background image

26

Appendix E

Software License Agreement

Wireless-G USB Network Adapter

Appendix E: Software 

License Agreement

Software in Linksys Products

This  product  from  Cisco-Linksys  LLC  or  from  one  of  its 

affiliates  Cisco  Systems-Linksys  (Asia)  Pte  Ltd.  or  Cisco-

Linksys  K.K.  (“Linksys”)  contains  software  (including 

firmware)  originating  from  Linksys  and  its  suppliers 

and  may  also  contain  software  from  the  open  source 

community. Any software originating from Linksys and its 

suppliers is licensed under the Linksys Software License 

Agreement contained at Schedule 1 below. You may also 

be prompted to review and accept that Linksys Software 

License Agreement upon installation of the software
Any software from the open source community is licensed 

under the specific license terms applicable to that software 

made available by Linksys at 

www.linksys.com/gpl

 or as 

provided for in Schedules 2, 3 and 4 below.
Where such specific license terms entitle you to the source 

code of such software, that source code is upon request 

available  at  cost  from  Linksys  for  at  least  three  years 

from the purchase date of this product and may also be 

available  for  download  from 

www.linksys.com/gpl

.  For 

detailed  license  terms  and  additional  information  on 

open source software in Linksys products please look at 

the Linksys public web site at: 

www.linksys.com/gpl/

 or 

Schedules 2, 3 or 4 below as applicable.
BY  DOWNLOADING  OR  INSTALLING  THE  SOFTWARE, 

OR  USING  THE  PRODUCT  CONTAINING  THE  SOFTWARE, 

YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE 

LICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TO 

ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, 

INSTALL  OR  USE  THE  SOFTWARE.  YOU  MAY  RETURN 

UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED 

AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) 

FOR  A  FULL  REFUND  UP  TO  30  DAYS  AFTER  ORIGINAL 

PURCHASE,  SUBJECT  TO  THE  RETURN  PROCESS  AND 

POLICIES OF THE PARTY FROM WHICH YOU PURCHASED 

SUCH PRODUCT OR SOFTWARE.

Software Licenses

The software Licenses applicable to software from Linksys 

are  made  available  at  the  Linksys  public  web  site  at: 

www.linksys.com

. For your convenience of reference, a 

copy of the Linksys Software License Agreement and the 

main  open  source  code  licenses  used  by  Linksys  in  its 

products are contained in the Schedules below.

Schedule 1 - Linksys Software License Agreement

THIS  LICENSE  AGREEMENT  IS  BETWEEN  YOU  AND 

CISCO-LINKSYS  LLC  OR  ONE  OF  ITS  AFFILIATES  CISCO 

SYSTEMS-LINKSYS  (ASIA)  PTE  LTD.  OR  CISCO-LINKSYS 

K.K.  (“LINKSYS”)  LICENSING THE  SOFTWARE  INSTEAD  OF 

CISCO-LINKSYS  LLC.  BY  DOWNLOADING  OR  INSTALLING 

THE  SOFTWARE,  OR  USING  THE  PRODUCT  CONTAINING 

THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY 

THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESE 

TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE 

THE  SOFTWARE. YOU  MAY  RETURN  UNUSED  SOFTWARE 

(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER 

PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND 

UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO 

THE RETURN PROCESS AND POLICIES OF THE PARTY FROM 

WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.

License.

  Subject  to  the  terms  and  conditions  of  this 

Agreement, Linksys grants the original end user purchaser 

of  the  Linksys  product  containing  the  Software  (“You”) 

a  nonexclusive  license  to  use  the  Software  solely  as 

embedded  in  or  (where  authorized  in  the  applicable 

documentation)  for  communication  with  such  product. 

This license may not be sublicensed, and is not transferable 

except  to  a  person  or  entity  to  which  you  transfer 

ownership  of  the  complete  Linksys  product  containing 

the Software, provided you permanently transfer all rights 

under this Agreement and do not retain any full or partial 

copies  of  the  Software,  and  the  recipient  agrees  to  the 

terms of this Agreement.
“Software”  includes,  and  this  Agreement  will  apply  to 

(a) the software of Linksys or its suppliers provided in or 

with the applicable Linksys product, excluding technology 

from the open source community, and (b) any upgrades, 

updates,  bug  fixes  or  modified  versions  (“Upgrades”)  or 

backup copies of the Software supplied to You by Linksys 

or  an  authorized  reseller,  provided  you  already  hold  a 

valid license to the original software and have paid any 

applicable fee for the Upgrade.

Protection  of  Information.

  The  Software  and 

documentation contain trade secrets and/or copyrighted 

materials  of  Linksys  or  its  suppliers.  You  will  not  copy 

or  modify  the  Software  or  decompile,  decrypt,  reverse 

engineer  or  disassemble  the  Software  (except  to  the 

extent  expressly  permitted  by  law  notwithstanding  this 

provision),  and  You  will  not  disclose  or  make  available 

such  trade  secrets  or  copyrighted  material  in  any  form 

to any third party. Title to and ownership of the Software 

and documentation and any portion thereof, will remain 

solely with Linksys or its suppliers.

Collection and Processing of Information.

 You agree that 

Linksys and/or its affiliates may, from time to time, collect 

and process information about your Linksys product and/

or  the  Software  and/or  your  use  of  either  in  order  (i)  to 

enable Linksys to offer you Upgrades; (ii) to ensure that 

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: