background image

36

Appendix E

Software End User License Agreement

Wireless-G Broadband Router

Software  can  enable  any  other  computer  (on  the  same 

primary network) to generate reports. When a computer 

is  enabled,  that  computer  shows  a  notification  that  it  is 

being  monitored.  As  long  as  that  computer  is  enabled, 

each time the Software is started the user of that particular 

computer will see a notification that it is being monitored 

by the reports feature. Any computer on the network with 

the  Software  installed  can  enable  or  disable  any  other 

computer from the reports feature. 
In  addition,  Cisco  may  collect  and  store  detailed 

information  regarding  your  network  configuration 

and  usage  for  the  purpose  of  providing  you  technical 

networking  support. The  information  is  associated  with 

you  only  when  you  provide  a  unique  ID  number  to  the 

support representative while you are receiving help. The 

unique ID is generated randomly on your computer upon 

installation and is completely under your control.
Your  use  of  your  Cisco  product  and/or  the  Software 

constitutes consent by you to Cisco’s and/or its affiliates’ 

collection and use of such information and, for European 

Economic  Area  (EEA)  customers,  to  the  transfer  of  such 

information to a location outside the EEA. Any information 

collected  by  your  Cisco  product  and/or  the  Software  is 

done  and  utilized  in  accordance  with  our  Privacy  Policy 

available  at  Privacy  Statement. Your  election  to  use  the 

Cisco product and/or Software indicates your acceptance 

of the terms of the Cisco Privacy Policy, so please review 

the  policy  carefully  and  check  the  Web  site  above  to 

review updates to it. 

Software  Upgrades  etc

.  If  the  Software  enables  you  to 

receive  Upgrades,  you  may  elect  at  any  time  to  receive 

these  Upgrades  either  automatically  or  manually.  If  you 

elect  to  receive  Upgrades  manually  or  you  otherwise 

elect not to receive or be notified of any Upgrades, you 

may  expose  your  Cisco  product  and/or  the  Software  to 

serious security threats and/or some features within your 

Cisco product and/or Software may become inaccessible. 

There may be circumstances where we apply an Upgrade 

automatically  in  order  to  comply  with  changes  in 

legislation,  legal,  security  or  regulatory  requirements  or 

as a result of requirements to comply with the terms of 

any agreements Cisco has with any third parties regarding 

your Cisco product and/or the Software. You will always 

be notified of any Upgrades being delivered to you. The 

terms of this license will apply to any such Upgrade unless 

the  Upgrade  in  question  is  accompanied  by  a  separate 

license,  in  which  event  the  terms  of  that  license  will 

apply.

Changes  to  Browser  Settings  and  Error  Processing

.  By 

installing the Software, you acknowledge and agree that 

the Software may change certain settings in your Internet 

browser software, including the default settings for search 

provider and source of DNS error pages and may direct 

erroneous URLs to an error landing page hosted by Cisco. 

You may opt out of these settings by not accepting them as 

part of the installation process or by requesting a change 

to  your  software  settings  in  the  error  process.  Installing 

the software and changing these software settings may 

conflict  with  license  agreements  you  have  entered  into 

with other entities, such as your Internet service provider. 

Error queries that are libelous, slanderous, defamatory or 

that may violate the intellectual property rights of others 

may not be processed by Cisco or its suppliers.

Term  and  Termination.

 You  may  terminate  this  License 

at  any  time  by  destroying  all  copies  of  the  Software 

and  documentation.  Your  rights  under  this  License  will 

terminate  immediately  without  notice  from  Cisco  if  you 

fail to comply with any provision of this Agreement. 

Limited  Warranty

.  Cisco  additionally  warrants  that  any 

media  on  which  the  Software  may  be  provided  will  be 

free  from  defects  in  materials  and  workmanship  under 

normal use for a period of ninety (90) days from the date 

of  original  purchase.  Your  exclusive  remedy  and  Cisco’s 

entire liability under this limited warranty will be for Cisco, 

at  its  option,  to  (a)  replace  the  Software  media,  or  (b) 

refund the purchase price of the Software media. 
EXCEPT  FOR  THE  LIMITED  WARRANTY  ON  MEDIA 

SET  FORTH  ABOVE  AND  TO  THE  MAXIMUM  EXTENT 

PERMITTED  BY  APPLICABLE  LAW,  ALL  SOFTWARE  AND 

SERVICES PROVIDED BY CISCO ARE PROVIDED “AS IS” WITH 

ALL  FAULTS  AND  WITHOUT  WARRANTY  OF  ANY  KIND. 

Without  limiting  the  foregoing,  Cisco  does  not  warrant 

that the operation of the product, software or services will 

be uninterrupted or error free. Also, due to the continual 

development of new techniques for intruding upon and 

attacking  networks,  Cisco  does  not  warrant  that  the 

product, software or services, or any equipment, system 

or  network  on  which  the  product,  software  or  services 

are used will be free of vulnerability to intrusion or attack. 

The product may include or be bundled with third party 

software  or  service  offerings. This  limited  warranty  shall 

not apply to such third party software or service offerings. 

This limited warranty does not guarantee any continued 

availability of a third party’s service for which this product’s 

use or operation may require. 
TO  THE  EXTENT  NOT  PROHIBITED  BY  APPLICABLE 

LAW,  ALL  IMPLIED  WARRANTIES  AND  CONDITIONS 

OF 

MERCHANTABILITY, 

SATISFACTORY 

QUALITY, 

NONINFRINGEMENT  OR  FITNESS  FOR  A  PARTICULAR 

PURPOSE  ARE  LIMITED  TO  THE  DURATION  OF  THE 

WARRANTY  PERIOD.  ALL  OTHER  EXPRESS  OR  IMPLIED 

CONDITIONS,  REPRESENTATIONS  AND WARRANTIES  ARE 

DISCLAIMED. Some jurisdictions do not allow limitations 

on  how  long  an  implied  warranty  lasts,  so  the  above 

limitation  may  not  apply  to  you.  This  limited  warranty 

gives  you  specific  legal  rights,  and  you  may  also  have 

other rights which vary by jurisdiction.

Содержание WRT54G2 - Wireless-G Broadband Router

Страница 1: ...USER GUIDE Wireless G Broadband Router Model WRT54G2...

Страница 2: ...ail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you...

Страница 3: ...er 13 Wireless Advanced Wireless Settings 14 Security Firewall 15 Security VPN Passthrough 15 Access Restrictions Internet Access 16 Applications and Gaming Port Range Forward 17 Applications Gaming P...

Страница 4: ...Industry Canada Statement 28 Avis d Industrie Canada 29 Wireless Disclaimer 29 Avis de non responsabilit concernant les appareils sans fil 29 User Information for Consumer Products Covered by EU Dire...

Страница 5: ...the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router suppo...

Страница 6: ...ine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall...

Страница 7: ...lity to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless netw...

Страница 8: ...Address field Then press Enter A password request screen will appear Non Windows XP users will see a similar screen Leave the User name field blank Then enter the password you set up during the Setup...

Страница 9: ...periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field spe...

Страница 10: ...s a service that applies to connections in Australia only If your ISP uses HeartBeat Signal HBS then select Telstra Cable Internet Connection Type Telstra Cable User Name and Password Enter the User N...

Страница 11: ...than 192 168 1 253 The default is 192 168 1 100 Maximum Number of DHCP Users Enter the maximum number of PCs that you want the DHCP server to assign IP addresses to This number cannot be greater than...

Страница 12: ...assigned by the DDNS service Internet IP Address The Router s Internet IP address is displayed Because it is dynamic it will change Status The status of the DDNS service connection is displayed Click...

Страница 13: ...You can also select WAN Internet which performs dynamic routing with data coming from the Internet Finally selecting Both enables dynamic routing for both networks as well as data from the Internet S...

Страница 14: ...s select Wireless G Only If you have only Wireless B devices select Wireless B Only If your network has no wireless devices or if you want to disable wireless networking select Disabled Wireless Netwo...

Страница 15: ...n manually configure those client devices Wireless Wireless Security The Wireless Security settings configure the security of yourwirelessnetwork Therearesixwirelesssecuritymode options supported by t...

Страница 16: ...cryption keys Select the type of algorithm AES or TKIP AES The default is AES RADIUS Server Address Enter the IP Address of the RADIUS server RADIUS Port Enter the port number of the RADIUS server The...

Страница 17: ...rase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 4 If you did not enter a Passphrase enter the WEP key s manually WEP WEP is a basic encryption method which is not...

Страница 18: ...a WEP key for authentication Basic Rate The Basic Rate setting is not actually one rate of transmission but a series of rates at which the Router can transmit The Router will advertise its Basic Rate...

Страница 19: ...o begin transmission The RTS Threshold value should remain at its default value of 2347 AP Isolation This isolates all wireless clients and wireless devices on your network from each other Wireless de...

Страница 20: ...k or allow specific kinds of Internet usage and traffic such as Internet access designated services and websites during specific days and times Access Restrictions Internet Access Internet Access Inte...

Страница 21: ...creen appears Port Services To add a service enter the service s name in the Service Name field Select its protocol from the Protocol drop down menu and enter its range in the Port Range fields Then c...

Страница 22: ...eck with the Internet application documentation for the port number s needed StartPort EnterthestartingportnumberoftheTriggered Range End Port Enter the ending port number of the Triggered Range Forwa...

Страница 23: ...ority Application Priority QoS manages information as it is transmitted and received Depending on the settings of the QoS screen this feature will assign information a high or low priority for the app...

Страница 24: ...will need to enter the Router s password when accessing the Router this way as usual Use https To require the use of HTTPS for remote access select this feature UPnP UPnP Keep the default Enable to en...

Страница 25: ...Save Settings Any settings you have saved will be lost when the default settings are restored Administration Factory Defaults Administration Upgrade Firmware The Administration Upgrade Firmware scree...

Страница 26: ...section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Setup Basic Setup screen Click Refresh to update th...

Страница 27: ...ork screen click Close Status Wireless The Status Wireless screen displays the status of your wireless network Status Wireless Wireless MAC Address The MAC address of the Router s local wireless inter...

Страница 28: ...t the setup CD into your computer and then follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt fol...

Страница 29: ...RF Power Output 18 dBm UPnP able cert Able Security Features Stateful Packet Inspection SPI Firewall Internet Policy Wireless Security Wi Fi Protected Access 2 WPA2 WEP Wireless MAC Filtering Environm...

Страница 30: ...ct or software will be uninterrupted or error free Also due to the continual development of new techniques for intruding upon and attacking networks Linksys does not warrant that the product software...

Страница 31: ...fective product covered by this limited warranty will be repaired or replaced and returned to you without charge Customers outside of the United States of America and Canada are responsible for all sh...

Страница 32: ...iation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20...

Страница 33: ...ntenne ou d un autre metteur ou fonctionner avec une autre antenne ou un autre metteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actu...

Страница 34: ...recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se lik...

Страница 35: ...eter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination et...

Страница 36: ...elsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands Du...

Страница 37: ...ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce sa...

Страница 38: ...YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND PO...

Страница 39: ...sco makes no representations as to the quality suitability functionality or legality of any sites or products to which links may be provided or third party services and you hereby waive any claim you...

Страница 40: ...tain settings in your Internet browser software including the default settings for search provider and source of DNS error pages and may direct erroneous URLs to an error landing page hosted by Cisco...

Страница 41: ...this Agreement is found to be void or unenforceable the remaining provisions will remain in full force and effect This Agreement constitutes the entire agreement between the parties with respect to t...

Страница 42: ...ts These restrictions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis o...

Страница 43: ...er licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written enti...

Страница 44: ...ion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide...

Страница 45: ...or this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can...

Страница 46: ...orm executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work u...

Страница 47: ...of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent acce...

Страница 48: ...is requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Libra...

Страница 49: ...tten in the body of this License The Free Software Foundation may publish revised 13 and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spi...

Страница 50: ...ppear in their names without prior written permission of the OpenSSL Project Redistributions of any form whatsoever must retain 6 the following acknowledgment This product includes software developed...

Страница 51: ...Tim Hudson tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR...

Отзывы: