background image

34

Appendix F

Software License Agreement

EtherFast Cable/DSL VPN Router with 4-Port Switch

If, as a consequence of a court judgment or allegation 

7. 

of  patent  infringement  or  for  any  other  reason  (not 

limited  to  patent  issues),  conditions  are  imposed  on 

you (whether by court order, agreement or otherwise) 

that contradict the conditions of this License, they do 

not excuse you from the conditions of this License. If 

you cannot distribute so as to satisfy simultaneously 

your  obligations  under  this  License  and  any  other 

pertinent  obligations,  then  as  a  consequence  you 

may  not  distribute  the  Program  at  all.  For  example, 

if  a  patent  license  would  not  permit  royalty-free 

redistribution of the Program by all those who receive 

copies directly or indirectly through you, then the only 

way you could satisfy both it and this License would be 

to refrain entirely from distribution of the Program. 
If  any  portion  of  this  section  is  held  invalid  or 

unenforceable  under  any  particular  circumstance, 

the  balance  of  the  section  is  intended  to  apply  and 

the  section  as  a  whole  is  intended  to  apply  in  other 

circumstances. 
It is not the purpose of this section to induce you to 

infringe any patents or other property right claims or 

to contest validity of any such claims; this section has 

the sole purpose of protecting the integrity of the free 

software  distribution  system,  which  is  implemented 

by  public  license  practices.  Many  people  have 

made  generous  contributions  to  the  wide  range  of 

software  distributed  through  that  system  in  reliance 

on  consistent  application  of  that  system;  it  is  up  to 

the  author/donor  to  decide  if  he  or  she  is  willing  to 

distribute  software  through  any  other  system  and  a 

licensee cannot impose that choice. 
This  section  is  intended  to  make  thoroughly  clear 

what is believed to be a consequence of the rest of this 

License. 
If  the  distribution  and/or  use  of  the  Program  is 

8. 

restricted in certain countries either by patents or by 

copyrighted  interfaces,  the  original  copyright  holder 

who places the Program under this License may add an 

explicit geographical distribution limitation excluding 

those countries, so that distribution is permitted only 

in or among countries not thus excluded. In such case, 

this License incorporates the limitation as if written in 

the body of this License. 
The  Free  Software  Foundation  may  publish  revised 

9. 

and/or  new  versions  of  the  General  Public  License 

from time to time. Such new versions will be similar in 

spirit to the present version, but may differ in detail to 

address new problems or concerns. 
Each version is given a distinguishing version number. 

If  the  Program  specifies  a  version  number  of  this 

License which applies to it and “any later version”, you 

have the option of following the terms and conditions 

either of that version or of any later version published 

by the Free Software Foundation. If the Program does 

not  specify  a  version  number  of  this  License,  you 

may  choose  any  version  ever  published  by  the  Free 

Software Foundation. 
If  you  wish  to  incorporate  parts  of  the  Program  into 

10. 

other free programs whose distribution conditions are 

different, write to the author to ask for permission. For 

software  which  is  copyrighted  by  the  Free  Software 

Foundation, write to the Free Software Foundation; we 

sometimes make exceptions for this. Our decision will 

be guided by the two goals of preserving the free status 

of all derivatives of our free software and of promoting 

the sharing and reuse of software generally. 

NO WARRANTY

BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, 

11. 

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE 

EXTENT  PERMITTED  BY  APPLICABLE  LAW.  EXCEPT 

WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 

HOLDERS  AND/OR  OTHER  PARTIES  PROVIDE  THE 

PROGRAM  “AS  IS”  WITHOUT  WARRANTY  OF  ANY 

KIND,  EITHER  EXPRESSED  OR  IMPLIED,  INCLUDING, 

BUT  NOT  LIMITED TO, THE  IMPLIED WARRANTIES  OF 

MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 

PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND 

PERFORMANCE  OF  THE  PROGRAM  IS  WITH  YOU. 

SHOULD  THE  PROGRAM  PROVE  DEFECTIVE,  YOU 

ASSUME  THE  COST  OF  ALL  NECESSARY  SERVICING, 

REPAIR OR CORRECTION. 
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR 

12. 

AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, 

OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY  AND/OR 

REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, 

BE  LIABLE  TO  YOU  FOR  DAMAGES,  INCLUDING  ANY 

GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL 

DAMAGES ARISING OUT OF THE USE OR INABILITY TO 

USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO 

LOSS OF DATA OR DATA BEING RENDERED INACCURATE 

OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR 

A FAILURE OF THE PROGRAM TO OPERATE WITH ANY 

OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER 

PARTY  HAS  BEEN  ADVISED  OF  THE  POSSIBILITY  OF 

SUCH DAMAGES. 

END OF TERMS AND CONDITIONS

END OF SCHEDULE 2

Schedule 3

If  this  Linksys  product  contains  open  source  software 

licensed under Version 2.1 of the “GNU Lesser General Public 

License” then the license terms below in this Schedule 3 

will apply to that open source software. The license terms 

below in this Schedule 3 are from the public web site at  

http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

.

Содержание Linksys EtherFast BEFVP41

Страница 1: ...USER GUIDE EtherFast Cable DSL VPN Router with 4 Port Switch Model BEFVP41 EU LA ...

Страница 2: ... address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com eu or www linksys com latam Support www linksys com support Glossary www li...

Страница 3: ...ty VPN 9 Access Restrictions 12 Applications and Gaming Port Range Forwarding 13 Applications Gaming Port Triggering 14 Applications and Gaming UPnP Forwarding 14 Applications and Gaming DMZ 15 Administration Management 15 Administration Log 16 Administration Diagnostics 17 Administration Factory Defaults 17 Administration Firmware Upgrade 18 Status Gateway 18 Status Local Network 18 Appendix A Tr...

Страница 4: ...tatement 25 Safety Notices 25 Industry Canada Statement 25 EC Declaration of Conformity Europe 25 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 26 Appendix F Software License Agreement 30 Software in Linksys Products 30 Software Licenses 30 ...

Страница 5: ...sing VPN client software to VPN Router TheVPN Router creates a tunnel or channel between two endpoints so that data transmissions between them are secure A computer with VPN client software can be one of the two endpoints For an Internet Protocol Security IPSec VPN tunnel the VPN Router and any computer with the built in IPSec SecurityManager Windows2000andXP cancreateaVPN tunnel using IPSec Windo...

Страница 6: ...ture attacks The VPN Router however does not leave the IP headers decrypted if you enable and set up Perfect Forward Secrecy PFS With PFS both the IP headers and secret keys used to secure the tunnel are encrypted The VPN Router allows users on your local network to secure their data over the Internet using VPN tunnels without having to purchase the extra client licenses that other VPN hardware ma...

Страница 7: ...r that port Internet Green The Internet LED lights up when there is a connection made through the Internet port A flashing LED indicates network activity over the Internet port Back Panel Reset There are two ways to reset the Router to its factory default settings Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds You can also restore ...

Страница 8: ...nter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Leave the User Name field blank The first time you open the web based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears is the Basic Setup screen ...

Страница 9: ... to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Rou...

Страница 10: ...setup information Connection Type Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server Enter the IP address of your ISP s Heart Beat server This is provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your...

Страница 11: ... to assign IP addresses to This number cannot be greater than 253 The default is 50 DHCP Address Range Displayed here is the range of available IP addresses Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP addres...

Страница 12: ...disabled the DHCP server feature is also disabled Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want RIP1 RIP1 Compatible or RIP2 ReceiveRIPVersion Tousedynamicroutingforreception of network data select the protocol you want RIP1 or RIP2 Static Routing A static route is a pre determined pathway that network informationmusttraveltoreachaspecifi...

Страница 13: ...A cookie is data stored on your computer and used by Internet sites when you interact with them Select this option to filter cookies Deselect the option to allow cookie usage Filter ActiveX ActiveX is a programming language for websites If youdenyActiveX youruntheriskofnothaving access to Internet sites created using this programming language Select this option to enable ActiveX filtering Deselect...

Страница 14: ...other end of the tunnel Local and Remote Secure Group Subnet The default is Subnet All computers on the local subnet will be able to access the tunnel IP and Mask Enter the appropriate addresses The default value of 0 should remain in the last fields of the IP and Mask settings IP Address Only the computer with a specific IP address will be able to access the tunnel IP Addr Enter the appropriate a...

Страница 15: ...nge and IKE proposals are secure Pre shared Key This specifies the pre shared key used to authenticate the remote IKE peer Based on this Pre shared key a key is generated to encrypt the data being transmitted over the tunnel at the end of the tunnel the key is decrypted Enter a key of up to 24 alphanumeric characters No special characters or spaces are allowed Both ends of the VPN tunnel must use ...

Страница 16: ...y to last before a re key negotiation between each endpoint is completed The default is 3600 seconds Phase 2 The Encryption Authentication and PFS settings are automatically displayed Group Select the Diffie Hellman Group which is a cryptographic technique that uses public and private keys for encryption and decryption Select 768 bit or 1024 bit Key Lifetime Enter the number of seconds you want th...

Страница 17: ...uring which the policy will be in effect or select 24 Hours Select any Blocked Services and enter a range of ports 7 in the fields provided If the service you want to block is not listed or you want to edit a service s settings then click Add Edit Service If you want to block websites with specific URL 8 addresses enter each URL in a separate field next to Website Blocking by URL Address If you wa...

Страница 18: ...rt For each application enter the starting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming UPnP Forwarding The UPnP Forwarding screen displays preset application settings as well as options to cust...

Страница 19: ...h is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc Ext Port Enter the number of the external port used by the server in the Ext Port column Check with the Internet application documentation for more information TCP UDP Select the protocol UDP or TCP for each application You cannot select both protocols Int Port Enter the number of the...

Страница 20: ...n SNMP agent such as the Router to the workstation console used to oversee the network The Router then returns information contained in a Management Information Base MIB a data structure that defines what is obtainable from the device and what can be controlled SNMP functions such as statistics configuration and device information are not available without third party management software The Route...

Страница 21: ... your changes Administration Diagnostics The ping test allows you to check the connections of your network devices including connection to the Internet Administration Diagnostics PingTest PingTest Parameters PingTarget IP Enter the address of the PC or other device whose connection you wish to test Ping Size Enter the number of bytes that will be sent The default is 60 bytes The range is 60 to 151...

Страница 22: ... extracted firmware upgrade file or click Browse to select the extracted firmware upgrade file Upgrade After you have selected the appropriate file click this option and follow the on screen instructions Status Gateway The Router screen displays information about the Router and its current settings Status Gateway Gateway Information Hardware Version The model and version numbers of the Router are ...

Страница 23: ...d DHCP Clients Table Click this option to view a list of PCs that are using the Router as a DHCP server DHCP Clients Table DHCP ClientTable The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The DHCP Server IP Address is the IP address of the Router The table lists the Client Hostname IP Address MAC Address and Interface for each DHCP client ...

Страница 24: ...rnet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser...

Страница 25: ...e Enter a Tunnel Name This name should be unique for 6 this particular tunnel For the Local Secure Group setting select 7 Subnet Then complete the IP and Mask fields refer to your local network s IP address scheme For the Remote Secure Group setting select 8 IP Addr Then enter the IP address of the remote computer on the other end of the tunnel For the Remote Security Gateway setting select 9 IP A...

Страница 26: ...ernet One 10 100 RJ 45 Port Local Network Four 10 100 RJ 45 Ports Cabling Type UTP Category 5 or Better LEDs Power Ethernet 1 4 Internet Environmental Dimensions 186 x 48 x 154 mm Unit Weight 360 g Power External 12VDC 1A Certifications FCC CE Operating Temp 0 to 45ºC 32 to 113ºF Storage Temp 20 to 70ºC 4 to 158ºF Operating Humidity 0 to 90 Noncondensing Storage Humidity 5 to 90 Noncondensing Spec...

Страница 27: ...h the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may...

Страница 28: ...ts not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the j...

Страница 29: ... an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning Industry Canada Statement This Class B di...

Страница 30: ...vropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo míst...

Страница 31: ...ημα από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déche...

Страница 32: ... elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ...

Страница 33: ...ôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje o...

Страница 34: ...S LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PAR...

Страница 35: ...nksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAU...

Страница 36: ...roprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be di...

Страница 37: ... the terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for ...

Страница 38: ... to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publ...

Страница 39: ...o warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company c...

Страница 40: ...ibrary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the...

Страница 41: ...e of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code ...

Страница 42: ...may not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as su...

Страница 43: ... software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITN...

Страница 44: ...includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is fr...

Страница 45: ...UPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another dis...

Отзывы: