background image

35

Appendix E

Software End User License Agreement

Wireless-G Broadband Router

License  Restrictions

.  Other  than  as  set  forth  in  this 

Agreement,  you  may  not  (i)  make  or  distribute  copies 

of  the  Software  or  its  related  Documentation,  or 

electronically  transfer  the  Software  or  Documentation 

from one computer to another or over a network; (ii) alter, 

merge, modify, adapt, decrypt or translate the Software or 

related  Documentation,  or  decompile,  reverse  engineer, 

disassemble,  or  otherwise  reduce  the  Software  to  a 

human-perceivable form (except to the extent expressly 

permitted  by  law  notwithstanding  this  provision);  (iii) 

share,  sell,  rent,  lease,  or  sublicense  the  Software  or 

related Documentation; (iv) modify the Software or create 

derivative  works  based  upon  the  Software;  (v)  if  you 

make a backup copy of the Software and Documentation, 

you must reproduce all copyright notices and any other 

proprietary  legends  found  on  the  original  Software  and 

Documentation;  (vi)  use  the  Software  for  management 

of a business network with more than 8 computers; (vii) 

use the Software under any circumstances for competitive 

evaluation,  including  developing  competing  software; 

(ix) to the extent permitted under applicable law, assign, 

sublicense  or  otherwise  transfer  the  Software  unless 

the  prospective  assignee,  sublicensee  or  transferee 

expressly agrees to all the terms and conditions under this 

Agreement.
The  Software  and  Documentation  contain  trade  secrets 

and/or copyrighted materials of Cisco or its suppliers. You 

will not disclose or make available such trade secrets or 

copyrighted material in any form to any third party. 
In the event that you fail to comply with this Agreement, 

the  license  granted  to  you  will  automatically  terminate, 

at  which  time  you  must  immediately  (i)  stop  using  the 

Cisco  Product  in  which  the  Software  is  embedded,  or 

(ii)  uninstall  the  Software  and  destroy  all  copies  of  the 

Software  and  Documentation  where  the  Software  is 

purchased separately. All other rights of both parties and 

all  other  provisions  of  this  Agreement  will  survive  this 

termination.

Ownership

.  The  Software  and  Documentation  are 

licensed  and  not  sold  to  you  by  Cisco  and  the  relevant 

third parties set forth in Schedule 3. Cisco and its licensors 

retain  all  right,  title  and  interest,  including  all  copyright 

and  intellectual  property  rights,  in  and  to,  the  Software 

and Documentation and all copies and portions thereof. 

All rights not specifically granted to you in this Agreement 

are  reserved  by  Cisco  and  its  licensors. Your  use  of  any 

software product from an entity other than Cisco that may 

have  been  recommended  by  Cisco  is  governed  by  such 

software product’s end user license agreement.

Third  Party  Services,  Links  and  Advertising

.  Cisco  may 

provide  from  within  the  Software  links  to  websites  or 

third  party  software  products.  In  addition,  third  party 

services may be provided with the Software which may be 

subject to terms and conditions from the provider of the 

service. Cisco makes no representations as to the quality, 

suitability, functionality, or legality of any sites or products 

to which links may be provided or third party services, and 

you hereby waive any claim you might have against Cisco 

with respect to such sites or third party software products 

or  services.  Your  correspondence  or  business  dealings 

with, or participation in promotions of third parties found 

through  the  Software  and  any  other  terms,  conditions, 

warranties,  or  representations  associated  with  such 

dealings, are solely between you and such third party. You 

agree  that  Cisco  is  not  responsible  or  liable  for  any  loss 

or damage of any sort incurred as the result of any such 

dealings or as the result of the presence of such third party 

links, products or services in the Cisco Software, and Cisco 

may discontinue or modify the services or links offered at 

any time.

Collection  and  Processing  of  Information

.  You  agree 

that  Cisco  and/or  its  affiliates  may,  from  time  to  time, 

collect and process information about your Cisco product 

and/or  the  Software  and/or  your  use  of  either  in  order 

(i)  to  enable  Cisco  to  offer  you  Upgrades;  (ii)  to  provide 

support  and  assistance  with  your  product  and/or  the 

Software;  (iii)  to  ensure  that  your  Cisco  product  and/or 

the Software is being used in accordance with the terms 

of  this  Agreement;  (iv)  to  provide  improvements  to  the 

way Cisco delivers technology to you and to other Cisco 

customers;  (v)  to  provide  reports  regarding  the  status 

and health of the network, including network traffic and 

application  usage;  (vi)  to  enable  Cisco  to  comply  with 

the terms of any agreements it has with any third parties 

regarding  your  Cisco  product  and/or  Software;  and/or 

(vii)  to  enable  Cisco  to  comply  with  all  applicable  laws 

and/or regulations, or the requirements of any regulatory 

authority or government agency. Cisco and/ or its affiliates 

may collect and process this information provided that it 

does not identify you personally. You agree that Cisco has 

no responsibility or liability for the deletion of or failure to 

store any data or other information related to your Cisco 

product, Software or related Services.
The  reports  feature  of  certain  Software  allows  you  to 

monitor the activity of computers running the Software in 

your home or small office. You must activate this feature in 

order to receive reports. If you activate the reports feature, 

you  agree  to  the  following:  (a)  the  Software  tracks  and 

monitors the following components and activities in your 

home or office: network traffic (e.g. megabytes per hour), 

application usage (the foreground window is tracked and 

the  time  each  application  is  in  the  foreground  during 

active  usage  of  the  computer)  and  internet  history.  (b) 

For all computers on which reports feature is enabled, the 

above information is transmitted to servers at Cisco and/

or a third party at periodic intervals while the computer 

is  online. This  information  is  associated  and  stored  with 

the  email  address  supplied  by  you  when  you  activated 

the reports feature. This information is summarized into 

a  formal  report  and  is  emailed  to  the  identified  email 

address.  ©  Any  computer  on  the  network  running  the 

Summary of Contents for WRT54G2 - Wireless-G Broadband Router

Page 1: ...USER GUIDE Wireless G Broadband Router Model WRT54G2...

Page 2: ...ail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you...

Page 3: ...er 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN Passthrough 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming P...

Page 4: ...Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilit concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Dire...

Page 5: ...the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router suppo...

Page 6: ...ine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall...

Page 7: ...lity to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless netw...

Page 8: ...Address field Then press Enter A password request screen will appear Non Windows XP users will see a similar screen Leave the User name field blank Then enter the password you set up during the Setup...

Page 9: ...periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field spe...

Page 10: ...s a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Cable Internet Connection Type Telstra Cable User Name and Password Enter the User N...

Page 11: ...than 192 168 1 253 The default is 192 168 1 100 Maximum Number of DHCP Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than...

Page 12: ...assigned by the DDNS service Internet IP Address The Router s Internet IP address is displayed Because it is dynamic it will change Status The status of the DDNS service connection is displayed Click...

Page 13: ...You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet S...

Page 14: ...s select Wireless G Only If you have only Wireless B devices select Wireless B Only If your network has no wireless devices or if you want to disable wireless networking select Disabled Wireless Netwo...

Page 15: ...n manually configure those client devices Wireless Wireless Security The Wireless Security settings configure the security of yourwirelessnetwork Therearesixwirelesssecuritymode options supported by t...

Page 16: ...cryption keys Select the type of algorithm AES or TKIP AES The default is AES RADIUS Server Address Enter the IP Address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The...

Page 17: ...rase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 4 If you did not enter a Passphrase enter the WEP key s manually WEP WEP is a basic encryption method which is not...

Page 18: ...a WEP key for authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Router will advertise its Basic Rate...

Page 19: ...o begin transmission The RTS Threshold value should remain at its default value of 2347 AP Isolation This isolates all wireless clients and wireless devices on your network from each other Wireless de...

Page 20: ...k or allow specific kinds of Internet usage and traffic such as Internet access designated services and websites during specific days and times Access Restrictions Internet Access Internet Access Inte...

Page 21: ...creen appears Port Services To add a service enter the service s name in the Service Name field Select its protocol from the Protocol drop down menu and enter its range in the Port Range fields Then c...

Page 22: ...eck with the Internet application documentation for the port number s needed StartPort EnterthestartingportnumberoftheTriggered Range End Port Enter the ending port number of the Triggered Range Forwa...

Page 23: ...ority Application Priority QoS manages information as it is transmitted and received Depending on the settings of the QoS screen this feature will assign information a high or low priority for the app...

Page 24: ...will need to enter the Router s password when accessing the Router this way as usual Use https To require the use of HTTPS for remote access select this feature UPnP UPnP Keep the default Enable to en...

Page 25: ...Save Settings Any settings you have saved will be lost when the default settings are restored Administration Factory Defaults Administration Upgrade Firmware The Administration Upgrade Firmware scree...

Page 26: ...section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen Click Refresh to update th...

Page 27: ...ork screen click Close Status Wireless The Status Wireless screen displays the status of your wireless network Status Wireless Wireless MAC Address The MAC address of the Router s local wireless inter...

Page 28: ...t the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt fol...

Page 29: ...RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Environm...

Page 30: ...ct or software will be uninterrupted or error free Also due to the continual development of new techniques for intruding upon and attacking networks Linksys does not warrant that the product software...

Page 31: ...fective product covered by this limited warranty will be repaired or replaced and returned to you without charge Customers outside of the United States of America and Canada are responsible for all sh...

Page 32: ...iation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20...

Page 33: ...ntenne ou d un autre metteur ou fonctionner avec une autre antenne ou un autre metteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actu...

Page 34: ...recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se lik...

Page 35: ...eter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination et...

Page 36: ...elsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands Du...

Page 37: ...ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce sa...

Page 38: ...YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND PO...

Page 39: ...sco makes no representations as to the quality suitability functionality or legality of any sites or products to which links may be provided or third party services and you hereby waive any claim you...

Page 40: ...tain settings in your Internet browser software including the default settings for search provider and source of DNS error pages and may direct erroneous URLs to an error landing page hosted by Cisco...

Page 41: ...this Agreement is found to be void or unenforceable the remaining provisions will remain in full force and effect This Agreement constitutes the entire agreement between the parties with respect to t...

Page 42: ...ts These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis o...

Page 43: ...er licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written enti...

Page 44: ...ion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide...

Page 45: ...or this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can...

Page 46: ...orm executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work u...

Page 47: ...of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent acce...

Page 48: ...is requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Libra...

Page 49: ...tten in the body of this License The Free Software Foundation may publish revised 13 and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spi...

Page 50: ...ppear in their names without prior written permission of the OpenSSL Project Redistributions of any form whatsoever must retain 6 the following acknowledgment This product includes software developed...

Page 51: ...Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR...

Reviews: