background image

39

Appendix F

Software License Agreement

EtherFast Cable/DSL VPN Router with 4-Port Switch

software  distributed  through  that  system  in  reliance 

on  consistent  application  of  that  system;  it  is  up  to 

the  author/donor  to  decide  if  he  or  she  is  willing  to 

distribute  software  through  any  other  system  and  a 

licensee cannot impose that choice.
This  section  is  intended  to  make  thoroughly  clear 

what is believed to be a consequence of the rest of this 

License.
If the distribution and/or use of the Library is restricted 

12. 

in certain countries either by patents or by copyrighted 

interfaces,  the  original  copyright  holder  who  places 

the  Library  under  this  License  may  add  an  explicit 

geographical  distribution  limitation  excluding  those 

countries, so that distribution is permitted only in or 

among countries not thus excluded. In such case, this 

License incorporates the limitation as if written in the 

body of this License.
The  Free  Software  Foundation  may  publish  revised 

13. 

and/or  new  versions  of  the  Lesser  General  Public 

License from time to time. Such new versions will be 

similar in spirit to the present version, but may differ in 

detail to address new problems or concerns. 
Each version is given a distinguishing version number. 

If the Library specifies a version number of this License 

which applies to it and “any later version”, you have the 

option of following the terms and conditions either of 

that version or of any later version published by the Free 

Software Foundation. If the Library does not specify a 

license version number, you may choose any version 

ever published by the Free Software Foundation.
If  you  wish  to  incorporate  parts  of  the  Library  into 

14. 

other free programs whose distribution conditions are 

incompatible with these, write to the author to ask for 

permission. For software which is copyrighted by the 

Free Software Foundation, write to the Free Software 

Foundation;  we  sometimes  make  exceptions  for 

this. Our decision will be guided by the two goals of 

preserving the free status of all derivatives of our free 

software and of promoting the sharing and reuse of 

software generally.

NO WARRANTY

BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, 

15. 

THERE  IS  NO  WARRANTY  FOR  THE  LIBRARY,  TO  THE 

EXTENT  PERMITTED  BY  APPLICABLE  LAW.  EXCEPT 

WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 

HOLDERS  AND/OR  OTHER  PARTIES  PROVIDE  THE 

LIBRARY “AS  IS” WITHOUT WARRANTY  OF  ANY  KIND, 

EITHER  EXPRESSED  OR  IMPLIED,  INCLUDING,  BUT 

NOT  LIMITED  TO,  THE  IMPLIED  WARRANTIES  OF 

MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 

PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND 

PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD 

THE  LIBRARY  PROVE  DEFECTIVE,  YOU  ASSUME  THE 

COST  OF  ALL  NECESSARY  SERVICING,  REPAIR  OR 

CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 

16. 

OR  AGREED  TO  IN  WRITING  WILL  ANY  COPYRIGHT 

HOLDER,  OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY 

AND/OR  REDISTRIBUTE  THE  LIBRARY  AS  PERMITTED 

ABOVE,  BE  LIABLE  TO  YOU  FOR  DAMAGES, 

INCLUDING  ANY  GENERAL,  SPECIAL,  INCIDENTAL  OR 

CONSEQUENTIAL  DAMAGES  ARISING  OUT  OF  THE 

USE  OR  INABILITY TO  USE THE  LIBRARY  (INCLUDING 

BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 

RENDERED  INACCURATE  OR  LOSSES  SUSTAINED  BY 

YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY 

TO  OPERATE WITH  ANY  OTHER  SOFTWARE),  EVEN  IF 

SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED 

OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

END OF SCHEDULE 3

Schedule 4

If  this  Linksys  product  contains  open  source  software 

licensed under the OpenSSL license:
This  product  includes  software  developed  by  the 

OpenSSL  Project  for  use  in  the  OpenSSL  Toolkit.  

(

http://www.openssl.org/

).

This product includes cryptographic software written by 

Eric Young ([email protected]).
This  product  includes  software  written  by  Tim  Hudson 

([email protected]).
In  addition,  if  this  Linksys  product  contains  open 

source  software  licensed  under  the  OpenSSL  license 

then  the  license  terms  below  in  this  Schedule  3  will 

apply  to  that  open  source  software.  The  license  terms 

below in this Schedule 3 are from the public web site at  

http://www.openssl.org/source/license.html

.

The OpenSSL toolkit stays under a dual license, i.e. both 

the  conditions  of  the  OpenSSL  License  and  the  original 

SSLeay  license  apply  to  the  toolkit.  See  below  for  the 

actual license texts. Actually both licenses are BSD-style 

Open Source licenses. In case of any license issues related 

to OpenSSL please contact [email protected].

Содержание Linksys EtherFast BEFVP41

Страница 1: ...USER GUIDE EtherFast Cable DSL VPN Router with 4 Port Switch Model BEFVP41 EU LA ...

Страница 2: ... address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com eu or www linksys com latam Support www linksys com support Glossary www li...

Страница 3: ...ty VPN 9 Access Restrictions 12 Applications and Gaming Port Range Forwarding 13 Applications Gaming Port Triggering 14 Applications and Gaming UPnP Forwarding 14 Applications and Gaming DMZ 15 Administration Management 15 Administration Log 16 Administration Diagnostics 17 Administration Factory Defaults 17 Administration Firmware Upgrade 18 Status Gateway 18 Status Local Network 18 Appendix A Tr...

Страница 4: ...tatement 25 Safety Notices 25 Industry Canada Statement 25 EC Declaration of Conformity Europe 25 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 26 Appendix F Software License Agreement 30 Software in Linksys Products 30 Software Licenses 30 ...

Страница 5: ...sing VPN client software to VPN Router TheVPN Router creates a tunnel or channel between two endpoints so that data transmissions between them are secure A computer with VPN client software can be one of the two endpoints For an Internet Protocol Security IPSec VPN tunnel the VPN Router and any computer with the built in IPSec SecurityManager Windows2000andXP cancreateaVPN tunnel using IPSec Windo...

Страница 6: ...ture attacks The VPN Router however does not leave the IP headers decrypted if you enable and set up Perfect Forward Secrecy PFS With PFS both the IP headers and secret keys used to secure the tunnel are encrypted The VPN Router allows users on your local network to secure their data over the Internet using VPN tunnels without having to purchase the extra client licenses that other VPN hardware ma...

Страница 7: ...r that port Internet Green The Internet LED lights up when there is a connection made through the Internet port A flashing LED indicates network activity over the Internet port Back Panel Reset There are two ways to reset the Router to its factory default settings Use a straightened paper clip or similar object to press and hold the Reset button for approximately five seconds You can also restore ...

Страница 8: ...nter the Router s default IP address 192 168 1 1 in the Address field Then press Enter A login screen will appear Leave the User Name field blank The first time you open the web based utility use the default password admin You can set a new password from the Administration Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears is the Basic Setup screen ...

Страница 9: ... to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Rou...

Страница 10: ...setup information Connection Type Heart Beat Signal User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server Enter the IP address of your ISP s Heart Beat server This is provided by your ISP Connect on Demand Max Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your...

Страница 11: ... to assign IP addresses to This number cannot be greater than 253 The default is 50 DHCP Address Range Displayed here is the range of available IP addresses Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased this dynamic IP addres...

Страница 12: ...disabled the DHCP server feature is also disabled Transmit RIP Version To use dynamic routing for transmission of network data select the protocol you want RIP1 RIP1 Compatible or RIP2 ReceiveRIPVersion Tousedynamicroutingforreception of network data select the protocol you want RIP1 or RIP2 Static Routing A static route is a pre determined pathway that network informationmusttraveltoreachaspecifi...

Страница 13: ...A cookie is data stored on your computer and used by Internet sites when you interact with them Select this option to filter cookies Deselect the option to allow cookie usage Filter ActiveX ActiveX is a programming language for websites If youdenyActiveX youruntheriskofnothaving access to Internet sites created using this programming language Select this option to enable ActiveX filtering Deselect...

Страница 14: ...other end of the tunnel Local and Remote Secure Group Subnet The default is Subnet All computers on the local subnet will be able to access the tunnel IP and Mask Enter the appropriate addresses The default value of 0 should remain in the last fields of the IP and Mask settings IP Address Only the computer with a specific IP address will be able to access the tunnel IP Addr Enter the appropriate a...

Страница 15: ...nge and IKE proposals are secure Pre shared Key This specifies the pre shared key used to authenticate the remote IKE peer Based on this Pre shared key a key is generated to encrypt the data being transmitted over the tunnel at the end of the tunnel the key is decrypted Enter a key of up to 24 alphanumeric characters No special characters or spaces are allowed Both ends of the VPN tunnel must use ...

Страница 16: ...y to last before a re key negotiation between each endpoint is completed The default is 3600 seconds Phase 2 The Encryption Authentication and PFS settings are automatically displayed Group Select the Diffie Hellman Group which is a cryptographic technique that uses public and private keys for encryption and decryption Select 768 bit or 1024 bit Key Lifetime Enter the number of seconds you want th...

Страница 17: ...uring which the policy will be in effect or select 24 Hours Select any Blocked Services and enter a range of ports 7 in the fields provided If the service you want to block is not listed or you want to edit a service s settings then click Add Edit Service If you want to block websites with specific URL 8 addresses enter each URL in a separate field next to Website Blocking by URL Address If you wa...

Страница 18: ...rt For each application enter the starting and ending port numbers of the forwarded port number range Check with the Internet application documentation for the port number s needed Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming UPnP Forwarding The UPnP Forwarding screen displays preset application settings as well as options to cust...

Страница 19: ...h is a data structure that defines what is obtainable from the device and what can be controlled turned off on etc Ext Port Enter the number of the external port used by the server in the Ext Port column Check with the Internet application documentation for more information TCP UDP Select the protocol UDP or TCP for each application You cannot select both protocols Int Port Enter the number of the...

Страница 20: ...n SNMP agent such as the Router to the workstation console used to oversee the network The Router then returns information contained in a Management Information Base MIB a data structure that defines what is obtainable from the device and what can be controlled SNMP functions such as statistics configuration and device information are not available without third party management software The Route...

Страница 21: ... your changes Administration Diagnostics The ping test allows you to check the connections of your network devices including connection to the Internet Administration Diagnostics PingTest PingTest Parameters PingTarget IP Enter the address of the PC or other device whose connection you wish to test Ping Size Enter the number of bytes that will be sent The default is 60 bytes The range is 60 to 151...

Страница 22: ... extracted firmware upgrade file or click Browse to select the extracted firmware upgrade file Upgrade After you have selected the appropriate file click this option and follow the on screen instructions Status Gateway The Router screen displays information about the Router and its current settings Status Gateway Gateway Information Hardware Version The model and version numbers of the Router are ...

Страница 23: ...d DHCP Clients Table Click this option to view a list of PCs that are using the Router as a DHCP server DHCP Clients Table DHCP ClientTable The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router The DHCP Server IP Address is the IP address of the Router The table lists the Client Hostname IP Address MAC Address and Interface for each DHCP client ...

Страница 24: ...rnet port The Router does not replace your modem You still need your DSL modem in order to use the Router Connect the telephone line to the DSL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser...

Страница 25: ...e Enter a Tunnel Name This name should be unique for 6 this particular tunnel For the Local Secure Group setting select 7 Subnet Then complete the IP and Mask fields refer to your local network s IP address scheme For the Remote Secure Group setting select 8 IP Addr Then enter the IP address of the remote computer on the other end of the tunnel For the Remote Security Gateway setting select 9 IP A...

Страница 26: ...ernet One 10 100 RJ 45 Port Local Network Four 10 100 RJ 45 Ports Cabling Type UTP Category 5 or Better LEDs Power Ethernet 1 4 Internet Environmental Dimensions 186 x 48 x 154 mm Unit Weight 360 g Power External 12VDC 1A Certifications FCC CE Operating Temp 0 to 45ºC 32 to 113ºF Storage Temp 20 to 70ºC 4 to 158ºF Operating Humidity 0 to 90 Noncondensing Storage Humidity 5 to 90 Noncondensing Spec...

Страница 27: ...h the product or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may...

Страница 28: ...ts not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the j...

Страница 29: ... an experienced radio TV technician for assistance Safety Notices Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning Industry Canada Statement This Class B di...

Страница 30: ...vropská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo míst...

Страница 31: ...ημα από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déche...

Страница 32: ... elavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ...

Страница 33: ...ôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje o...

Страница 34: ...S LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PAR...

Страница 35: ...nksys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAU...

Страница 36: ...roprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be di...

Страница 37: ... the terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for ...

Страница 38: ... to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publ...

Страница 39: ...o warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company c...

Страница 40: ...ibrary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the...

Страница 41: ...e of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code ...

Страница 42: ...may not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as su...

Страница 43: ... software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITN...

Страница 44: ...includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is fr...

Страница 45: ...UPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another dis...

Отзывы: