background image

31

Appendix F

Software License Agreement

EtherFast Cable/DSL VPN Router with 4-Port Switch

your Linksys product and/or the Software is being used in 

accordance with the terms of this Agreement; (iii) to provide 

improvements to the way Linksys delivers technology to 

you and to other Linksys customers; (iv) to enable Linksys 

to comply with the terms of any agreements it has with 

any  third  parties  regarding  your  Linksys  product  and/or 

Software and/or (v) to enable Linksys to comply with all 

applicable  laws  and/or  regulations,  or  the  requirements 

of  any  regulatory  authority  or  government  agency. 

Linksys  and/  or  its  affiliates  may  collect  and  process 

this  information  provided  that  it  does  not  identify  you 

personally. Your  use  of  your  Linksys  product  and/or  the 

Software constitutes this consent by you to Linksys and/

or its affiliates’ collection and use of such information and, 

for EEA customers, to the transfer of such information to a 

location outside the EEA.

Software  Upgrades  etc.

  If  the  Software  enables  you  to 

receive  Upgrades,  you  may  elect  at  any  time  to  receive 

these  Upgrades  either  automatically  or  manually.  If  you 

elect  to  receive  Upgrades  manually  or  you  otherwise 

elect not to receive or be notified of any Upgrades, you 

may  expose  your  Linksys  product  and/or  the  Software 

to  serious  security  threats  and/or  some  features  within 

your  Linksys  product  and/or  Software  may  become 

inaccessible.  There  may  be  circumstances  where  we 

apply an Upgrade automatically in order to comply with 

changes  in  legislation,  legal  or  regulatory  requirements 

or as a result of requirements to comply with the terms 

of  any  agreements  Linksys  has  with  any  third  parties 

regarding your Linksys product and/or the Software. You 

will always be notified of any Upgrades being delivered 

to  you. The  terms  of  this  license  will  apply  to  any  such 

Upgrade unless the Upgrade in question is accompanied 

by  a  separate  license,  in  which  event  the  terms  of  that 

license will apply.

Open  Source  Software.

  The  GPL  or  other  open  source 

code incorporated into the Software and the open source 

license for such source code are available for free download 

at 

http://www.linksys.com/gpl

. If You would like a copy 

of the GPL or other open source code in this Software on a 

CD, Linksys will mail to You a CD with such code for $9.99 

plus the cost of shipping, upon request.

Term  and  Termination.

 You  may  terminate  this  License 

at  any  time  by  destroying  all  copies  of  the  Software 

and  documentation.  Your  rights  under  this  License  will 

terminate immediately without notice from Linksys if You 

fail to comply with any provision of this Agreement.

Limited  Warranty.

  The  warranty  terms  and  period 

specified  in  the  applicable  Linksys  Product  User  Guide 

shall also apply to the Software.

Disclaimer of Liabilities.

 IN NO EVENT WILL LINKSYS OR 

ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE 

OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 

INCIDENTAL  OR  PUNITIVE  DAMAGES,  REGARDLESS  OF 

CAUSE  (INCLUDING  NEGLIGENCE),  ARISING  OUT  OF 

OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO  USE  THE 

SOFTWARE,  EVEN  IF  LINKSYS  HAS  BEEN  ADVISED  OF 

THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL 

LINKSYS’  LIABILITY  EXCEED  THE  AMOUNT  PAID  BY  YOU 

FOR THE  PRODUCT. The  foregoing  limitations  will  apply 

even if any warranty or remedy under this Agreement fails 

of its essential purpose. Some jurisdictions do not allow 

the exclusion or limitation of incidental or consequential 

damages,  so  the  above  limitation  or  exclusion  may  not 

apply to You.

Export.

 Software, including technical data, may be subject 

to U.S. export control laws and regulations and/or export 

or  import  regulations  in  other  countries.  You  agree  to 

comply strictly with all such laws and regulations.

U.S. Government Users.

 The Software and documentation 

qualify as “commercial items” as defined at 48 C.F.R. 2.101 

and  48  C.F.R.  12.212.  All  Government  users  acquire  the 

Software  and  documentation  with  only  those  rights 

herein that apply to non-governmental customers.

General Terms.

 This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 

California, without reference to conflict of laws principles. 

The  United  Nations  Convention  on  Contracts  for  the 

International Sale of Goods will not apply. If any portion 

of this Agreement is found to be void or unenforceable, 

the  remaining  provisions  will  remain  in  full  force  and 

effect. This Agreement constitutes the entire agreement 

between  the  parties  with  respect  to  the  Software  and 

supersedes any conflicting or additional terms contained 

in any purchase order or elsewhere.

END OF SCHEDULE 1

Schedule 2

If  this  Linksys  product  contains  open  source  software 

licensed  under  Version  2  of  the  “GNU  General  Public 

License” then the license terms below in this Schedule 2 

will apply to that open source software. The license terms 

below in this Schedule 2 are from the public web site at 

http://www.gnu.org/copyleft/gpl.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991 
Copyright © 1989, 1991 Free Software Foundation, Inc. 
51  Franklin  Street,  Fifth  Floor,  Boston,  MA  02110-1301, 

USA
Everyone  is  permitted  to  copy  and  distribute  verbatim 

copies  of  this  license  document,  but  changing  it  is  not 

allowed.

Preamble

The licenses for most software are designed to take away 

your  freedom  to  share  and  change  it.  By  contrast,  the 

Содержание Linksys EtherFast BEFVP41

Страница 1: ...USER GUIDE EtherFast Cable DSL VPN Router with 4 Port Switch Model BEFVP41 EU LA ...

Страница 2: ... address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com eu or www linksys com latam Support www linksys com support Glossary www li...

Страница 3: ...ty VPN 9 Access Restrictions 12 Applications and Gaming Port Range Forwarding 13 Applications Gaming Port Triggering 14 Applications and Gaming UPnP Forwarding 14 Applications and Gaming DMZ 15 Administration Management 15 Administration Log 16 Administration Diagnostics 17 Administration Factory Defaults 17 Administration Firmware Upgrade 18 Status Gateway 18 Status Local Network 18 Appendix A Tr...

Страница 4: ...tatement 25 Safety Notices 25 Industry Canada Statement 25 EC Declaration of Conformity Europe 25 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 26 Appendix F Software License Agreement 30 Software in Linksys Products 30 Software Licenses 30 ...

Страница 5: ...sing VPN client software to VPN Router TheVPN Router creates a tunnel or channel between two endpoints so that data transmissions between them are secure A computer with VPN client software can be one of the two endpoints For an Internet Protocol Security IPSec VPN tunnel the VPN Router and any computer with the built in IPSec SecurityManager Windows2000andXP cancreateaVPN tunnel using IPSec Windo...

Страница 6: ...ture attacks The VPN Router however does not leave the IP headers decrypted if you enable and set up Perfect Forward Secrecy PFS With PFS both the IP headers and secret keys used to secure the tunnel are encrypted The VPN Router allows users on your local network to secure their data over the Internet using VPN tunnels without having to purchase the extra client licenses that other VPN hardware ma...

Страница 7: ...r that port Internet Green The Internet LED lights up when there is a connection made through the Internet port A flashing LED indicates network activity over the Internet port Back Panel Reset There are two ways to reset the Router to its factory default settings Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds You can also restore ...

Страница 8: ...nter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Leave the User Name field blank The first time you open the web based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears is the Basic Setup screen ...

Страница 9: ... to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Rou...

Страница 10: ...setup information Connection Type Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server Enter the IP address of your ISP s Heart Beat server This is provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your...

Страница 11: ... to assign IP addresses to This number cannot be greater than 253 The default is 50 DHCP Address Range Displayed here is the range of available IP addresses Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP addres...

Страница 12: ...disabled the DHCP server feature is also disabled Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want RIP1 RIP1 Compatible or RIP2 ReceiveRIPVersion Tousedynamicroutingforreception of network data select the protocol you want RIP1 or RIP2 Static Routing A static route is a pre determined pathway that network informationmusttraveltoreachaspecifi...

Страница 13: ...A cookie is data stored on your computer and used by Internet sites when you interact with them Select this option to filter cookies Deselect the option to allow cookie usage Filter ActiveX ActiveX is a programming language for websites If youdenyActiveX youruntheriskofnothaving access to Internet sites created using this programming language Select this option to enable ActiveX filtering Deselect...

Страница 14: ...other end of the tunnel Local and Remote Secure Group Subnet The default is Subnet All computers on the local subnet will be able to access the tunnel IP and Mask Enter the appropriate addresses The default value of 0 should remain in the last fields of the IP and Mask settings IP Address Only the computer with a specific IP address will be able to access the tunnel IP Addr Enter the appropriate a...

Страница 15: ...nge and IKE proposals are secure Pre shared Key This specifies the pre shared key used to authenticate the remote IKE peer Based on this Pre shared key a key is generated to encrypt the data being transmitted over the tunnel at the end of the tunnel the key is decrypted Enter a key of up to 24 alphanumeric characters No special characters or spaces are allowed Both ends of the VPN tunnel must use ...

Страница 16: ...y to last before a re key negotiation between each endpoint is completed The default is 3600 seconds Phase 2 The Encryption Authentication and PFS settings are automatically displayed Group Select the Diffie Hellman Group which is a cryptographic technique that uses public and private keys for encryption and decryption Select 768 bit or 1024 bit Key Lifetime Enter the number of seconds you want th...

Страница 17: ...uring which the policy will be in effect or select 24 Hours Select any Blocked Services and enter a range of ports 7 in the fields provided If the service you want to block is not listed or you want to edit a service s settings then click Add Edit Service If you want to block websites with specific URL 8 addresses enter each URL in a separate field next to Website Blocking by URL Address If you wa...

Страница 18: ...rt For each application enter the starting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming UPnP Forwarding The UPnP Forwarding screen displays preset application settings as well as options to cust...

Страница 19: ...h is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc Ext Port Enter the number of the external port used by the server in the Ext Port column Check with the Internet application documentation for more information TCP UDP Select the protocol UDP or TCP for each application You cannot select both protocols Int Port Enter the number of the...

Страница 20: ...n SNMP agent such as the Router to the workstation console used to oversee the network The Router then returns information contained in a Management Information Base MIB a data structure that defines what is obtainable from the device and what can be controlled SNMP functions such as statistics configuration and device information are not available without third party management software The Route...

Страница 21: ... your changes Administration Diagnostics The ping test allows you to check the connections of your network devices including connection to the Internet Administration Diagnostics PingTest PingTest Parameters PingTarget IP Enter the address of the PC or other device whose connection you wish to test Ping Size Enter the number of bytes that will be sent The default is 60 bytes The range is 60 to 151...

Страница 22: ... extracted firmware upgrade file or click Browse to select the extracted firmware upgrade file Upgrade After you have selected the appropriate file click this option and follow the on screen instructions Status Gateway The Router screen displays information about the Router and its current settings Status Gateway Gateway Information Hardware Version The model and version numbers of the Router are ...

Страница 23: ...d DHCP Clients Table Click this option to view a list of PCs that are using the Router as a DHCP server DHCP Clients Table DHCP ClientTable The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The DHCP Server IP Address is the IP address of the Router The table lists the Client Hostname IP Address MAC Address and Interface for each DHCP client ...

Страница 24: ...rnet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser...

Страница 25: ...e Enter a Tunnel Name This name should be unique for 6 this particular tunnel For the Local Secure Group setting select 7 Subnet Then complete the IP and Mask fields refer to your local network s IP address scheme For the Remote Secure Group setting select 8 IP Addr Then enter the IP address of the remote computer on the other end of the tunnel For the Remote Security Gateway setting select 9 IP A...

Страница 26: ...ernet One 10 100 RJ 45 Port Local Network Four 10 100 RJ 45 Ports Cabling Type UTP Category 5 or Better LEDs Power Ethernet 1 4 Internet Environmental Dimensions 186 x 48 x 154 mm Unit Weight 360 g Power External 12VDC 1A Certifications FCC CE Operating Temp 0 to 45ºC 32 to 113ºF Storage Temp 20 to 70ºC 4 to 158ºF Operating Humidity 0 to 90 Noncondensing Storage Humidity 5 to 90 Noncondensing Spec...

Страница 27: ...h the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may...

Страница 28: ...ts not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the j...

Страница 29: ... an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning Industry Canada Statement This Class B di...

Страница 30: ...vropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo míst...

Страница 31: ...ημα από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déche...

Страница 32: ... elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ...

Страница 33: ...ôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje o...

Страница 34: ...S LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PAR...

Страница 35: ...nksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAU...

Страница 36: ...roprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be di...

Страница 37: ... the terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for ...

Страница 38: ... to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publ...

Страница 39: ...o warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company c...

Страница 40: ...ibrary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the...

Страница 41: ...e of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code ...

Страница 42: ...may not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as su...

Страница 43: ... software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITN...

Страница 44: ...includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is fr...

Страница 45: ...UPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another dis...

Отзывы: