background image

51

Appendix E

Software License Agreement

RangePlus Wireless Router

software  distributed  through  that  system  in  reliance 
on  consistent  application  of  that  system;  it  is  up  to 
the  author/donor  to  decide  if  he  or  she  is  willing  to 
distribute  software  through  any  other  system  and  a 
licensee cannot impose that choice.

This  section  is  intended  to  make  thoroughly  clear 
what is believed to be a consequence of the rest of this 
License.

If the distribution and/or use of the Library is restricted 

12. 

in certain countries either by patents or by copyrighted 
interfaces,  the  original  copyright  holder  who  places 
the  Library  under  this  License  may  add  an  explicit 
geographical  distribution  limitation  excluding  those 
countries, so that distribution is permitted only in or 
among countries not thus excluded. In such case, this 
License incorporates the limitation as if written in the 
body of this License.
The  Free  Software  Foundation  may  publish  revised 

13. 

and/or  new  versions  of  the  Lesser  General  Public 
License from time to time. Such new versions will be 
similar in spirit to the present version, but may differ in 
detail to address new problems or concerns. 
Each version is given a distinguishing version number. 
If the Library specifies a version number of this License 
which applies to it and “any later version”, you have the 
option of following the terms and conditions either of 
that version or of any later version published by the Free 
Software Foundation. If the Library does not specify a 
license version number, you may choose any version 
ever published by the Free Software Foundation.

If  you  wish  to  incorporate  parts  of  the  Library  into 

14. 

other free programs whose distribution conditions are 
incompatible with these, write to the author to ask for 
permission. For software which is copyrighted by the 
Free Software Foundation, write to the Free Software 
Foundation;  we  sometimes  make  exceptions  for 
this. Our decision will be guided by the two goals of 
preserving the free status of all derivatives of our free 
software  and  of  promoting  the  sharing  and  reuse  of 
software generally.

NO WARRANTY

BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, 

15. 

THERE  IS  NO  WARRANTY  FOR  THE  LIBRARY,  TO  THE 
EXTENT  PERMITTED  BY  APPLICABLE  LAW.  EXCEPT 
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 
HOLDERS  AND/OR  OTHER  PARTIES  PROVIDE  THE 
LIBRARY “AS  IS”  WITHOUT  WARRANTY  OF  ANY  KIND, 
EITHER  EXPRESSED  OR  IMPLIED,  INCLUDING,  BUT 
NOT  LIMITED  TO,  THE  IMPLIED  WARRANTIES  OF 
MERCHANTABILITY  AND  FITNESS  FOR  A  PARTICULAR 
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND 
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD 
THE  LIBRARY  PROVE  DEFECTIVE,  YOU  ASSUME  THE 
COST  OF  ALL  NECESSARY  SERVICING,  REPAIR  OR 
CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 

16. 

OR  AGREED  TO  IN  WRITING  WILL  ANY  COPYRIGHT 
HOLDER,  OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY 
AND/OR  REDISTRIBUTE  THE  LIBRARY  AS  PERMITTED 
ABOVE,  BE  LIABLE  TO  YOU  FOR  DAMAGES, 
INCLUDING  ANY  GENERAL,  SPECIAL,  INCIDENTAL  OR 
CONSEQUENTIAL  DAMAGES  ARISING  OUT  OF  THE 
USE  OR  INABILITY  TO  USE  THE  LIBRARY  (INCLUDING 
BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING 
RENDERED  INACCURATE  OR  LOSSES  SUSTAINED  BY 
YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY 
TO  OPERATE  WITH  ANY  OTHER  SOFTWARE),  EVEN  IF 
SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED 
OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

END OF SCHEDULE 3

Schedule 4

If  this  Linksys  product  contains  open  source  software 
licensed under the OpenSSL license:

This  product  includes  software  developed  by  the 
OpenSSL  Project  for  use  in  the  OpenSSL  Toolkit.  
(

http://www.openssl.org/

).

This product includes cryptographic software written by 
Eric Young ([email protected]).

This  product  includes  software  written  by  Tim  Hudson 
([email protected]).

In  addition,  if  this  Linksys  product  contains  open 
source  software  licensed  under  the  OpenSSL  license 
then  the  license  terms  below  in  this  Schedule  3  will 
apply  to  that  open  source  software.  The  license  terms 
below in this Schedule 3 are from the public web site at  

http://www.openssl.org/source/license.html

.

The OpenSSL toolkit stays under a dual license, i.e. both 
the  conditions  of  the  OpenSSL  License  and  the  original 
SSLeay  license  apply  to  the  toolkit.  See  below  for  the 
actual  license  texts.  Actually  both  licenses  are  BSD-style 
Open Source licenses. In case of any license issues related 
to OpenSSL please contact [email protected].

Содержание RangePlus WRT110

Страница 1: ...USER GUIDE RangePlus Wireless Router Model WRT110 EU ...

Страница 2: ...ress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secur...

Страница 3: ...ecurity VPN Passthrough 18 Access Restrictions Internet Access Policy 18 Applications and Gaming Single Port Forwarding 20 Applications and Gaming Port Range Forwarding 20 Applications Gaming Port Range Triggering 21 Applications and Gaming DMZ 21 Applications and Gaming QoS 22 Administration Management 24 Administration Log 25 Administration Diagnostics 25 Administration Factory Defaults 26 Admin...

Страница 4: ...999 5 EC R TTE Directive 35 Wireless Equipment Wireless N G A B Products 36 CE Marking 36 National Restrictions 36 Product Usage Restrictions 37 Technical Documents on www linksys com international 37 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 38 Appendix E Software License Agreement 42 Software in Linksys Products 42 S...

Страница 5: ... client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is enabled If the LED is flash...

Страница 6: ...ermine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with the two sc...

Страница 7: ...e MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each ...

Страница 8: ...P address 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the Web based utility use the default password admin You can set a new password from the Administration tab s Management screen Click OK to continue Login Screen Setup Basic Setup The first screen that appears ...

Страница 9: ...iod If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds PPTP Point to Point Tunneling Protocol PPTP...

Страница 10: ...ive for a specified period of time Max Idle Time If your Internet connection has been terminated due to inactivity Connect on Demand enables the Router to automatically re establish your connection as soon as you attempt to access the Internet again To use this option select Connect on Demand In the Max Idle Time field enter the number of minutes you want to have elapsed before your Internet conne...

Страница 11: ...n IP address enter the client s name in the Enter Client Name field Enter the IP address you want it to have in the Assign IP Address field Enter its MAC address in the To This MAC Address field Then click Add Clients Already Reserved A list of DHCP clients and their fixed local IP addresses will be displayed at the bottom of the screen If you want to remove a client from this list click Remove Cl...

Страница 12: ...rver or other server behind the Router Before you can use this feature you need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default setting Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO then sel...

Страница 13: ...ork Static Routing sets up a fixed route to another network destination Setup Advanced Routing Advanced Routing NAT Enabled Disabled IfthisRouterishostingyournetwork s connection to the Internet keep the default Enabled If another router exists on your network select Disabled When the NAT setting is disabled dynamic routing will be enabled Dynamic Routing RIP Enabled Disabled This feature enables ...

Страница 14: ...r added security you should change the default SSID linksys to a unique name Radio Band For best performance in a network using Wireless N Wireless G and Wireless B devices keep the default Auto 20 40MHz Channel For Wireless G and Wireless B networking only select Standard 20MHz Channel NOTE If you select Auto 20 40MHz Channel for the Radio Band setting then Wireless N can usetwochannels aprimaryo...

Страница 15: ...IP and AES with dynamic encryption keys Select the type of algorithm AES or AES or TKIP The default is AES or TKIP Passphrase Enter a Passphrase of 8 63 characters Key Renewal Enter a Key Renewal period which instructs theRouterhowoftenitshouldchangetheencryptionkeys The default Group Key Renewal period is 3600 seconds WPA Enterprise This option features WPA used in coordination with a RADIUS serv...

Страница 16: ...se the same WEP encryption method and encryption key or else your wireless network will not function properly RADIUS Server Enter the IP address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The default value is 1812 Shared Secret Enter the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64bits 10hexdigits or104 128bits 26he...

Страница 17: ...eless Client List Click this to open the Wireless Client List screen Wireless Client List Wireless Client List This screen shows computers and other devices on the wireless network The list can be sorted by Client Name Interface IP Address MAC Address and Status Select Save to MAC Address Filter List for any device you want to add to the MAC Address Filter List Then click Add To retrieve the most ...

Страница 18: ...test possible data rate and enable the Auto Fallback feature Auto Fallback will negotiate the best possible connection speed between the Router and a wireless client The default is Auto CTS Protection Mode The Router will automatically use CTS Clear To Send Protection Mode when your Wireless N and Wireless G products are experiencing severe problems and are not able to transmit to the Router in an...

Страница 19: ...is feature to enable Java filtering Deselect the feature to allow Java usage ActiveX ActiveX is a programming language for websites If you deny ActiveX you run the risk of not having access to Internet sites created using this programming language Select this feature to enable ActiveX filtering Deselect the feature to allow ActiveX usage Cookies A cookie is data stored on your computer and used by...

Страница 20: ...Access Policy screen click Close Summary Status Policies are disabled by default To enable a policy select the policy number from the drop down menu and select Enabled To create a policy follow steps 1 11 Repeat these steps to create additional policies one at a time Select a number from the 1 Access Policy drop down menu Enter a Policy Name in the field provided 2 To enable this policy select 3 E...

Страница 21: ...tomize port services for common applications on this screen When users send these types of requests to your network via the Internet the Router will forward those requests to the appropriate servers computers Before using forwarding you should assign static IP addresses to the designated servers use the DHCP Reservation feature on the Basic Setup screen Applications and Gaming Single Port Forwardi...

Страница 22: ...abled to enable port forwarding for the applications you have defined Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications Gaming Port Range Triggering The Port Range Triggering screen allows the Router to watch outgoing data for specific port numbers The IP address of the computer that sends the matching data is remembered by the Router so that whe...

Страница 23: ... To retrieve the most up to date information click Refresh To exit this screen and return to the DMZ screen click Close Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such as videoconferencin...

Страница 24: ...tails on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Online Games QoS Online Games Games Select the appropriate game Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your cha...

Страница 25: ...a public domain where you are giving wireless access to your guests you can disable wireless access to the Router s web based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To permit remote...

Страница 26: ...can keep logs of all traffic for your Internet connection Administration Log Log Log To disable the Log function keep the default setting Disabled To monitor traffic between the network and the Internet select Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type Select Incoming Log Outgoing Log Security Log or DHCP Client...

Страница 27: ...lick Close to return to the Diagnostics screen Diagnostics Traceroute Administration Factory Defaults The Administration Factory Defaults screen allows you to restore the Router s configuration to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures On...

Страница 28: ...f required by your ISP this was entered on the Basic Setup screen Domain Name If required by your ISP this was entered on the Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Basic Setup screen Click Refresh to update the on screen information Status Local ...

Страница 29: ... information about your wireless network Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed here Mode Displayed here is the wireless mode used by the network Network Name SSID Displayed here is the name of the wireless network which is also called the SSID Radio Band Shown here is the Radio Band setting selected on the Basic Wireless ...

Страница 30: ...nsert the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Internet Options Click...

Страница 31: ...nas 2 Detachable No RF Pwr EIRP in dBm 16 5 dBm Antenna Gain in dBi 1 8 dBi UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Security Key Bits 128 Bits 256 Bits Environmental Dimensions 148 x 36 x 170 mm Weight 334 g Power 12V 1A Certification FCC IC 03 Wi Fi 802 11b g WPA2 WMM O...

Страница 32: ...t or software is used will be free of vulnerability to intrusion or attack The product may include or be bundled with third party software or service offerings This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO ...

Страница 33: ...ed under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com support General This limited warranty is governed by the laws of the jurisdiction ...

Страница 34: ...pparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and 1 This device must accept any interference including 2 interference that may cause undesired operation of the device To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than ...

Страница 35: ...er adverse conditions Avis de non responsabilité concernant les appareils sans fil Les performances maximales pour les réseaux sans fil sont tirées des spécifications de la norme IEEE 802 11 Les performances réelles peuvent varier notamment en fonction de la capacité du réseau sans fil du débit de la transmission de données de la portée et de la couverture Les performances dépendent de facteurs co...

Страница 36: ...enkina 1999 5 EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas Nederlands Dutch Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ħtiġiet essenzjali u l provedimenti l oħra rilevanti tad Direttiva 1999 5 EC Magyar Hungarian Ez a készülék teljesíti az alapvető követel...

Страница 37: ... dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesi menzionati di seguito DasProduktkanninallenEUStaatenohneEinschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten In the majority of the EU a...

Страница 38: ...um output power are 2 specified in EIRP The EIRP level of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the st...

Страница 39: ...nice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady S...

Страница 40: ...ποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménag...

Страница 41: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Страница 42: ... prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme s tem ...

Страница 43: ... ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOT...

Страница 44: ... fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING...

Страница 45: ...o prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed un...

Страница 46: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Страница 47: ...h new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the...

Страница 48: ...or the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effect...

Страница 49: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Страница 50: ...rary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Wheth...

Страница 51: ... modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such parties r...

Страница 52: ...nerally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PA...

Страница 53: ...yptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for comme...

Страница 54: ...VER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution l...

Отзывы: