background image

45

Appendix E

Software License Agreement

RangePlus Wireless Router

If the modified program normally reads commands 

c. 

interactively  when  run,  you  must  cause  it,  when 
started running for such interactive use in the most 
ordinary way, to print or display an announcement 
including  an  appropriate  copyright  notice  and 
a notice that there is no warranty (or else, saying 
that  you  provide  a  warranty)  and  that  users  may 
redistribute  the  program  under  these  conditions, 
and  telling  the  user  how  to  view  a  copy  of 
this  License.  (Exception:  if  the  Program  itself  is 
interactive  but  does  not  normally  print  such  an 
announcement, your work based on the Program 
is not required to print an announcement.) 

These  requirements  apply  to  the  modified  work  as 
a  whole.  If  identifiable  sections  of  that  work  are  not 
derived  from  the  Program,  and  can  be  reasonably 
considered  independent  and  separate  works  in 
themselves,  then  this  License,  and  its  terms,  do  not 
apply to those sections when you distribute them as 
separate  works.  But  when  you  distribute  the  same 
sections as part of a whole which is a work based on 
the Program, the distribution of the whole must be on 
the terms of this License, whose permissions for other 
licensees extend to the entire whole, and thus to each 
and every part regardless of who wrote it. 

Thus, it is not the intent of this section to claim rights 
or contest your rights to work written entirely by you; 
rather, the intent is to exercise the right to control the 
distribution of derivative or collective works based on 
the Program. 

In  addition,  mere  aggregation  of  another  work  not 
based  on  the  Program  with  the  Program  (or  with  a 
work based on the Program) on a volume of a storage 
or distribution medium does not bring the other work 
under the scope of this License. 

You  may  copy  and  distribute  the  Program  (or  a 

3. 

work based on it, under Section 2) in object code or 
executable form under the terms of Sections 1 and 2 
above provided that you also do one of the following: 

Accompany  it  with  the  complete  corresponding 

a. 

machine-readable  source  code,  which  must  be 
distributed  under  the  terms  of  Sections  1  and  2 
above on a medium customarily used for software 
interchange; or, 

Accompany it with a written offer, valid for at least 

b. 

three  years,  to  give  any  third  party,  for  a  charge 
no  more  than  your  cost  of  physically  performing 
source distribution, a complete machine-readable 
copy  of  the  corresponding  source  code,  to  be 
distributed  under  the  terms  of  Sections  1  and  2 
above on a medium customarily used for software 
interchange; or, 

Accompany it with the information you received as 

c. 

to the offer to distribute corresponding source code. 
(This alternative is allowed only for noncommercial 
distribution and only if you received the program 
in  object  code  or  executable  form  with  such  an 
offer, in accord with Subsection b above.) 

The source code for a work means the preferred form 
of  the  work  for  making  modifications  to  it.  For  an 
executable  work,  complete  source  code  means  all 
the source code for all modules it contains, plus any 
associated  interface  definition  files,  plus  the  scripts 
used  to  control  compilation  and  installation  of  the 
executable. However, as a special exception, the source 
code  distributed  need  not  include  anything  that  is 
normally distributed (in either source or binary form) 
with the major components (compiler, kernel, and so 
on) of the operating system on which the executable 
runs,  unless  that  component  itself  accompanies  the 
executable. 

If  distribution  of  executable  or  object  code  is  made 
by  offering  access  to  copy  from  a  designated  place, 
then  offering  equivalent  access  to  copy  the  source 
code  from  the  same  place  counts  as  distribution  of 
the  source  code,  even  though  third  parties  are  not 
compelled  to  copy  the  source  along  with  the  object 
code. 

You  may  not  copy,  modify,  sublicense,  or  distribute 

4. 

the  Program  except  as  expressly  provided  under 
this License. Any attempt otherwise to copy, modify, 
sublicense or distribute the Program is void, and will 
automatically terminate your rights under this License. 
However, parties who have received copies, or rights, 
from you under this License will not have their licenses 
terminated  so  long  as  such  parties  remain  in  full 
compliance. 
You are not required to accept this License, since you 

5. 

have not signed it. However, nothing else grants you 
permission to modify or distribute the Program or its 
derivative works. These actions are prohibited by law if 
you do not accept this License. Therefore, by modifying 
or distributing the Program (or any work based on the 
Program), you indicate your acceptance of this License 
to do so, and all its terms and conditions for copying, 
distributing or modifying the Program or works based 
on it. 
Each time you redistribute the Program (or any work 

6. 

based  on  the  Program),  the  recipient  automatically 
receives  a  license  from  the  original  licensor  to  copy, 
distribute  or  modify  the  Program  subject  to  these 
terms and conditions. You may not impose any further 
restrictions  on  the  recipients’  exercise  of  the  rights 
granted herein. You are not responsible for enforcing 
compliance by third parties to this License. 

Содержание RangePlus WRT110

Страница 1: ...USER GUIDE RangePlus Wireless Router Model WRT110 EU ...

Страница 2: ...ress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secur...

Страница 3: ...ecurity VPN Passthrough 18 Access Restrictions Internet Access Policy 18 Applications and Gaming Single Port Forwarding 20 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Administration Diagnostics 25 Administration Factory Defaults 26 Admin...

Страница 4: ...999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksys com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 38 Appendix E Software License Agreement 42 Software in Linksys Products 42 S...

Страница 5: ... client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is enabled If the LED is flash...

Страница 6: ...ermine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with the two sc...

Страница 7: ...e MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each ...

Страница 8: ...P address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the Web based utility use the default password admin You can set a new password from the Administration tab s Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears ...

Страница 9: ...iod If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol PPTP...

Страница 10: ...ive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet conne...

Страница 11: ...n IP address enter the client s name in the Enter Client Name field Enter the IP address you want it to have in the Assign IP Address field Enter its MAC address in the To This MAC Address field Then click Add Clients Already Reserved A list of DHCP clients and their fixed local IP addresses will be displayed at the bottom of the screen If you want to remove a client from this list click Remove Cl...

Страница 12: ...rver or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default setting Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO then sel...

Страница 13: ...ork Static Routing sets up a fixed route to another network destination Setup Advanced Routing Advanced Routing NAT Enabled Disabled IfthisRouterishostingyournetwork s connection to the Internet keep the default Enabled If another router exists on your network select Disabled When the NAT setting is disabled dynamic routing will be enabled Dynamic Routing RIP Enabled Disabled This feature enables ...

Страница 14: ...r added security you should change the default SSID linksys to a unique name Radio Band For best performance in a network using Wireless N Wireless G and Wireless B devices keep the default Auto 20 40MHz Channel For Wireless G and Wireless B networking only select Standard 20MHz Channel NOTE If you select Auto 20 40MHz Channel for the Radio Band setting then Wireless N can usetwochannels aprimaryo...

Страница 15: ...IP and AES with dynamic encryption keys Select the type of algorithm AES or AES or TKIP The default is AES or TKIP Passphrase Enter a Passphrase of 8 63 characters Key Renewal Enter a Key Renewal period which instructs theRouterhowoftenitshouldchangetheencryptionkeys The default Group Key Renewal period is 3600 seconds WPA Enterprise This option features WPA used in coordination with a RADIUS serv...

Страница 16: ...se the same WEP encryption method and encryption key or else your wireless network will not function properly RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default value is 1812 Shared Secret Enter the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64bits 10hexdigits or104 128bits 26he...

Страница 17: ...eless Client List Click this to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List Then click Add To retrieve the most ...

Страница 18: ...test possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default is Auto CTS Protection Mode The Router will automatically use CTS Clear To Send Protection Mode when your Wireless N and Wireless G products are experiencing severe problems and are not able to transmit to the Router in an...

Страница 19: ...is feature to enable Java filtering Deselect the feature to allow Java usage ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language Select this feature to enable ActiveX filtering Deselect the feature to allow ActiveX usage Cookies A cookie is data stored on your computer and used by...

Страница 20: ...Access Policy screen click Close Summary Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and select Enabled To create a policy follow steps 1 11 Repeat these steps to create additional policies one at a time Select a number from the 1 Access Policy drop down menu Enter a Policy Name in the field provided 2 To enable this policy select 3 E...

Страница 21: ...tomize port services for common applications on this screen When users send these types of requests to your network via the Internet the Router will forward those requests to the appropriate servers computers Before using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation feature on the Basic Setup screen Applications and Gaming Single Port Forwardi...

Страница 22: ...abled to enable port forwarding for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications Gaming Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers The IP address of the computer that sends the matching data is remembered by the Router so that whe...

Страница 23: ... To retrieve the most up to date information click Refresh To exit this screen and return to the DMZ screen click Close Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencin...

Страница 24: ...tails on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Online Games QoS Online Games Games Select the appropriate game Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your cha...

Страница 25: ...a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s web based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To permit remote...

Страница 26: ...can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disabled To monitor traffic between the network and the Internet select Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client...

Страница 27: ...lick Close to return to the Diagnostics screen Diagnostics Traceroute Administration Factory Defaults The Administration Factory Defaults screen allows you to restore the Router s configuration to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures On...

Страница 28: ...f required by your ISP this was entered on the Basic Setup screen Domain Name If required by your ISP this was entered on the Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Basic Setup screen Click Refresh to update the on screen information Status Local ...

Страница 29: ... information about your wireless network Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed here Mode Displayed here is the wireless mode used by the network Network Name SSID Displayed here is the name of the wireless network which is also called the SSID Radio Band Shown here is the Radio Band setting selected on the Basic Wireless ...

Страница 30: ...nsert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Options Click...

Страница 31: ...nas 2 Detachable No RF Pwr EIRP in dBm 16 5 dBm Antenna Gain in dBi 1 8 dBi UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits 256 Bits Environmental Dimensions 148 x 36 x 170 mm Weight 334 g Power 12V 1A Certification FCC IC 03 Wi Fi 802 11b g WPA2 WMM O...

Страница 32: ...t or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO ...

Страница 33: ...ed under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction ...

Страница 34: ...pparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and 1 This device must accept any interference including 2 interference that may cause undesired operation of the device To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than ...

Страница 35: ...er adverse conditions Avis de non responsabilité concernant les appareils sans fil Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802 11 Les performances réelles peuvent varier notamment en fonction de la capacité du réseau sans fil du débit de la transmission de données de la portée et de la couverture Les performances dépendent de facteurs co...

Страница 36: ...enkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követel...

Страница 37: ... dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesi menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the EU a...

Страница 38: ...um output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the st...

Страница 39: ...nice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady S...

Страница 40: ...ποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménag...

Страница 41: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Страница 42: ... prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s tem ...

Страница 43: ... ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOT...

Страница 44: ... fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING...

Страница 45: ...o prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed un...

Страница 46: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Страница 47: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Страница 48: ...or the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effect...

Страница 49: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Страница 50: ...rary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Wheth...

Страница 51: ... modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such parties r...

Страница 52: ...nerally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PA...

Страница 53: ...yptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for comme...

Страница 54: ...VER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution l...

Отзывы: