background image

32

Appendix E

Software License Agreement

Wireless-N Ethernet Bridge with Dual-Band

The  names “OpenSSL Toolkit”  and “OpenSSL  Project” 

4. 

must  not  be  used  to  endorse  or  promote  products 

derived  from  this  software  without  prior  written 

permission.  For  written  permission,  please  contact 

[email protected].
Products derived from this software may not be called 

5. 

“OpenSSL” nor may “OpenSSL” appear in their names 

without  prior  written  permission  of  the  OpenSSL 

Project.
Redistributions  of  any  form  whatsoever  must  retain 

6. 

the following acknowledgment: “This product includes 

software developed by the OpenSSL Project for use in 

the OpenSSL Toolkit (

http://www.openssl.org/

)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT 

“AS  IS”  AND  ANY  EXPRESSED  OR  IMPLIED  WARRANTIES, 

INCLUDING,  BUT  NOT  LIMITED  TO,  THE  IMPLIED 

WARRANTIES  OF  MERCHANTABILITY  AND  FITNESS  FOR 

A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT 

SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE 

LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 

EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 

BUT  NOT  LIMITED  TO,  PROCUREMENT  OF  SUBSTITUTE 

GOODS  OR  SERVICES;  LOSS  OF  USE,  DATA,  OR  PROFITS; 

OR  BUSINESS  INTERRUPTION)  HOWEVER  CAUSED  AND 

ON  ANY THEORY  OF  LIABILITY, WHETHER  IN  CONTRACT, 

STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 

OTHERWISE)  ARISING  IN  ANY WAY  OUT  OF THE  USE  OF 

THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 

SUCH DAMAGE.
This product includes cryptographic software written by 

Eric  Young  ([email protected]).  This  product  includes 

software written by Tim Hudson ([email protected]).

Original SSLeay License

Copyright  ©  1995-1998  Eric  Young  ([email protected])

All rights reserved.
This  package  is  an  SSL  implementation  written  by  Eric 

Young ([email protected]).
The  implementation  was  written  so  as  to  conform  with 

Netscape’s SSL.
This  library  is  free  for  commercial  and  non-commercial 

use  as  long  as  the  following  conditions  are  adhered  to. 

The following conditions apply to all code found in this 

distribution, be it the RC4, RSA, lhash, DES, etc., code; not 

just the SSL code. The SSL documentation included with 

this distribution is covered by the same copyright terms 

except  that  the  holder  is  Tim  Hudson  (tjh@cryptsoft.

com).
Copyright remains Eric Young’s, and as such any Copyright 

notices in the code are not to be removed.
If this package is used in a product, Eric Young should be 

given attribution as the author of the parts of the library 

used.  This  can  be  in  the  form  of  a  textual  message  at 

program startup or in documentation (online or textual) 

provided with the package.
Redistribution and use in source and binary forms, with 

or without modification, are permitted provided that the 

following conditions are met:

Redistributions  of  source  code  must  retain  the 

1. 

copyright  notice,  this  list  of  conditions  and  the 

following disclaimer.
Redistributions  in  binary  form  must  reproduce  the 

2. 

above copyright notice, this list of conditions and the 

following  disclaimer  in  the  documentation  and/or 

other materials provided with the distribution.
All  advertising  materials  mentioning  features  or 

3. 

use  of  this  software  must  display  the  following 

acknowledgement:
“This product includes cryptographic software written 

by Eric Young ([email protected])”
The word ‘cryptographic’ can be left out if the routines 

from  the  library  being  used  are  not  cryptographic 

related.
If you include any Windows specific code (or a derivative 

4. 

thereof)  from  the  apps  directory  (application  code) 

you must include an acknowledgement: “This product 

includes  software  written  by  Tim  Hudson  (tjh@

cryptsoft.com)”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND 

ANY  EXPRESS  OR  IMPLIED  WARRANTIES,  INCLUDING, 

BUT  NOT  LIMITED  TO,  THE  IMPLIED  WARRANTIES  OF 

MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 

PURPOSE  ARE  DISCLAIMED.  IN  NO  EVENT  SHALL  THE 

AUTHOR  OR  CONTRIBUTORS  BE  LIABLE  FOR  ANY 

DIRECT,  INDIRECT,  INCIDENTAL,  SPECIAL,  EXEMPLARY, 

OR  CONSEQUENTIAL  DAMAGES  (INCLUDING,  BUT  NOT 

LIMITED TO,  PROCUREMENT  OF  SUBSTITUTE  GOODS  OR 

SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 

OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 

OR  TORT  (INCLUDING  NEGLIGENCE  OR  OTHERWISE) 

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 

EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available 

version or derivative of this code cannot be changed. i.e. 

this code cannot simply be copied and put under another 

distribution license [including the GNU Public License.]

END OF SCHEDULE 4

8120910NC-JL

Summary of Contents for WET610N - Wireless-N EN Bridge

Page 1: ...USER GUIDE Wireless N Ethernet Bridge with Dual Band Model WET610N...

Page 2: ...ite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an olde...

Page 3: ...ss 11 Status About 11 Appendix A Troubleshooting 12 Appendix B Specifications 13 Appendix C Warranty Information 14 Limited Warranty 14 Exclusions and Limitations 14 Obtaining Warranty Service 14 Tech...

Page 4: ...Fi Protected Setup run the SetupWizard or refer to Wireless Basic Wireless Settings page 3 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It li...

Page 5: ...ss 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Page 6: ...ect a computer to the Bridge using an Ethernet connection to access the web based utility You will need to configure the Ethernet connection on the computer with a static IP address and subnet mask Th...

Page 7: ...to use wireless security keep the default Disabled NOTE Remember that each device in your wireless network MUST use the same security methodandpassphrase key orelsethewireless devices will not be abl...

Page 8: ...ed Setup Congratulations Method 1 Use this method if your router has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi...

Page 9: ...vey Wireless Security WPA Network Name SSID The name of the network you selected is automatically displayed Security Mode WPA Personal is automatically displayed Encryption WPA supports the TKIP encry...

Page 10: ...tion Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemax...

Page 11: ...no frame exchanges within this duration by the Block Acknowledgement ACK agreement The range is 0 to 65535 ms The default is 0 which disables the timeout Aggregation Window Size This option defines th...

Page 12: ...om the receiving device To use the RTS CTS option keep the default RTS CTS The None option may cause collisions between HT and legacy packets To use the None option select None To use the CTS2Self opt...

Page 13: ...sable the setting Keep the default Enabled to allow wireless access to the Bridge s web based utility or select Disabled to block wireless access to the utility Backup and Restore Backup To back up th...

Page 14: ...twork Name SSID The wireless network name or SSID is displayed BSSID The wireless MAC address of the connected wireless router or access point is displayed Radio Band The radio band of your wireless n...

Page 15: ...red Ethernet device will not communicate with another wireless enabled device such as a computer or printer Check the following Make sure the wireless enabled device is on the same wireless network as...

Page 16: ...dBm typical 130 Mbps HT20 270 Mbps HT40 Receive Sensitivity 802 11a 72 dBm typical 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm ty...

Page 17: ...This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this pr...

Page 18: ...custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This...

Page 19: ...umented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter This equipment should be installed and operated with minimum distance 2...

Page 20: ...con u pour fonctionner avec une 2 antenne ayant un gain maximal de 1 58 dBi 2 4 GHz et de 1 45 dBi 5 GHz Les antennes ayant un gain plus lev sont strictement interdites par Industrie Canada L imp danc...

Page 21: ...dace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho...

Page 22: ...it de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L liminat...

Page 23: ...einek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederl...

Page 24: ...pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaob...

Page 25: ...KSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSEN...

Page 26: ...if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Discl...

Page 27: ...etary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification f...

Page 28: ...ly used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution an...

Page 29: ...er in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later versi...

Page 30: ...and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others F...

Page 31: ...e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 32: ...ource code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely def...

Page 33: ...ties remain in full compliance You are not required to accept this License since you 9 have not signed it However nothing else grants you permission to modify or distribute the Library or its derivati...

Page 34: ...RY SERVICING REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 16 OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY A...

Page 35: ...he holder is Tim Hudson tjh cryptsoft com Copyright remains EricYoung s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be gi...

Reviews: