background image

Linksys E1000

Appendix E: Software End User License Agreement

55

Wireless-N Router

Schedule 2-C 
OPENSSL LICENSE

If  this  Cisco  product  contains  open  source  software 
licensed under the OpenSSL license:

This  product  includes  software  developed  by  the 
OpenSSL  Project  for  use  in  the  OpenSSL  Toolkit . 
(http://www.openssl.org/) .

This product includes cryptographic software written by 
Eric Young (eay@cryptsoft .com) .

This  product  includes  software  written  by  Tim  Hudson 
(tjh@cryptsoft .com) .

In  addition,  if  this  Cisco  product  contains  open  source 
software  licensed  under  the  OpenSSL  license  then  the 
license  terms  below  in  this  Schedule  2-C  will  apply  to 
that  open  source  software .    The  license  terms  below 
in  this  Schedule  2-C  are  from  the  public  web  site  at 
http://www.openssl.org/source/license.html .

The OpenSSL toolkit stays under a dual license, i .e . both 
the  conditions  of  the  OpenSSL  License  and  the  original 
SSLeay  license  apply  to  the  toolkit .    See  below  for  the 
actual  license  texts .  Actually  both  licenses  are  BSD-style 
Open Source licenses . In case of any license issues related 
to OpenSSL please contact openssl-core@openssl .org .

OpenSSL License

Copyright (c) 1998-2007 The OpenSSL Project .  All rights 
reserved .

Redistribution  and  use  in  source  and  binary  forms,  with 
or without modification, are permitted provided that the 
following conditions are met:

1 .  Redistributions of source code must retain the above 

copyright  notice,  this  list  of  conditions  and  the 
following disclaimer .

2 .  Redistributions  in  binary  form  must  reproduce  the 

above copyright notice, this list of conditions and the 
following  disclaimer  in  the  documentation  and/or 
other materials provided with the distribution .

3 .  All  advertising  materials  mentioning  features  or 

use  of  this  software  must  display  the  following 
acknowledgment:    “This  product  includes  software 
developed  by  the  OpenSSL  Project  for  use  in  the 
OpenSSL Toolkit . (http://www.openssl.org/)”

4 .  The  names “OpenSSL Toolkit”  and “OpenSSL  Project” 

must  not  be  used  to  endorse  or  promote  products 
derived  from  this  software  without  prior  written 
permission .  For  written  permission,  please  contact 
openssl-core@openssl .org .

5 .  Products derived from this software may not be called 

“OpenSSL”  nor  may “OpenSSL”  appear  in  their  names 
without  prior  written  permission  of  the  OpenSSL 
Project .

6 .  Redistributions of any form whatsoever must retain the 

following  acknowledgment:    “This  product  includes 
software developed by the OpenSSL Project for use in 
the OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT 
``AS  IS’’  AND  ANY  EXPRESSED  OR  IMPLIED WARRANTIES, 
INCLUDING,  BUT  NOT  LIMITED  TO,  THE  IMPLIED 
WARRANTIES  OF  MERCHANTABILITY  AND  FITNESS  FOR 
A PARTICULAR PURPOSE ARE DISCLAIMED .  IN NO EVENT 
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE 
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
BUT  NOT  LIMITED  TO,  PROCUREMENT  OF  SUBSTITUTE 
GOODS  OR  SERVICES;  LOSS  OF  USE,  DATA,  OR  PROFITS; 
OR  BUSINESS  INTERRUPTION)  HOWEVER  CAUSED  AND 
ON  ANY THEORY  OF  LIABILITY, WHETHER  IN  CONTRACT, 
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 
OTHERWISE)  ARISING  IN  ANY  WAY  OUT  OF THE  USE  OF 
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
SUCH DAMAGE .

This product includes cryptographic software written by 
Eric  Young  (eay@cryptsoft .com) .    This  product  includes 
software written by Tim Hudson (tjh@cryptsoft .com) .

Original SSLeay License

 -----------------------

Copyright (C) 1995-1998 Eric Young (eay@cryptsoft .com)

All rights reserved .

This  package  is  an  SSL  implementation  written  by  Eric 
Young (eay@cryptsoft .com) .

The  implementation  was  written  so  as  to  conform  with 
Netscape’s SSL .

This  library  is  free  for  commercial  and  non-commercial 
use  as  long  as  the  following  conditions  are  adhered  to .  
The  following  conditions  apply  to  all  code  found  in  this 
distribution, be it the RC4, RSA, lhash, DES, etc ., code; not 
just the SSL code .  The SSL documentation included with 
this distribution is covered by the same copyright terms 
except that the holder is Tim Hudson (tjh@cryptsoft .com) .

Copyright remains Eric Young’s, and as such any Copyright 
notices in the code are not to be removed .

If this package is used in a product, Eric Young should be 
given attribution as the author of the parts of the library 
used .    This  can  be  in  the  form  of  a  textual  message  at 
program startup or in documentation (online or textual) 
provided with the package .

Redistribution  and  use  in  source  and  binary  forms,  with 
or without modification, are permitted provided that the 
following conditions are met:

Содержание E1000

Страница 1: ...Linksys E1000 Wireless N Router User Guide ...

Страница 2: ...etup MAC Address Clone 18 Setup Advanced Routing 19 Wireless Basic Wireless Settings 19 Manual Setup 20 Wireless Wireless Security 21 Wireless Wireless MAC Filter 23 Wireless Advanced Wireless Settings 24 Security Firewall 25 Security VPN Passthrough 25 Access Restrictions Internet Access 26 Applications and Gaming Port Range Forwarding 28 Applications Gaming Port Range Triggering 28 Applications ...

Страница 3: ...ent 41 FCC Radiation Exposure Statement 41 Safety Notices 41 Industry Canada Statement 41 Avis d Industrie Canada 41 Wireless Disclaimer 42 Avis de non responsabilité concernant les appareils sans fil 42 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 42 Appendix E Software End User License Agreement 43 Cisco Products 43 Sof...

Страница 4: ...se the Wi Fi Protected Setup button to automatically configure wireless security for your wireless network To use Wi Fi Protected Setup refer to Wi Fi Protected Setup page 20 Wireless Blue The Wireless LED lights up when the wireless feature is enabled It flashes when the Router sends or receives data over the wireless network Internet Blue The Internet LED lights up when there is a connection mad...

Страница 5: ... to mount the Router Make sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet 2 Drill two holes into the wall Make sure the holes are 152 mm apart 3 Insert a screw into each hole and leave 3 mm of its head exposed 4 Position the Router so the wall mount slots line up with the two screws 5 Place the wall mount slots over the s...

Страница 6: ...s Install or run program General options Set up your Linksys Router Published by Cisco Consumer Products LLC Set AutoPlay defaults in Control Panel Open folder to view files using Windows Explorer Speed up my system using Windows ReadyBoost Set Up Your Linksys Router If you do not see this access setup on the CD directly To do so perform the following steps for your specific operating system Windo...

Страница 7: ...up software is setting up the Router Please Wait 6 The installation is complete Click OK Installation is Complete NOTE If you have any problems during the installation process refer to the Frequently Asked Questions in the setup software or use a computer with an active Internet connection to visit www linksys com support Main Menu When Cisco Connect starts up the main menu appears Main Menu Statu...

Страница 8: ... number of devices connected to the Router is displayed Add device To connect another computer or device to the Router click Add device and go to Computers and Other Devices page 6 Main Menu Parental Controls Parental controls restrict Internet access for up to five computers For the computers you select you can block or limit Internet access to specific times You can also block specific websites ...

Страница 9: ...nect with the Easy Setup Key page 6 No I don t have an Easy Setup Key create a new one now If you want to create or update an Easy Setup Key select this option Click Next and go to Create or Update the Easy Setup Key page 7 I want to connect manually using my wireless settings If you want to connect manually without an Easy Setup Key select this option Click Next and go to Connect Manually page 7 ...

Страница 10: ...r computers to the Router for more information refertoConnectwiththeEasySetupKey page 6 Click Close Easy Setup Key Has Been Updated Connect Manually 1 EntertheNetworkname SSID SecurityKey andSecurity Type settings on your wireless device SSID stands for Service Set Identifier To print this information click Print these settings Connecting a Device 2 After your device connects click Next 3 Enter a ...

Страница 11: ...cret question and answer pair If you forget the password you can reset it by correctly answering the secret question Enter your question Answer Enter the answer to your secret question Click OK to save your settings 2 Select the computer whose parental controls you want to set up Then click OK Set Up Parental Controls For 3 The Parental controls main screen appears Parental Controls You have the f...

Страница 12: ...a computer follow these instructions 1 Select the computer from the RestrictInternetaccesson list If the computer is not listed click Add to select the computer Parental Controls 2 The Block Internet access option offers the following Always To always block Internet access select this option Specific times To block Internet access during specific days and times select this option and set the sched...

Страница 13: ...are sets up the password for the guest network To change the password click Change If you clicked Change the Change guest password screen appears Change Guest Password Enter a new guest password Enter a password of 4 32 characters Click Change to save your setting Total guests allowed By default 5 guests are allowed Internet access through the guest network Select the appropriate number of guests ...

Страница 14: ...to the Router will need to be reconnected using the new name or password for more information refer to Computers and Other Devices page 6 If you clicked Change the Changing router name or password screen appears 1 To change the Router name or password click Yes Otherwise click No Changing Router Name or Password 2 Complete the following Router name Enter a name of 1 32 characters Password Enter a ...

Страница 15: ...ssword to access the browser based utility Copy password To copy the password to the Clipboard click this option Advanced Settings Click OK to open the web browser and access the browser based utility For more information refer to How to Access the Browser Based Utility page 13 How to Exit Cisco Connect To exit Cisco Connect click Close on the main menu Main Menu How to Access Cisco Connect Window...

Страница 16: ...reen Leave the User name field blank Then enter the password you set up during the setup software If you did not run the setup software then use the default password admin You can set a new password on the Administration Management screen Refer to Administration Management page 32 Click OK to continue Login Screen NOTE You can also access the browser based utility through Cisco Connect For more in...

Страница 17: ...ax Idle Time You can configure the Router to cut the Internet connection after it has been inactive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max...

Страница 18: ...has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to elapse before your Internet connection terminates The default is 5 minutes Keep Alive Redial Period If you select th...

Страница 19: ...our local network Router IP IP Address The Router s IP address as seen by your network is displayed The default Router IP address is 192 168 1 1 Subnet Mask The Router s Subnet Mask as seen by your network is displayed URL Address To access the browser based utility you enter the Router s IP address or URL address The default is http my E1000 If you want to change the default enter a new URL addre...

Страница 20: ...matically assigned a new dynamic IP address or the lease will be renewed The default is 0 minutes which means one day Static DNS 1 3 The Domain Name System DNS is how the Internet translates domain or website names into Internet addresses or URLs Your ISP will provide you with at least one DNS Server IP address If you wish to use another enter that IP address in one of these fields You can enter u...

Страница 21: ...n is displayed Update To manually trigger an update click Update Click Save Settings to apply your changes or click Cancel Changes to clear your changes TZO com Setup DDNS TZO E mail Address TZO Key and Domain Name Enter the settings of the account you set up with TZO Internet IP Address The Router s Internet IP address is displayed here Because it is dynamic it will change Status The status of th...

Страница 22: ...te This Entry to delete a static route Enter Route Name Enter a name for the Route here using a maximum of 25 alphanumeric characters Destination LAN IP The Destination LAN Local Area Network IP is the address of the remote network or host to which you want to assign a static route Subnet Mask The Subnet Mask determines which portion of a Destination LAN IP address is the network portion and which...

Страница 23: ...eep the default Auto SSID Broadcast When wireless clients survey the local area for wireless networks to associate with they will detect the SSID broadcast by the Router To broadcast the Router s SSID keep the default Enabled If you do not want to broadcast the Router s SSID then select Disabled Click Save Settings to apply your changes or click Cancel Changes to clear your changes Wi Fi Protected...

Страница 24: ... wireless security settings configure the security of your wireless network s The Router supports the following wireless security options WPA WPA2 Mixed Mode default WPA2 Personal WPA Personal WEP and RADIUS WPA stands for Wi Fi Protected Access WEP stands for Wireless Equivalent Privacy RADIUS stands for Remote Authentication Dial In User Service The default option is WPA WPA2 mixed mode which al...

Страница 25: ...e WEP keys Then click Generate Key 1 If you did not enter a Passphrase enter the WEP key manually RADIUS This option features WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router NOTE If you are using WEP encryption each device in your wireless network MUST use the same WEP encryption method and encryption key or else your wireless ...

Страница 26: ...etwork Select this option to allow wireless access by MAC address This option is disabled by default MAC Address Filter List Wireless Client List Click this option to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Se...

Страница 27: ...he rate of data transmission should be set depending on the speed of your wireless network Select from a range of transmission speeds or keep the default Auto to have the Router automatically use the fastest possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client N Transmission Rate The N Trans...

Страница 28: ...ult Filter IDENT Port 113 The Filter IDENT Identification option keeps port 113 from being scanned by devices outside of your local network This option is enabled by default Disable it to allow port 113 to be scanned Web Filters Proxy Use of WAN proxy servers may compromise the Gateway s security Denying Proxy will disable access to any WAN proxy servers Select this option to enable proxy filterin...

Страница 29: ...electing a policy from the drop down menu will display that policy s settings To delete a policy select that policy s number and click DeleteThisPolicy Toviewallthepolicies click Summary Summary The policies are listed with the following information No Policy Name Access Days Time and status Enabled To enable a policy select Enabled To delete a policy click Delete Click Save Settings to save your ...

Страница 30: ...o block is not listed or you want to edit a service s settings enter the application s name in the Application Name field Enter its range in the Port Range fields Select its protocol from the Protocol drop down menu Then click Add To modify a service select it from the Applications list Change its Application Name Port Range and or Protocol setting Then click Modify To delete a service select it f...

Страница 31: ...resses to the designated computers use the DHCP Reservation option on the BasicSetup screen refer to DHCPReservation page16 If you need to forward all ports to one computer click the DMZ tab Applications and Gaming Port Range Forwarding Port Range Forwarding For each entry complete the following Application Name Enter the name you wish to give the application Each name can be up to 12 characters S...

Страница 32: ...you want to specify an IP address or range of IP addresses as the designated source select and complete the IP address range fields Destination If you want to specify the DMZ host by IP address select IP Address and enter the IP address in the field provided If you want to specify the DMZ host by MAC address select MAC Address and enter the MAC address in the field provided To retrieve this inform...

Страница 33: ...s accessing the network For example if you want your gaming console to have higher priority accessing the Internet than your computer you can assign their priority levels using their respective MAC addresses Voice Device Voice devices require a higher priority level You can assign a higher priority level to voice devices using their respective MAC addresses Summary This lists the QoS entries you h...

Страница 34: ...opriate priority High Medium Recommended Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Voice Device QoS Voice Device Enter a Name Enter a name for your voice device MAC Address Enter the MAC address of your voice device Priority Select the appropriate priority High Recommended Medium Normal or Low Click Add to save your changes Your new entry will appe...

Страница 35: ...utside the local network select Enabled You must have the Remote Management option enabled as well Otherwise keep the default Disabled Allowed Remote IP Address If you want to be able to access the Router from any external IP address select Any IP Address If you want to specify an external IP address or range of IP addresses then select the second option and complete the fields provided Remote Man...

Страница 36: ... traffic The Security log displays the login information for the browser based utility The DHCP Client Log displays the local DHCP server status information Click Save the Log to save this information to a file on your computer s hard drive Click Refresh to update the log Click Clear to clear all the information that is displayed Administration Diagnostics The diagnostic tests Ping and Traceroute ...

Страница 37: ... have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Administration Factory Defaults Factory Defaults Restore All Settings To reset the Router s settings to the defaults click this button and then follow the on screen instructions Any settings you have saved will be lost when the default settings are restored Administrat...

Страница 38: ...n Name The Domain Name of the Router is displayed if it was entered on the Setup Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen For a DHCP connection select Release IP Address or Renew IP Address as appropriate to release or renew...

Страница 39: ... to the Local Network screen click Close Status Wireless Network The Wireless Network screen displays information about your wireless network Status Wireless Network Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed Mode The wireless mode is displayed NetworkName SSID The name of the wireless network which is also called the SSID is displayed Channe...

Страница 40: ...the Connections tab 3 Select Never dial a connection 4 Click OK The Router does not have a coaxial port for the cable connection The Router does not replace your modem You still need your cable modem in order to use the Router Connect your cable connection to the cable modem and then insert the setup CD into your computer Click Set up your Linksys Router and follow the on screen instructions The c...

Страница 41: ...nternet Power Cabling Type CAT 5e RF Pwr EIRP in dBm 17 5 dBm Antenna Gain in dBi 1 5 dBi UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 7 95 x 1 34 x 6 3 202 x 34 x 160 mm Unit Weight 9 81 oz 280 g Power 12V 0 5A Certifications FCC CE IC 03 Wi Fi Windows 7 Operating Temp 32 to 104 F 0 to 40 C Storage Temp 4 to 140 F 20 to 60 ...

Страница 42: ...rice of the software media EXCLUSIONS AND LIMITATIONS This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the pro...

Страница 43: ...g provisions shall remain in full force and effect OBTAINING WARRANTY SERVICE If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purc...

Страница 44: ...A is firmware limited to channels 1 through 11 Safety Notices WARNING Do not use this product near water for example in a wet basement or near a swimming pool WARNING Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning WARNING This product contains lead known to the State of California to cause cancer and birth defects or other reproducti...

Страница 45: ...of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities Correct disposal and recycling will help prevent potential negative consequences to the environment and human health For more detailed information about the disposal of your old equipment please contact your local authorities waste disposal service or the shop w...

Страница 46: ...tes You agree to all of the terms and conditions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a ...

Страница 47: ...p The Technology and Documentation are licensed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically grant...

Страница 48: ... product and or Software may become inaccessible There may be circumstances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgr...

Страница 49: ...sts and fees including reasonable attorney fees arising from Your use of the Technology as well as from Your failure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com suppor...

Страница 50: ... your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that wha...

Страница 51: ... or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the...

Страница 52: ... distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program...

Страница 53: ...sh that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if...

Страница 54: ... means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it ...

Страница 55: ... code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by...

Страница 56: ...equirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered...

Страница 57: ...en in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License wh...

Страница 58: ...ved from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXP...

Страница 59: ...ude an acknowledgement This product includes software written by Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL E...

Страница 60: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10012110NC JL ...

Отзывы: