background image

30

Appendix E

Software License Agreement

Wireless-G USB Network Adapter

If, as a consequence of a court judgment or allegation 

7. 

of  patent  infringement  or  for  any  other  reason  (not 

limited  to  patent  issues),  conditions  are  imposed  on 

you (whether by court order, agreement or otherwise) 

that contradict the conditions of this License, they do 

not excuse you from the conditions of this License. If 

you cannot distribute so as to satisfy simultaneously 

your  obligations  under  this  License  and  any  other 

pertinent  obligations,  then  as  a  consequence  you 

may  not  distribute  the  Program  at  all.  For  example, 

if  a  patent  license  would  not  permit  royalty-free 

redistribution of the Program by all those who receive 

copies directly or indirectly through you, then the only 

way you could satisfy both it and this License would be 

to refrain entirely from distribution of the Program. 
If  any  portion  of  this  section  is  held  invalid  or 

unenforceable  under  any  particular  circumstance, 

the  balance  of  the  section  is  intended  to  apply  and 

the  section  as  a  whole  is  intended  to  apply  in  other 

circumstances. 
It is not the purpose of this section to induce you to 

infringe any patents or other property right claims or 

to contest validity of any such claims; this section has 

the sole purpose of protecting the integrity of the free 

software  distribution  system,  which  is  implemented 

by  public  license  practices.  Many  people  have 

made  generous  contributions  to  the  wide  range  of 

software  distributed  through  that  system  in  reliance 

on  consistent  application  of  that  system;  it  is  up  to 

the  author/donor  to  decide  if  he  or  she  is  willing  to 

distribute  software  through  any  other  system  and  a 

licensee cannot impose that choice. 
This  section  is  intended  to  make  thoroughly  clear 

what is believed to be a consequence of the rest of this 

License. 
If  the  distribution  and/or  use  of  the  Program  is 

8. 

restricted in certain countries either by patents or by 

copyrighted  interfaces,  the  original  copyright  holder 

who places the Program under this License may add an 

explicit geographical distribution limitation excluding 

those countries, so that distribution is permitted only 

in or among countries not thus excluded. In such case, 

this License incorporates the limitation as if written in 

the body of this License. 
The  Free  Software  Foundation  may  publish  revised 

9. 

and/or  new  versions  of  the  General  Public  License 

from time to time. Such new versions will be similar in 

spirit to the present version, but may differ in detail to 

address new problems or concerns. 
Each version is given a distinguishing version number. 

If  the  Program  specifies  a  version  number  of  this 

License which applies to it and “any later version”, you 

have the option of following the terms and conditions 

either of that version or of any later version published 

by the Free Software Foundation. If the Program does 

not  specify  a  version  number  of  this  License,  you 

may  choose  any  version  ever  published  by  the  Free 

Software Foundation. 
If  you  wish  to  incorporate  parts  of  the  Program  into 

10. 

other free programs whose distribution conditions are 

different, write to the author to ask for permission. For 

software  which  is  copyrighted  by  the  Free  Software 

Foundation, write to the Free Software Foundation; we 

sometimes make exceptions for this. Our decision will 

be guided by the two goals of preserving the free status 

of all derivatives of our free software and of promoting 

the sharing and reuse of software generally. 

NO WARRANTY

BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, 

11. 

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE 

EXTENT  PERMITTED  BY  APPLICABLE  LAW.  EXCEPT 

WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 

HOLDERS  AND/OR  OTHER  PARTIES  PROVIDE  THE 

PROGRAM  “AS  IS”  WITHOUT  WARRANTY  OF  ANY 

KIND,  EITHER  EXPRESSED  OR  IMPLIED,  INCLUDING, 

BUT  NOT  LIMITED TO, THE  IMPLIED WARRANTIES  OF 

MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 

PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND 

PERFORMANCE  OF  THE  PROGRAM  IS  WITH  YOU. 

SHOULD  THE  PROGRAM  PROVE  DEFECTIVE,  YOU 

ASSUME  THE  COST  OF  ALL  NECESSARY  SERVICING, 

REPAIR OR CORRECTION. 
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR 

12. 

AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, 

OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY  AND/OR 

REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, 

BE  LIABLE  TO  YOU  FOR  DAMAGES,  INCLUDING  ANY 

GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL 

DAMAGES ARISING OUT OF THE USE OR INABILITY TO 

USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO 

LOSS OF DATA OR DATA BEING RENDERED INACCURATE 

OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR 

A FAILURE OF THE PROGRAM TO OPERATE WITH ANY 

OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER 

PARTY  HAS  BEEN  ADVISED  OF  THE  POSSIBILITY  OF 

SUCH DAMAGES. 

END OF TERMS AND CONDITIONS

END OF SCHEDULE 2

Schedule 3

If  this  Linksys  product  contains  open  source  software 

licensed under Version 2.1 of the “GNU Lesser General Public 

License” then the license terms below in this Schedule 3 

will apply to that open source software. The license terms 

below in this Schedule 3 are from the public web site at  

http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

.

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: