background image

33

Appendix E

Software License Agreement

Wireless-G USB Network Adapter

Thus,  it  is  not  the  intent  of  this  section  to  claim 

rights or contest your rights to work written entirely 

by you; rather, the intent is to exercise the right to 

control the distribution of derivative or collective 

works based on the Library.
In  addition,  mere  aggregation  of  another  work 

not based on the Library with the Library (or with 

a  work  based  on  the  Library)  on  a  volume  of  a 

storage or distribution medium does not bring the 

other work under the scope of this License.

You may opt to apply the terms of the ordinary GNU 

3. 

General  Public  License  instead  of  this  License  to  a 

given copy of the Library. To do this, you must alter all 

the notices that refer to this License, so that they refer 

to  the  ordinary  GNU  General  Public  License,  version 

2, instead of to this License. (If a newer version than 

version 2 of the ordinary GNU General Public License 

has  appeared,  then  you  can  specify  that  version 

instead if you wish.) Do not make any other change in 

these notices.
Once  this  change  is  made  in  a  given  copy,  it  is 

irreversible for that copy, so the ordinary GNU General 

Public  License  applies  to  all  subsequent  copies  and 

derivative works made from that copy.
This option is useful when you wish to copy part of the 

code of the Library into a program that is not a library.
You may copy and distribute the Library (or a portion 

4. 

or derivative of it, under Section 2) in object code or 

executable  form  under  the  terms  of  Sections  1  and 

2  above  provided  that  you  accompany  it  with  the 

complete  corresponding  machine-readable  source 

code,  which  must  be  distributed  under  the  terms  of 

Sections 1 and 2 above on a medium customarily used 

for software interchange.
If  distribution  of  object  code  is  made  by  offering 

access to copy from a designated place, then offering 

equivalent  access  to  copy  the  source  code  from  the 

same  place  satisfies  the  requirement  to  distribute 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code.
A program that contains no derivative of any portion 

5. 

of the Library, but is designed to work with the Library 

by being compiled or linked with it, is called a “work 

that uses the Library”. Such a work, in isolation, is not 

a  derivative  work  of  the  Library,  and  therefore  falls 

outside the scope of this License.
However,  linking  a “work  that  uses  the  Library”  with 

the Library creates an executable that is a derivative 

of  the  Library  (because  it  contains  portions  of  the 

Library), rather than a “work that uses the library”. The 

executable is therefore covered by this License. Section 

6 states terms for distribution of such executables.

When a “work that uses the Library” uses material from 

a header file that is part of the Library, the object code 

for the work may be a derivative work of the Library 

even  though  the  source  code  is  not. Whether  this  is 

true is especially significant if the work can be linked 

without the Library, or if the work is itself a library. The 

threshold for this to be true is not precisely defined by 

law.
If such an object file uses only numerical parameters, 

data structure layouts and accessors, and small macros 

and small inline functions (ten lines or less in length), 

then the use of the object file is unrestricted, regardless 

of whether it is legally a derivative work. (Executables 

containing this object code plus portions of the Library 

will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you 

may distribute the object code for the work under the 

terms  of  Section  6.  Any  executables  containing  that 

work also fall under Section 6, whether or not they are 

linked directly with the Library itself.
As an exception to the Sections above, you may also 

6. 

combine or link a “work that uses the Library” with the 

Library to produce a work containing portions of the 

Library, and distribute that work under terms of your 

choice,  provided  that  the  terms  permit  modification 

of  the  work  for  the  customer’s  own  use  and  reverse 

engineering for debugging such modifications.
You  must  give  prominent  notice  with  each  copy  of 

the  work  that  the  Library  is  used  in  it  and  that  the 

Library  and  its  use  are  covered  by  this  License.  You 

must supply a copy of this License. If the work during 

execution displays copyright notices, you must include 

the copyright notice for the Library among them, as 

well as a reference directing the user to the copy of this 

License. Also, you must do one of these things:

Accompany  the  work  with  the  complete 

a) 

corresponding  machine-readable  source  code 

for  the  Library  including  whatever  changes  were 

used  in  the  work  (which  must  be  distributed 

under  Sections  1  and  2  above);  and,  if  the  work 

is an executable linked with the Library, with the 

complete  machine-readable  “work  that  uses  the 

Library”, as object code and/or source code, so that 

the  user  can  modify  the  Library  and  then  relink 

to produce a modified executable containing the 

modified  Library.  (It  is  understood  that  the  user 

who changes the contents of definitions files in the 

Library will not necessarily be able to recompile the 

application to use the modified definitions.)

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: