  free  program.  We  wish  to  make  sure 

that  a  company  cannot  effectively  restrict  the  users  of 

a  free  program  by  obtaining  a  restrictive  license  from  a 

patent holder. Therefore, we insist that any patent license 

obtained  for  a  version  of  the  library  must  be  consistent 

with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered 

by the ordinary GNU General Public License. This license, 

the GNU Lesser General Public License, applies to certain 

designated  libraries,  and  is  quite  different  from  the 

ordinary  General  Public  License.  We  use  this  license  for 

certain libraries in order to permit linking those libraries 

into non-free programs.
When  a  program  is  linked  with  a  library,  whether 

statically  or  using  a  shared  library,  the  combination  of 

the two is legally speaking a combined work, a derivative 

of  the  original  library.  The  ordinary  General  Public 

License  therefore  permits  such  linking  only  if  the  entire 

combination fits its criteria of freedom. The Lesser General 

Public License permits more lax criteria for linking other 

code with the library.
We  call  this  license  the “Lesser”  General  Public  License 

because it does Less to protect the user’s freedom than 

the  ordinary  General  Public  License.  It  also  provides 

other free software developers Less of an advantage over 

competing  non-free  programs. These  disadvantages  are 

the  reason  we  use  the  ordinary  General  Public  License 

for  many  libraries.  However,  the  Lesser  license  provides 

advantages in certain special circumstances.
For  example,  on  rare  occasions,  there  may  be  a  special 

need  to  encourage  the  widest  possible  use  of  a  certain 

library, so that it becomes a de-facto standard. To achieve 

this, non-free programs must be allowed to use the library. 

A more frequent case is that a free library does the same 

job as widely used non-free libraries. In this case, there is 

little to gain by limiting the free library to free software 

only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-

free programs enables a greater number of people to use 

a large body of free software. For example, permission to 

use the GNU C Library in non-free programs enables many 

more people to use the whole GNU operating system, as 

well as its variant, the GNU/Linux operating system.
Although  the  Lesser  General  Public  License  is  Less 

protective of the users’ freedom, it does ensure that the 

user of a program that is linked with the Library has the 

freedom and the wherewithal to run that program using a 

modified version of the Library.

Summary of Contents for WET610N - Wireless-N EN Bridge

Page 1: ...USER GUIDE Wireless N Ethernet Bridge with Dual Band Model WET610N...

Page 2: ...ite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an olde...

Page 3: ...ss 11 Status About 11 Appendix A Troubleshooting 12 Appendix B Specifications 13 Appendix C Warranty Information 14 Limited Warranty 14 Exclusions and Limitations 14 Obtaining Warranty Service 14 Tech...

Page 4: ...Fi Protected Setup run the SetupWizard or refer to Wireless Basic Wireless Settings page 3 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It li...

Page 5: ...ss 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Page 6: ...ect a computer to the Bridge using an Ethernet connection to access the web based utility You will need to configure the Ethernet connection on the computer with a static IP address and subnet mask Th...

Page 7: ...to use wireless security keep the default Disabled NOTE Remember that each device in your wireless network MUST use the same security methodandpassphrase key orelsethewireless devices will not be abl...

Page 8: ...ed Setup Congratulations Method 1 Use this method if your router has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi...

Page 9: ...vey Wireless Security WPA Network Name SSID The name of the network you selected is automatically displayed Security Mode WPA Personal is automatically displayed Encryption WPA supports the TKIP encry...

Page 10: ...tion Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemax...

Page 11: ...no frame exchanges within this duration by the Block Acknowledgement ACK agreement The range is 0 to 65535 ms The default is 0 which disables the timeout Aggregation Window Size This option defines th...

Page 12: ...om the receiving device To use the RTS CTS option keep the default RTS CTS The None option may cause collisions between HT and legacy packets To use the None option select None To use the CTS2Self opt...

Page 13: ...sable the setting Keep the default Enabled to allow wireless access to the Bridge s web based utility or select Disabled to block wireless access to the utility Backup and Restore Backup To back up th...

Page 14: ...twork Name SSID The wireless network name or SSID is displayed BSSID The wireless MAC address of the connected wireless router or access point is displayed Radio Band The radio band of your wireless n...

Page 15: ...red Ethernet device will not communicate with another wireless enabled device such as a computer or printer Check the following Make sure the wireless enabled device is on the same wireless network as...

Page 16: ...dBm typical 130 Mbps HT20 270 Mbps HT40 Receive Sensitivity 802 11a 72 dBm typical 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm ty...

Page 17: ...This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this pr...

Page 18: ...custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This...

Page 19: ...umented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter This equipment should be installed and operated with minimum distance 2...

Page 20: ...con u pour fonctionner avec une 2 antenne ayant un gain maximal de 1 58 dBi 2 4 GHz et de 1 45 dBi 5 GHz Les antennes ayant un gain plus lev sont strictement interdites par Industrie Canada L imp danc...

Page 21: ...dace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho...

Page 22: ...it de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L liminat...

Page 23: ...einek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederl...

Page 24: ...pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaob...

Page 25: ...KSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSEN...

Page 26: ...if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Discl...

Page 27: ...etary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification f...

Page 28: ...ly used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution an...

Page 29: ...er in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later versi...

Page 30: ...and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others F...

Page 31: ...e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 32: ...ource code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely def...

Page 33: ...ties remain in full compliance You are not required to accept this License since you 9 have not signed it However nothing else grants you permission to modify or distribute the Library or its derivati...

Page 34: ...RY SERVICING REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 16 OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY A...

Page 35: ...he holder is Tim Hudson tjh cryptsoft com Copyright remains EricYoung s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be gi...

Reviews: