background image

25

Appendix F

Software License Agreement

Dual-Band Wireless-N Notebook Adapter

Appendix F: Software 
License Agreement

Software in Linksys Products

This  product  from  Cisco-Linksys  LLC  or  from  one  of  its 
affiliates  Cisco  Systems-Linksys  (Asia)  Pte  Ltd.  or  Cisco-
Linksys  K.K.  (“Linksys”)  contains  software  (including 
firmware)  originating  from  Linksys  and  its  suppliers 
and  may  also  contain  software  from  the  open  source 
community. Any software originating from Linksys and its 
suppliers  is  licensed  under  the  Linksys  Software  License 
Agreement contained at Schedule 1 below. You may also 
be prompted to review and accept that Linksys Software 
License Agreement upon installation of the software. 

Any software from the open source community is licensed 
under the specific license terms applicable to that software 
made available by Linksys at 

www.linksys.com/gpl

 or as 

provided for in Schedules 2 and 3 below. 

Where such specific license terms entitle you to the source 
code of such software, that source code is upon request 
available  at  cost  from  Linksys  for  at  least  three  years 
from the purchase date of this product and may also be 
available  for  download  from 

www.linksys.com/gpl

.  For 

detailed  license  terms  and  additional  information  on 
open source software in Linksys products please look at 
the Linksys public web site at: 

www.linksys.com/gpl/

 or 

Schedule 2 below as applicable.

BY  DOWNLOADING  OR  INSTALLING  THE  SOFTWARE, 
OR  USING  THE  PRODUCT  CONTAINING  THE  SOFTWARE, 
YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE 
LICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TO 
ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, 
INSTALL  OR  USE  THE  SOFTWARE.  YOU  MAY  RETURN 
UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED 
AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) 
FOR  A  FULL  REFUND  UP  TO  30  DAYS  AFTER  ORIGINAL 
PURCHASE,  SUBJECT  TO  THE  RETURN  PROCESS  AND 
POLICIES OF THE PARTY FROM WHICH YOU PURCHASED 
SUCH PRODUCT OR SOFTWARE.

Software Licenses

The software Licenses applicable to software from Linksys 
are  made  available  at  the  Linksys  public  web  site  at:  

www.linksys.com

 

and 

www.linksys.com/gpl/

 

respectively.  For  your  convenience  of  reference,  a  copy 
of the Linksys Software License Agreement and the main 
open source code licenses used by Linksys in its products 
are contained in the Schedules below.

Schedule 1 - Linksys Software License Agreement

THIS  LICENSE  AGREEMENT  IS  BETWEEN  YOU  AND 

CISCO-LINKSYS  LLC  OR  ONE  OF  ITS  AFFILIATES  CISCO 
SYSTEMS-LINKSYS  (ASIA)  PTE  LTD.  OR  CISCO-LINKSYS 
K.K.  (“LINKSYS”)  LICENSING THE  SOFTWARE  INSTEAD  OF 
CISCO-LINKSYS  LLC.  BY  DOWNLOADING  OR  INSTALLING 
THE  SOFTWARE,  OR  USING  THE  PRODUCT  CONTAINING 
THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY 
THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESE 
TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE 
THE  SOFTWARE. YOU  MAY  RETURN  UNUSED  SOFTWARE 
(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER 
PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND 
UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO 
THE RETURN PROCESS AND POLICIES OF THE PARTY FROM 
WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.

License

.  Subject  to  the  terms  and  conditions  of  this 

Agreement, Linksys grants the original end user purchaser 
of  the  Linksys  product  containing  the  Software  (“You”) 
a  nonexclusive  license  to  use  the  Software  solely  as 
embedded  in  or  (where  authorized  in  the  applicable 
documentation)  for  communication  with  such  product. 
This license may not be sublicensed, and is not transferable 
except  to  a  person  or  entity  to  which  you  transfer 
ownership  of  the  complete  Linksys  product  containing 
the Software, provided you permanently transfer all rights 
under this Agreement and do not retain any full or partial 
copies  of  the  Software,  and  the  recipient  agrees  to  the 
terms of this Agreement. 

“Software” includes, and this Agreement will apply to (a) 
the software of Linksys or its suppliers provided in or with 
the  applicable  Linksys  product,  and  (b)  any  upgrades, 
updates,  bug  fixes  or  modified  versions  (“Upgrades”)  or 
backup copies of the Software supplied to You by Linksys 
or  an  authorized  reseller,  provided  you  already  hold  a 
valid  license  to  the  original  software  and  have  paid  any 
applicable fee for the Upgrade. 

Protection  of  Information

.  The  Software  and 

documentation contain trade secrets and/or copyrighted 
materials  of  Linksys  or  its  suppliers.  You  will  not  copy 
or  modify  the  Software  or  decompile,  decrypt,  reverse 
engineer  or  disassemble  the  Software  (except  to  the 
extent  expressly  permitted  by  law  notwithstanding  this 
provision),  and  You  will  not  disclose  or  make  available 
such  trade  secrets  or  copyrighted  material  in  any  form 
to any third party. Title to and ownership of the Software 
and documentation and any portion thereof, will remain 
solely with Linksys or its suppliers.

Collection and Processing of Information

. You agree that 

Linksys and/or its affiliates may, from time to time, collect 
and process information about your Linksys product and/
or  the  Software  and/or  your  use  of  either  in  order  (i)  to 
enable  Linksys  to  offer  you  Upgrades;  (ii)  to  ensure  that 
your Linksys product and/or the Software is being used in 
accordance with the terms of this Agreement; (iii) to provide 
improvements to the way Linksys delivers technology to 
you and to other Linksys customers; (iv) to enable Linksys 

Summary of Contents for WPC600N - Ultra RangePlus Wireless-N PC Card

Page 1: ...USER GUIDE Dual Band Wireless N Notebook Adapter Model WPC600N ...

Page 2: ...te address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network...

Page 3: ...XP Wireless Zero Configuration 15 Appendix D Warranty Information 17 Limited Warranty 17 Exclusions and Limitations 17 Obtaining Warranty Service 17 Technical Support 18 Appendix E Regulatory Information 19 FCC Statement 19 FCC Radiation Exposure Statement 19 Safety Notices 19 Wireless Disclaimer 19 Industry Canada Statement 19 Restrictions in the 5 GHz Band 20 Avis d Industrie Canada 20 Avis de n...

Page 4: ...does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wireless A 802 11a Wireless G 802 11g or Wireless B 802 11b standard But with Wireless N it has even better range and speed LEDs Power Power Green The Power LED lights up when the Adapter is powered on Link Act Link Act Green The Link Act LED lig...

Page 5: ... 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each compu...

Page 6: ...y information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad hoc or infrastructure mode Signal Strength The Signal Strength bar indicates signal strength Link Quality The Link Quality bar indicates the quality of...

Page 7: ...istics BytesTransmitted This shows the bytes that the Adapter transmits in real time after connecting to the wireless network or after clicking Refresh Statistics Driver Version This shows the Adapter s driver version Noise Level This shows the level of background noise that affects the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of...

Page 8: ...rConnection screen Select the appropriate level of WEP encryption 64 bit or 128 bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA If the network has the wireless security WPA Personal security enabled then you see the WPA Personal Needed for Connection screen Select the appropriate encryption type TKIP or AES Enter the network s...

Page 9: ...s two options for setting up the Adapter Available Wireless Networks For most users Use this option if you already have a network set up The networks available to this Adapter are listed on this screen You can choose one of these networks and click Connect to connect to it Click Refresh to update the Available Wireless Networks list AdvancedSetup Ifyournetworkisnotlistedonthisscreen select Advance...

Page 10: ...aracters in the Pre shared Key field Click Connect and proceed to Step 3 WPA2 Personal Wi Fi Protected Access 2 If your network has the wireless security WPA2 Personal enabled this screen appears WPA2 Security Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click Connect and proceed to Step 3 After the profile installs the 3 Congratulations screen appears Click...

Page 11: ...s Mode screen shows a choice of two wireless modes Select Infrastructure Mode if you want to connect to a wireless router or access point Select Ad Hoc Mode if you want to connect to another wireless device directly without using a wireless router or access point Enter the Wireless Network Name for your network Wireless Mode Infrastructure Mode Use this mode if you want to connect to a wireless ro...

Page 12: ...you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Advanced Users TX Key The default transmit key number is 1...

Page 13: ...return to the previous screen PEAP WPA Enterprise PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu select the certificate you have installed to authenticate you on y...

Page 14: ...ication types EAP TLS and PEAP Authentication Select the authentication method your network is using EAP TLS or PEAP EAP TLS RADIUS EAP TLS If you selected EAP TLS enter the login name of your wireless network in the Login Name field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu select the certificate you have installed to...

Page 15: ... shows the new settings Confirm New Settings To save the new settings click Save To edit the new settings click Back To exit the Advanced Setup through the Wireless Network Monitor click Exit The Congratulations screen appears next Click 8 Finish Congratulations Congratulations The profile is successfully configured ...

Page 16: ...operly Reinsert the Dual Band Wireless N Notebook Adapter into the notebook s PC Card slot I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the notebook or desktop is powered 1 on Make sure that the Dual Band Wireless N Notebook 2 Adapter is configured with the same Wireless Network Name SSID and WEP settings as the other computer...

Page 17: ... 5dBm 2 4GHz Typical Receive Sensitivity in dBm 802 11b 76dBm 10 Typical 802 11g 65dBm 10 Typical 802 11a 65dBm 10 Typical 802 11n 50dBm 10 for 5GHz Typical 802 11n 50dBm 10 for 2 4GHz Typical Antenna Gain in dBi 2 7dBi 2 4GHz 1 2dBi 5 0GHz Power Consumption TX 620 10mA RX 890 10mA Standby 580 10mA Security features WEP WPA Personal WPA2 Personal WPA and WPA2 Enterprise Security key bits Up to 128...

Page 18: ...r Use Linksys Wireless Network Monitor NOTE For more information on Windows XP Wireless Zero Configuration refer to Windows Help After installing the Adapter the Windows XP Wireless 1 Zero Configuration icon appears in your computer s system tray Double click the icon Windows XP Wireless Zero Configuration Icon The screen that appears will show any available 2 wireless network Select the network y...

Page 19: ...r the exact WEP key used by your wireless router or access point Your wireless network will appear as Connected when 5 your connection is active Wireless Network Connection For more information about wireless networking on a Windows XP computer click Start Help Support Enter the keyword wireless in the field provided and press the Enter key Your computer is now connected to your wireless network ...

Page 20: ...his limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO...

Page 21: ...ustom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www links...

Page 22: ...truction as documented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter SAR compliance has been established in typical laptop computer s with ExpressCard Cardbus or USB slots and this product can be used in a typical laptop computer with ExpressCard Cardbus or USB slots Other applications such as a handheld PC or similar devic...

Page 23: ... radioélectrique reçu 2 mêmesicebrouillageestsusceptibledecompromettre le fonctionnement du dispositif Le dispositif a été conçupourfonctionneravecuneantenneayantungain maximum de 2 dBi Les règlements d Industrie Canada interdisent strictement l utilisation d antennes dont le gain est supérieur à cette limite L impédance requise de l antenne est de 50 ohms Afin de réduire le risque d interférence ...

Page 24: ...á směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními ú...

Page 25: ...το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des m...

Page 26: ...lt berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietma...

Page 27: ... pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlag...

Page 28: ...STEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER...

Page 29: ...VENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING NEGLIGENCE ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO EVENT WILL LINKSYS LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR...

Page 30: ...CATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion...

Page 31: ...rce code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything th...

Page 32: ... the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation If you wish to incorporate parts of the Program into 10 other free programs whose distribution conditions are different write to the author to ask for permission For software which is copyrighted by the Free Software Foundation wri...

Page 33: ...TERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original...

Page 34: ...MENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this cod...

Reviews: