background image

27

Appendix E

Software License Agreement

Wireless-G USB Network Adapter

your Linksys product and/or the Software is being used in 

accordance with the terms of this Agreement; (iii) to provide 

improvements to the way Linksys delivers technology to 

you and to other Linksys customers; (iv) to enable Linksys 

to comply with the terms of any agreements it has with 

any  third  parties  regarding  your  Linksys  product  and/or 

Software and/or (v) to enable Linksys to comply with all 

applicable  laws  and/or  regulations,  or  the  requirements 

of  any  regulatory  authority  or  government  agency. 

Linksys  and/  or  its  affiliates  may  collect  and  process 

this  information  provided  that  it  does  not  identify  you 

personally. Your  use  of  your  Linksys  product  and/or  the 

Software constitutes this consent by you to Linksys and/

or its affiliates’ collection and use of such information and, 

for EEA customers, to the transfer of such information to a 

location outside the EEA.

Software  Upgrades  etc.

  If  the  Software  enables  you  to 

receive  Upgrades,  you  may  elect  at  any  time  to  receive 

these  Upgrades  either  automatically  or  manually.  If  you 

elect  to  receive  Upgrades  manually  or  you  otherwise 

elect not to receive or be notified of any Upgrades, you 

may  expose  your  Linksys  product  and/or  the  Software 

to  serious  security  threats  and/or  some  features  within 

your  Linksys  product  and/or  Software  may  become 

inaccessible.  There  may  be  circumstances  where  we 

apply an Upgrade automatically in order to comply with 

changes  in  legislation,  legal  or  regulatory  requirements 

or as a result of requirements to comply with the terms 

of  any  agreements  Linksys  has  with  any  third  parties 

regarding your Linksys product and/or the Software. You 

will always be notified of any Upgrades being delivered 

to  you. The  terms  of  this  license  will  apply  to  any  such 

Upgrade unless the Upgrade in question is accompanied 

by  a  separate  license,  in  which  event  the  terms  of  that 

license will apply.

Open  Source  Software.

  The  GPL  or  other  open  source 

code incorporated into the Software and the open source 

license for such source code are available for free download 

at 

http://www.linksys.com/gpl

. If You would like a copy 

of the GPL or other open source code in this Software on a 

CD, Linksys will mail to You a CD with such code for $9.99 

plus the cost of shipping, upon request.

Term  and  Termination.

 You  may  terminate  this  License 

at  any  time  by  destroying  all  copies  of  the  Software 

and  documentation.  Your  rights  under  this  License  will 

terminate immediately without notice from Linksys if You 

fail to comply with any provision of this Agreement.

Limited  Warranty.

  The  warranty  terms  and  period 

specified  in  the  applicable  Linksys  Product  User  Guide 

shall also apply to the Software.

Disclaimer of Liabilities.

 IN NO EVENT WILL LINKSYS OR 

ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE 

OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 

INCIDENTAL  OR  PUNITIVE  DAMAGES,  REGARDLESS  OF 

CAUSE  (INCLUDING  NEGLIGENCE),  ARISING  OUT  OF 

OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO  USE  THE 

SOFTWARE,  EVEN  IF  LINKSYS  HAS  BEEN  ADVISED  OF 

THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL 

LINKSYS’  LIABILITY  EXCEED  THE  AMOUNT  PAID  BY  YOU 

FOR THE  PRODUCT. The  foregoing  limitations  will  apply 

even if any warranty or remedy under this Agreement fails 

of its essential purpose. Some jurisdictions do not allow 

the exclusion or limitation of incidental or consequential 

damages,  so  the  above  limitation  or  exclusion  may  not 

apply to You.

Export.

 Software, including technical data, may be subject 

to U.S. export control laws and regulations and/or export 

or  import  regulations  in  other  countries.  You  agree  to 

comply strictly with all such laws and regulations.

U.S. Government Users.

 The Software and documentation 

qualify as “commercial items” as defined at 48 C.F.R. 2.101 

and  48  C.F.R.  12.212.  All  Government  users  acquire  the 

Software  and  documentation  with  only  those  rights 

herein that apply to non-governmental customers.

General Terms.

 This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 

California, without reference to conflict of laws principles. 

The  United  Nations  Convention  on  Contracts  for  the 

International Sale of Goods will not apply. If any portion 

of this Agreement is found to be void or unenforceable, 

the  remaining  provisions  will  remain  in  full  force  and 

effect. This Agreement constitutes the entire agreement 

between  the  parties  with  respect  to  the  Software  and 

supersedes any conflicting or additional terms contained 

in any purchase order or elsewhere.

END OF SCHEDULE 1

Schedule 2

If  this  Linksys  product  contains  open  source  software 

licensed  under  Version  2  of  the  “GNU  General  Public 

License” then the license terms below in this Schedule 2 

will apply to that open source software. The license terms 

below in this Schedule 2 are from the public web site at 

http://www.gnu.org/copyleft/gpl.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991 
Copyright © 1989, 1991 Free Software Foundation, Inc. 
51  Franklin  Street,  Fifth  Floor,  Boston,  MA  02110-1301, 

USA
Everyone  is  permitted  to  copy  and  distribute  verbatim 

copies  of  this  license  document,  but  changing  it  is  not 

allowed.

Preamble

The licenses for most software are designed to take away 

your  freedom  to  share  and  change  it.  By  contrast,  the 

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: