background image

37

Wireless-G Broadband Router with SpeedBooster

Appendix E

Software License Agreement

If the modified program normally reads commands 

c. 

interactively  when  run,  you  must  cause  it,  when 

started running for such interactive use in the most 

ordinary way, to print or display an announcement 

including  an  appropriate  copyright  notice  and 

a notice that there is no warranty (or else, saying 

that  you  provide  a  warranty)  and  that  users  may 

redistribute  the  program  under  these  conditions, 

and  telling  the  user  how  to  view  a  copy  of 

this  License.  (Exception:  if  the  Program  itself  is 

interactive  but  does  not  normally  print  such  an 

announcement, your work based on the Program 

is not required to print an announcement.) 

These  requirements  apply  to  the  modified  work  as 

a  whole.  If  identifiable  sections  of  that  work  are  not 

derived  from  the  Program,  and  can  be  reasonably 

considered  independent  and  separate  works  in 

themselves,  then  this  License,  and  its  terms,  do  not 

apply to those sections when you distribute them as 

separate  works.  But  when  you  distribute  the  same 

sections as part of a whole which is a work based on 

the Program, the distribution of the whole must be on 

the terms of this License, whose permissions for other 

licensees extend to the entire whole, and thus to each 

and every part regardless of who wrote it. 
Thus, it is not the intent of this section to claim rights 

or contest your rights to work written entirely by you; 

rather, the intent is to exercise the right to control the 

distribution of derivative or collective works based on 

the Program. 
In  addition,  mere  aggregation  of  another  work  not 

based  on  the  Program  with  the  Program  (or  with  a 

work based on the Program) on a volume of a storage 

or distribution medium does not bring the other work 

under the scope of this License. 
You  may  copy  and  distribute  the  Program  (or  a 

3. 

work based on it, under Section 2) in object code or 

executable form under the terms of Sections 1 and 2 

above provided that you also do one of the following: 

Accompany  it  with  the  complete  corresponding 

a. 

machine-readable  source  code,  which  must  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 
Accompany it with a written offer, valid for at least 

b. 

three  years,  to  give  any  third  party,  for  a  charge 

no  more  than  your  cost  of  physically  performing 

source distribution, a complete machine-readable 

copy  of  the  corresponding  source  code,  to  be 

distributed  under  the  terms  of  Sections  1  and  2 

above on a medium customarily used for software 

interchange; or, 

Accompany it with the information you received as 

c. 

to the offer to distribute corresponding source code. 

(This alternative is allowed only for noncommercial 

distribution and only if you received the program 

in  object  code  or  executable  form  with  such  an 

offer, in accord with Subsection b above.) 

The source code for a work means the preferred form 

of  the  work  for  making  modifications  to  it.  For  an 

executable  work,  complete  source  code  means  all 

the source code for all modules it contains, plus any 

associated  interface  definition  files,  plus  the  scripts 

used  to  control  compilation  and  installation  of  the 

executable. However, as a special exception, the source 

code  distributed  need  not  include  anything  that  is 

normally distributed (in either source or binary form) 

with the major components (compiler, kernel, and so 

on) of the operating system on which the executable 

runs,  unless  that  component  itself  accompanies  the 

executable. 
If  distribution  of  executable  or  object  code  is  made 

by  offering  access  to  copy  from  a  designated  place, 

then  offering  equivalent  access  to  copy  the  source 

code  from  the  same  place  counts  as  distribution  of 

the  source  code,  even  though  third  parties  are  not 

compelled to copy the source along with the object 

code. 
You  may  not  copy,  modify,  sublicense,  or  distribute 

4. 

the  Program  except  as  expressly  provided  under 

this License. Any attempt otherwise to copy, modify, 

sublicense or distribute the Program is void, and will 

automatically terminate your rights under this License. 

However, parties who have received copies, or rights, 

from you under this License will not have their licenses 

terminated  so  long  as  such  parties  remain  in  full 

compliance. 
You are not required to accept this License, since you 

5. 

have not signed it. However, nothing else grants you 

permission to modify or distribute the Program or its 

derivative works. These actions are prohibited by law if 

you do not accept this License. Therefore, by modifying 

or distributing the Program (or any work based on the 

Program), you indicate your acceptance of this License 

to do so, and all its terms and conditions for copying, 

distributing or modifying the Program or works based 

on it. 
Each time you redistribute the Program (or any work 

6. 

based  on  the  Program),  the  recipient  automatically 

receives  a  license  from  the  original  licensor  to  copy, 

distribute  or  modify  the  Program  subject  to  these 

terms and conditions. You may not impose any further 

restrictions  on  the  recipients’  exercise  of  the  rights 

granted herein. You are not responsible for enforcing 

compliance by third parties to this License. 

Содержание Linksys WRT54GS2

Страница 1: ...USER GUIDE Wireless G Broadband Router with SpeedBooster Model WRT54GS2 ...

Страница 2: ...ebsite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Net...

Страница 3: ...Wireless MAC Filter 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming Port Triggering 18 Applications and Gaming DMZ 18 Applications and Gaming QoS 18 Administration Management 19 Administration Log 20 Administration Diagnostics 20 Administration Factory Defaults 21...

Страница 4: ...ices 28 Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilité concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 30 Appendix E Software License Agreement 34 Software in Linksys Products 34 Software Licenses 34 ...

Страница 5: ...device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Green The Wireless LED lights up when the wireless feature is enabled If the LED is flashing the...

Страница 6: ...ctions Determine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with ...

Страница 7: ...ive you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in your home so that only those computers can...

Страница 8: ...92 168 1 1 in the Address field Then press Enter A password request screen appears Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the web based utility enter the password you created during the Setup Wizard If you did not create a new password use the default password admin You can set a new password from the Administration tab s Management s...

Страница 9: ...nutes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 5 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often yo...

Страница 10: ... you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Internet Connection Type Telstra Cable User Name and Password Enter the User Name and Password provided by your ISP Heart Beat Server This ...

Страница 11: ...imum Number of DHCP Users Enter the maximum number of computers that you want the DHCP server to assign IP addresses to This number cannot be greater than 253 The default is 50 Client Lease Time The Client Lease Time is the amount of time a network user will be allowed connection to the Router with their current dynamic IP address Enter the amount of time in minutes that the user will be leased th...

Страница 12: ...isplayed here Because it is dynamic it will change Status The status of the DDNS service connection is displayed here Click Save Settings to apply your changes or click Cancel Changes to cancel your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Becaus...

Страница 13: ... wireless networks You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet Select set number To set up a static route between the Router and another network select a number from the Static Routing drop down list A static route is a pre determinedpathwaythatn...

Страница 14: ... devices in your network select Disabled Wireless Network Name SSID The SSID is the network name shared among all points in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 characters use any of the characters on the keyboard Make sure this setting is the same for all points in your wireless network For added security...

Страница 15: ...reless Wireless Security The Wireless Security settings configure the security of your wireless network There are six wireless security mode options supported by the Router WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise RADIUS and WEP WPA stands for Wi Fi Protected Access which is a security standard stronger than WEP encryption WPA2 is a more advanced more secure version of WPA WEP sta...

Страница 16: ...eout Enter a Key Renewal Timeout period which instructs the Router how often it should change the encryption keys The default Key Renewal Timeout period is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router Security Mode WPA2 Enterprise WPA Algorithm WPA2 supports two encryption m...

Страница 17: ...Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless Wireless MAC Filter Wireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network s radius Wireless Wireless MAC Filter Wireless MAC Filter WirelessMACFilter Tof...

Страница 18: ...tiate the best possible connection speed between the Router and a wireless client The default value is Auto CTS Protection Mode CTS Clear To Send Protection Modeshouldremaindisabledunlessyouarehavingsevere problems with your Wireless G products not being able to transmit to the Router in an environment with heavy 802 11b traffic This function boosts the Router s ability to catch all Wireless G tra...

Страница 19: ...ted by default Deselect this feature to disable it Filter Internet NAT Redirection This feature uses port forwarding to block access to local servers from local networked computers Select Filter Internet NAT Redirection to filter Internet NAT redirection This feature is not selected by default Filter IDENT Port 113 This feature keeps port 113 from being scanned by devices outside of your local net...

Страница 20: ...k 4 Edit List of PCs to select which computers will be affectedbythepolicy The ListofPCsscreenappears You can select a computer by MAC Address or IP Address You can also enter a range of IP Addresses if you want this policy to affect a group of computers After making yourchanges clickSaveSettingstoapplyyourchanges or Cancel Changes to cancel your changes Then click Close List of PCs Select the app...

Страница 21: ...gs to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming Port Range Forward The Applications Gaming Port Range Forward screen allows you to set up public services on your network such as web servers ftp servers e mail servers or other specialized Internet applications Specialized Internet applications are anyapplicationsthatuseInternetaccesstoperformfunctions...

Страница 22: ...ncel your changes Applications and Gaming DMZ The DMZ feature allows one network computer to be exposed to the Internet for use of a special purpose service such as Internet gaming or videoconferencing DMZ hosting forwards all the ports at the same time to one computer The Port Range Forward feature is more secure because it only opens the ports you want to have opened while DMZ hosting opens all ...

Страница 23: ...low common game application ports to have a higher priority These games include but are not limited to Counter Strike Half Life Age of Empires EverQuest Quake2 Quake3 and Diablo II The default setting is unselected Application Name Enter the name you wish to give the application in the Application Name field Priority Select Highest High Medium or Low to assign priority to the application The defau...

Страница 24: ...emote access select this feature UPnP UPnP Keep the default Enable to enable the UPnP feature otherwise select Disable Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Administration Log The Router can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disable To monitor traff...

Страница 25: ...ade Firmware screen allows you to upgrade the Router s firmware Do not upgrade the firmware unless you are experiencing problems with the Router or the new firmware has a feature you want to use Administration Upgrade Firmware Before upgrading the firmware download the Router s firmware upgrade file from the Linksys website www linksys com Then extract the file Upgrade Firmware Please select a fil...

Страница 26: ...creen Click Refresh to update the on screen information Status Local Network The Status Local Network screen displays the status of your network Status Local Network Local Network MAC Address The Router s MAC Address as seen on your local Ethernet network is displayed IP Address The Router s IP Address as it appears on your local Ethernet network is displayed Subnet Mask The current subnet mask co...

Страница 27: ... mode Mixed G Only B Only or Disabled used by the network is displayed SSID As entered on the Wireless Basic Wireless Settings screen the wireless network name or SSID is displayed DHCP Server The status of the DHCP server function is displayed Channel As entered on the Wireless Basic Wireless Settings screen The channel on which your wireless network is broadcasting is displayed Encryption Functi...

Страница 28: ...SL modem insert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Opt...

Страница 29: ... Antennas Detachable y n No RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits Environmental Dimensions 7 99 x 1 38 x 6 30 203 x 35 x 160 mm Weight 9 88 oz 280 g Power External 12V DC 0 5A Certifications FCC UL ICES 003 RSS210 CE Wi...

Страница 30: ...gs This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITE...

Страница 31: ...es custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www l...

Страница 32: ...ontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use on...

Страница 33: ...allé et utilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless netw...

Страница 34: ...opská směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místní...

Страница 35: ...από το οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets d...

Страница 36: ...lavult berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking ni...

Страница 37: ...ácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje o...

Страница 38: ...LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART ...

Страница 39: ...sys if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE...

Страница 40: ...prietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be dist...

Страница 41: ...he terms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a ...

Страница 42: ...o time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version publis...

Страница 43: ...warranty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company can...

Страница 44: ...rary does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the L...

Страница 45: ...of the Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is...

Страница 46: ...y not copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such...

Страница 47: ...oftware generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNES...

Страница 48: ...cludes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 Eric Young eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free...

Страница 49: ...TION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distr...

Отзывы: