background image

29

Appendix E

Software License Agreement

Wireless-N Ethernet Bridge with Dual-Band

a  work  based  on  the  Library)  on  a  volume  of  a 

storage or distribution medium does not bring the 

other work under the scope of this License.

You may opt to apply the terms of the ordinary GNU 

3. 

General  Public  License  instead  of  this  License  to  a 

given copy of the Library. To do this, you must alter all 

the notices that refer to this License, so that they refer 

to  the  ordinary  GNU  General  Public  License,  version 

2, instead of to this License. (If a newer version than 

version 2 of the ordinary GNU General Public License 

has  appeared,  then  you  can  specify  that  version 

instead if you wish.) Do not make any other change in 

these notices.
Once  this  change  is  made  in  a  given  copy,  it  is 

irreversible for that copy, so the ordinary GNU General 

Public  License  applies  to  all  subsequent  copies  and 

derivative works made from that copy.
This option is useful when you wish to copy part of the 

code of the Library into a program that is not a library.
You may copy and distribute the Library (or a portion 

4. 

or derivative of it, under Section 2) in object code or 

executable  form  under  the  terms  of  Sections  1  and 

2  above  provided  that  you  accompany  it  with  the 

complete  corresponding  machine-readable  source 

code,  which  must  be  distributed  under  the  terms  of 

Sections 1 and 2 above on a medium customarily used 

for software interchange.
If  distribution  of  object  code  is  made  by  offering 

access to copy from a designated place, then offering 

equivalent  access  to  copy  the  source  code  from  the 

same  place  satisfies  the  requirement  to  distribute 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code.
A program that contains no derivative of any portion 

5. 

of the Library, but is designed to work with the Library 

by being compiled or linked with it, is called a “work 

that uses the Library”. Such a work, in isolation, is not 

a  derivative  work  of  the  Library,  and  therefore  falls 

outside the scope of this License.
However,  linking  a “work  that  uses  the  Library”  with 

the Library creates an executable that is a derivative 

of  the  Library  (because  it  contains  portions  of  the 

Library), rather than a “work that uses the library”. The 

executable is therefore covered by this License. Section 

6 states terms for distribution of such executables.
When a “work that uses the Library” uses material from 

a header file that is part of the Library, the object code 

for the work may be a derivative work of the Library 

even  though  the  source  code  is  not. Whether  this  is 

true is especially significant if the work can be linked 

without the Library, or if the work is itself a library. The 

threshold for this to be true is not precisely defined by 

law.

If such an object file uses only numerical parameters, 

data structure layouts and accessors, and small macros 

and small inline functions (ten lines or less in length), 

then the use of the object file is unrestricted, regardless 

of whether it is legally a derivative work. (Executables 

containing this object code plus portions of the Library 

will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you 

may distribute the object code for the work under the 

terms  of  Section  6.  Any  executables  containing  that 

work also fall under Section 6, whether or not they are 

linked directly with the Library itself.
As an exception to the Sections above, you may also 

6. 

combine or link a “work that uses the Library” with the 

Library to produce a work containing portions of the 

Library, and distribute that work under terms of your 

choice,  provided  that  the  terms  permit  modification 

of  the  work  for  the  customer’s  own  use  and  reverse 

engineering for debugging such modifications.
You  must  give  prominent  notice  with  each  copy  of 

the  work  that  the  Library  is  used  in  it  and  that  the 

Library  and  its  use  are  covered  by  this  License.  You 

must supply a copy of this License. If the work during 

execution displays copyright notices, you must include 

the copyright notice for the Library among them, as 

well as a reference directing the user to the copy of this 

License. Also, you must do one of these things:

Accompany  the  work  with  the  complete 

a) 

corresponding  machine-readable  source  code 

for  the  Library  including  whatever  changes  were 

used  in  the  work  (which  must  be  distributed 

under  Sections  1  and  2  above);  and,  if  the  work 

is an executable linked with the Library, with the 

complete  machine-readable  “work  that  uses  the 

Library”, as object code and/or source code, so that 

the  user  can  modify  the  Library  and  then  relink 

to produce a modified executable containing the 

modified  Library.  (It  is  understood  that  the  user 

who changes the contents of definitions files in the 

Library will not necessarily be able to recompile the 

application to use the modified definitions.)
Use a suitable shared library mechanism for linking 

b) 

with the Library. A suitable mechanism is one that 

(1)  uses  at  run  time  a  copy  of  the  library  already 

present on the user’s computer system, rather than 

copying library functions into the executable, and 

(2) will operate properly with a modified version of 

the  library,  if  the  user  installs  one,  as  long  as  the 

modified version is interface-compatible with the 

version that the work was made with.

Summary of Contents for WET610N - Wireless-N EN Bridge

Page 1: ...USER GUIDE Wireless N Ethernet Bridge with Dual Band Model WET610N...

Page 2: ...ite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an olde...

Page 3: ...ss 11 Status About 11 Appendix A Troubleshooting 12 Appendix B Specifications 13 Appendix C Warranty Information 14 Limited Warranty 14 Exclusions and Limitations 14 Obtaining Warranty Service 14 Tech...

Page 4: ...Fi Protected Setup run the SetupWizard or refer to Wireless Basic Wireless Settings page 3 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It li...

Page 5: ...ss 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Page 6: ...ect a computer to the Bridge using an Ethernet connection to access the web based utility You will need to configure the Ethernet connection on the computer with a static IP address and subnet mask Th...

Page 7: ...to use wireless security keep the default Disabled NOTE Remember that each device in your wireless network MUST use the same security methodandpassphrase key orelsethewireless devices will not be abl...

Page 8: ...ed Setup Congratulations Method 1 Use this method if your router has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi...

Page 9: ...vey Wireless Security WPA Network Name SSID The name of the network you selected is automatically displayed Security Mode WPA Personal is automatically displayed Encryption WPA supports the TKIP encry...

Page 10: ...tion Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemax...

Page 11: ...no frame exchanges within this duration by the Block Acknowledgement ACK agreement The range is 0 to 65535 ms The default is 0 which disables the timeout Aggregation Window Size This option defines th...

Page 12: ...om the receiving device To use the RTS CTS option keep the default RTS CTS The None option may cause collisions between HT and legacy packets To use the None option select None To use the CTS2Self opt...

Page 13: ...sable the setting Keep the default Enabled to allow wireless access to the Bridge s web based utility or select Disabled to block wireless access to the utility Backup and Restore Backup To back up th...

Page 14: ...twork Name SSID The wireless network name or SSID is displayed BSSID The wireless MAC address of the connected wireless router or access point is displayed Radio Band The radio band of your wireless n...

Page 15: ...red Ethernet device will not communicate with another wireless enabled device such as a computer or printer Check the following Make sure the wireless enabled device is on the same wireless network as...

Page 16: ...dBm typical 130 Mbps HT20 270 Mbps HT40 Receive Sensitivity 802 11a 72 dBm typical 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm ty...

Page 17: ...This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this pr...

Page 18: ...custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This...

Page 19: ...umented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter This equipment should be installed and operated with minimum distance 2...

Page 20: ...con u pour fonctionner avec une 2 antenne ayant un gain maximal de 1 58 dBi 2 4 GHz et de 1 45 dBi 5 GHz Les antennes ayant un gain plus lev sont strictement interdites par Industrie Canada L imp danc...

Page 21: ...dace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho...

Page 22: ...it de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L liminat...

Page 23: ...einek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederl...

Page 24: ...pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaob...

Page 25: ...KSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSEN...

Page 26: ...if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Discl...

Page 27: ...etary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification f...

Page 28: ...ly used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution an...

Page 29: ...er in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later versi...

Page 30: ...and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others F...

Page 31: ...e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 32: ...ource code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely def...

Page 33: ...ties remain in full compliance You are not required to accept this License since you 9 have not signed it However nothing else grants you permission to modify or distribute the Library or its derivati...

Page 34: ...RY SERVICING REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 16 OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY A...

Page 35: ...he holder is Tim Hudson tjh cryptsoft com Copyright remains EricYoung s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be gi...

Reviews: