LINKSYS WRT310NV2 Wireless-N Gigabit Router User Manual WRT310N V10 UG C WEB

LINKSYS LLC Wireless-N Gigabit Router WRT310N V10 UG C WEB

User manual

USER GUIDEWireless-N Gigabit RouterModel: WRT310N
About This GuideiWireless-N Gigabit RouterAbout This GuideIcon DescriptionsWhile reading through the User Guide you may seevarious icons that call attention to specific items. Below isa description of these icons:NOTE: This check mark indicates that there isa note of interest and is something that youshould pay special attention to while using theproduct.WARNING: This exclamation point indicatesthat there is a caution or warning and it issomething that could damage your property orproduct.WEB: This globe icon indicates a noteworthywebsite address or e-mail address.Online ResourcesWebsite addresses in this document are listed withouthttp:// in front of the address because most current webbrowsers do not require it. If you use an older web browser,you may have to addhttp://in front of the web address.Resource WebsiteLinksys www.linksys.comLinksys Internationalwww.linksys.com/internationalGlossarywww.linksys.com/glossaryNetwork Securitywww.linksys.com/securityCopyright and TrademarksLinksys is a registered trademark or trademark of Cisco Systems, Inc.and/or its affiliates in the U.S. andcertain other countries. Copyright© 2008 Cisco Systems, Inc. All rightsreserved. Other brands and productnames are trademarks or registeredtrademarks of their respective holders.
Table of ContentsiiWireless-N Gigabit RouterChapter 1: Product Overview 4Front Panel..................................................4Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Placement Positions ............................................4Chapter 2: Wireless Security Checklist 6General Network Security Guidelines .................................6Additional Security Tips  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6Chapter 3: Advanced Conguration 7Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Setup > DDNS................................................11Setup > MAC Address Clone.......................................12Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14Wireless > Wireless MAC Filter......................................16Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18Security > VPN Passthrough.......................................19Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Applications and Gaming > Single Port Forwarding........................21Applications and Gaming > Port Range Forwarding  . . . . . . . . . . . . . . . . . . . . . . .21Applications & Gaming > Port Range Triggering .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .22Applications and Gaming > DMZ  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Administration > Management.....................................25Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Administration > Factory Defaults ...................................27Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28Status > Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29Appendix A: Troubleshooting 30Appendix B: Specications 31Appendix C: Warranty Information 32Limited Warranty..............................................32Exclusions and Limitations........................................32Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Table of ContentsiiiWireless-N Gigabit RouterAppendix D: Regulatory Information 34FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Safety Notices................................................34Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Avis d’Industrie Canada..........................................35Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35Avis de non-responsabilité concernant les appareils sans l  . . . . . . . . . . . . . . . . . .35User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) ..............................36Appendix E: Software License Agreement 40Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40
Chapter 1 Product Overview4Wireless-N Gigabit RouterChapter 1:  Product OverviewThank you for choosing the Linksys Wireless-N GigabitRouter. The Router lets you access the Internet via awireless connection or through one of its four switchedports. You can also use the Router to share resources, suchas computers. A variety of security features help to protectyour data and your privacy while online. Security featuresinclude WPA2 security, a Stateful Packet Inspection (SPI)firewall and NAT technology. Configuring the Router iseasy using the provided browser-based utility.Front Panel1, 2, 3, 4(Green/Blue)These numbered LEDs,corresponding with the numbered ports on theRouter’s back panel, serve two purposes. TheLED is solidly lit when the Router is connectedto a device through that port. It flashes toindicates network activity. Green indicatesGigabit speeds, and blue indicates 10/100speeds.Wi-Fi Protected Setup ButtonIf you haveclient devices, such as wireless adapters, thatsupport Wi-Fi Protected Setup, then you canuse Wi-Fi Protected Setup to automaticallyconfigure wireless security for your wirelessnetwork(s).To use Wi-Fi Protected Setup, run the SetupWizard, or refer to the “Wireless > Basic WirelessSettings” section of “Chapter 3: AdvancedConfiguration”.Wi-Fi Protected Setup LED (Blue/Amber)Itlights up blue when wireless security isenabled. The LED flashes blue for twominutes during Wi-Fi Protected Setup.The LED lights up amber if there is an errorduring the Wi-Fi Protected Setup process. Makesure the client device supports Wi-Fi Protected Setup. Wait until the LED is off, and then try again.The LED flashes amber when a Wi-Fi Protected Setup session is active, and a second sessionbegins. The Router supports one session at atime. Wait until the LED is off before starting thenext Wi-Fi Protected Setup session.Wireless(Blue)The Wireless LED lights upwhen the wireless feature is enabled. If the LEDis flashing, the Router is actively sending orreceiving data over the network.Internet(Blue)The Internet LED lights upwhen there is a connection made through theInternet port. A flashing LED indicates network activity over the Internet port.Power (Blue)The Power LED lights up and willstay on while the Router is powered on. Whenthe Router goes through its self-diagnosticmode during every boot-up, this LED will flash.When the diagnostic is complete, the LED willbe solidly lit.Back PanelInternetThis Gigabit port is where you willconnect your cable or DSL Internet connection.1, 2, 3, 4These Gigabit ports (1, 2, 3, 4) connectthe Router to computers and other Ethernetnetwork devices on your wired network.ResetThere are two ways to reset the Router’s factory defaults. Either press and hold the ResetButton for approximately five seconds, or restorethe defaults from Administration>FactoryDefaults in the Router’s web-based utility.Power The Power port is where you willconnect the power adapter.Placement PositionsThere are two ways to physically install the Router. Thefirst way is to place the Router horizontally on a surface.The second way is to mount the Router on a wall.Horizontal PlacementThe Router has four rubber feet on its bottom panel. Placethe Router on a level surface near an electrical outlet.
Chapter 1 Product Overview5Wireless-N Gigabit RouterWall-Mounting PlacementThe Router has two wall-mount slots on its bottompanel. The distance between the slots is 152 mm(6 inches).Two screws are needed to mount the Router.Suggested Mounting Hardware2.5-3.0 mm4-5 mm1-1.5 mmNote: Mounting hardware illustrations are not †true to scale.NOTE:Linksys is not responsible for damagesincurred by insecure wall-mounting hardware.Follow these instructions:Determine where you want to mount the Router. Make1.sure that the wall you use is smooth, flat, dry, andsturdy. Also make sure the location is within reach of an electrical outlet.Drill two holes into the wall. Make sure the holes are2.152 mm (6 inches) apart.Insert a screw into each hole and leave 3 mm3.(0.12 inches) of its head exposed.Maneuver the Router so the wall-mount slots line up4.with the two screws.Place the wall-mount slots over the screws and slide5.the Router down until the screws fit snugly into thewall-mount slots.152 mmWall Mounting TemplatePrint this page at 100% size.Cut along the dotted line, and place on the wall to drill precise spacing.
Chapter 2 Wireless Security Checklist6Wireless-N Gigabit RouterChapter 2:  Wireless Security ChecklistWireless networks are convenient and easy to install, sohomes with high-speed Internet access are adopting themat a rapid pace. Because wireless networking operates bysending information over radio waves, it can be morevulnerable to intruders than a traditional wired network.Like signals from your cellular or cordless phones, signalsfrom your wireless network can also be intercepted. Sinceyou cannot physically prevent someone from connectingto your wireless network, you need to take some additionalsteps to keep your network secure.1. Change the default wireless network name or SSIDWireless devices have a default wireless network nameor Service Set Identifier (SSID) set by the factory. Thisis the name of your wireless network, and can be upto 32 characters in length. Linksys wireless productsuselinksys as the default wireless network name. Youshould change the wireless network name to somethingunique to distinguish your wireless network from otherwireless networks that may exist around you, but do notuse personal information (such as your Social Securitynumber) because this information may be available foranyone to see when browsing for wireless networks.2. Change the default passwordFor wireless products such as access points and routers,you will be asked for a password when you want to changetheir settings. These devices have a default password setby the factory. The Linksys default password is admin.Hackers know these defaults and may try to use themto access your wireless device and change your network settings. To thwart any unauthorized changes, customizethe device’s password so it will be hard to guess.3. Enable MAC address filteringLinksys routers give you the ability to enable Media AccessControl (MAC) address filtering. The MAC address is aunique series of numbers and letters assigned to everynetworking device. With MAC address filtering enabled,wireless network access is provided solely for wirelessdevices with specific MAC addresses. For example, you canspecify the MAC address of each computer in your homeso that only those computers can access your wirelessnetwork.4. Enable encryptionEncryption protects data transmitted over a wirelessnetwork. Wi-Fi Protected Access (WPA/WPA2) and WiredEquivalency Privacy (WEP) offer different levels of securityfor wireless communication.A network encrypted with WPA/WPA2 is more securethan a network encrypted with WEP, because WPA/WPA2uses dynamic key encryption. To protect the informationas it passes over the airwaves, you should enable thehighest level of encryption supported by your network equipment. WEP is an older encryption standard and may be theonly option available on some older devices that do notsupport WPA.General Network Security GuidelinesWireless network security is useless if the underlyingnetwork is not secure.Password protect all computers on the network andsindividually password protect sensitive files.Change passwords on a regular basis.sInstall anti-virus software and personal firewallssoftware.Disable file sharing (peer-to-peer). Some applicationssmay open file sharing without your consent and/orknowledge.Additional Security TipsKeep wireless routers, access points, or gateways awaysfrom exterior walls and windows.Turn wireless routers, access points, or gatewayssoff when they are not being used (at night, duringvacations).Use strong passphrases that are at least eight characterssin length. Combine letters and numbers to avoid usingstandard words that can be found in the dictionary.WEB: For more information on wirelesssecurity, visit www.linksys.com/security
Chapter 3 Advanced Configuration7Wireless-N Gigabit RouterChapter 3:  Advanced ConfigurationAfter setting up the Router with the Setup Wizard (locatedon the CD-ROM), the Router will be ready for use. However,if you’d like to change its advanced settings, use theRouter’s web-based utility. This chapter describes eachweb page of the utility and each page’s key functions. Youcan access the utility via a web browser on a computerconnected to the Router.The web-based utility has these main tabs: Setup,Wireless, Security, Access Restrictions, Applications &Gaming, Administration, and Status. Additional tabs willbe available after you click one of the main tabs.NOTE: When first installing the Router, youshould use the Setup Wizard on the SetupCD-ROM. If you want to configure advancedsettings, use this chapter to learn about theweb-based utility.How to Access the Web-Based UtilityTo access the web-based utility, launch the web browser onyour computer, and enter the Router’s default IP address,192.168.1.1, in the Addressfield. Then, pressEnter.A login screen will appear. (Non-Windows XP users willsee a similar screen.) Leave theUser name field blank. Thefirst time you open the Web-based utility, use the defaultpasswordadmin. (You can set a new password from theAdministration tab’sManagementscreen.) Click tOKto Kcontinue.Login ScreenSetup > Basic SetupThe first screen that appears is theBasic Setup screen. Thisallows you to change the Router’s general settings.Setup > Basic SetupInternet SetupThe Internet Setup section configures the Router to yourInternet connection. Most of this information can beobtained through your ISP.Internet Connection TypeSelect the type of Internet connection your ISP providesfrom the drop-down menu. These are the available types:Automatic Configuration - DHCPsStatic IPsPPPoEsPPTPsL2TPsTelstra CablesAutomatic Configuration - DHCPBy default, the Router’s Internet Connection Type is settoAutomatic Configuration - DHCP, which should bekept only if your ISP supports DHCP or you are connectingthrough a dynamic IP address. (This option usually appliesto cable connections.)Internet Connection Type > Automatic Configuration - DHCP
Chapter 3 Advanced Configuration8Wireless-N Gigabit RouterStatic IPIf you are required to use a permanent IP address toconnect to the Internet, select Static IP.Internet Connection Type > Static IPInternet IP Address This is the Router’s IP address, whenseen from the Internet. Your ISP will provide you with theIP Address you need to specify here.Subnet Mask This is the Router’s Subnet Mask, as seenby users on the Internet (including your ISP). Your ISP willprovide you with the Subnet Mask.Default Gateway Your ISP will provide you with the IPaddress of the ISP server.DNS 1-3Your ISP will provide you with at least one DNS(Domain Name System) server IP address.PPPoESome DSL-based ISPs use PPPoE (Point-to-Point Protocolover Ethernet) to establish Internet connections. If you areconnected to the Internet through a DSL line, check withyour ISP to see if they use PPPoE. If they do, you will haveto enable PPPoE.Internet Connection Type > PPPoEUsername and PasswordEnter the Username andPassword provided by your ISP.Service Name If provided by your ISP, enter the ServiceName.Connect on Demand: Max Idle Time You can configurethe Router to cut the Internet connection after it has beeninactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Timefield, enter the number of minutes you want to have elapsedbefore your Internet connection terminates. The defaultMax Idle Time is 15 minutes.Keep Alive: Redial PeriodIf you select this option,the Router will periodically check your Internetconnection. If you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In the Redial Periodfield,dyou specify how often you want the Router to check the Internet connection. The default Redial Period is30 seconds.PPTPPoint-to-Point Tunneling Protocol (PPTP) is a service thatapplies to connections in Europe only.Internet Connection Type > PPTPIf your ISP supports DHCP or you are connecting througha dynamic IP address, then selectObtain an IP AddressAutomatically. If you are required to use a permanent IPaddress to connect to the Internet, then select Specify anIP Address. Then configure the following:Specify  an IP AddresssThis is the Router’s IP address, as seen from the Internet. Your ISP will provide youwith the IP Address you need to specify here.Subnet MasksThis is the Router’s Subnet Mask, asseen by users on the Internet (including your ISP). YourISP will provide you with the Subnet Mask.Default GatewaysYour ISP will provide you with theIP address of the ISP server.DNS 1-3sYour ISP will provide you with at least oneDNS (Domain Name System) server IP address.PPTP Server IP AddressYour ISP will provide you withthe IP address of the PPTP server.Username and PasswordEnter the Username andPassword provided by your ISP.Connect on Demand: Max Idle Time You can configurethe Router to cut the Internet connection after it has beeninactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due to
Chapter 3 Advanced Configuration9Wireless-N Gigabit Routerinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Timefield, enter the number of minutes you want to have elapsedbefore your Internet connection terminates. The defaultMax Idle Time is 15 minutes.Keep Alive: Redial PeriodIf you select this option, theRouter will periodically check your Internet connection. If you are disconnected, then the Router will automaticallyre-establish your connection. To use this option, selectKeep Alive. In the Redial Period field, you specify how often dyou want the Router to check the Internet connection. Thedefault value is 30seconds.L2TPL2TP is a service that applies to connections in Israel only.Internet Connection Type > L2TPServer IP Address This is the IP address of the L2TPServer. Your ISP will provide you with the IP Address youneed to specify here.Username and PasswordEnter the Username andPassword provided by your ISP.Connect on Demand: Max Idle Time You can configurethe Router to cut the Internet connection after it has beeninactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Timefield, enter the number of minutes you want to have elapsedbefore your Internet connection terminates. The defaultMax Idle Time is 15 minutes.Keep Alive: Redial PeriodIf you select this option,the Router will periodically check your Internetconnection. If you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In theRedial Periodfield,dyou specify how often you want the Router to check the Internet connection. The default Redial Period is30 seconds.Telstra CableTelstra Cable is a service that applies to connections inAustralia only.Internet Connection Type > Telstra CableServer IP Address This is the IP address of the HeartbeatServer. Your ISP will provide you with the IP Address youneed to specify here.Username and PasswordEnter the Username andPassword provided by your ISP.Connect on Demand: Max Idle Time You can configurethe Router to cut the Internet connection after it has beeninactive for a specified period of time (Max Idle Time). If your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Timefield, enter the number of minutes you want to have elapsedbefore your Internet connection terminates. The defaultMax Idle Time is 15 minutes.Keep Alive: Redial PeriodIf you select this option,the Router will periodically check your Internetconnection. If you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In theRedial Periodfield,dyou specify how often you want the Router to check the Internet connection. The default Redial Period is30 seconds.Optional SettingsSome of these settings may be required by your ISP. Verifywith your ISP before making any changes.Optional SettingsHost Name and Domain Name These fields allow you tosupply a host and domain name for the Router. Some ISPs,usually cable ISPs, require these names as identification.You may have to check with your ISP to see if yourbroadband Internet service has been configured with a
Chapter 3 Advanced Configuration10Wireless-N Gigabit Routerhost and domain name. In most cases, leaving these fieldsblank will work.MTU MTU is the Maximum Transmission Unit. It specifiesthe largest packet size permitted for Internet transmission.Select Manual if you want to manually enter the largestpacket size that is transmitted. To have the Router selectthe best MTU for your Internet connection, keep thedefault setting, Auto.SizeWhen Manual is selected in theMTU field, this optionUis enabled. Leave this value in the 1200 to 1500 range. Thedefault size depends on the Internet Connection Type:DHCP, Static IP, or Telstra:s1500PPPoE:s1492PPTP or L2TP:s1460Network SetupThe Network Setup section changes the settings on thenetwork connected to the Router’s Ethernet ports. Wirelesssetup is performed through the Wireless tab.Router IPThis presents both the Router’s IP Address and SubnetMask as seen by your network.Router IPDHCP Server SettingThe settings allow you to configure the Router’s DynamicHost Configuration Protocol (DHCP) server function. TheRouter can be used as a DHCP server for your network. ADHCP server automatically assigns an IP address to eachcomputer on your network. If you choose to enable theRouter’s DHCP server option, make sure there is no otherDHCP server on your network.DHCP Server SettingDHCP ServerDHCP is enabled by factory default. If youalready have a DHCP server on your network, or you don’twant a DHCP server, then selectDisabled (no other DHCPfeatures will be available).DHCP Reservation Click this button if you want to assigna fixed local IP address to a MAC address.DHCP ReservationYou will see a list of DHCP clients with the followinginformation: Client Name, Interface, IP Address, andMAC Address.DHCP ReservationSelect Clients from DHCP TablesClick theSelectcheck box to reserve a client’s IP address. Then click Add Clients.Manually Adding ClientsTo manually assign an IPaddress, enter the client’s name in the Enter Client Name field. Enter the IP address you want it to have intheAssign IP Address field. Enter its MAC address in theTo This MAC Address field. Then click Add.Clients Already ReservedA list of DHCP clients and their fixed local IP addresseswill be displayed at the bottom of the screen. If youwant to remove a client from this list, click Remove.ClickSave Settingsto apply your changes, or click Cancel Changes to cancel your changes. To view themost up-to-date information, click Refresh. To exit thisscreen, click Close.Start IP AddressEnter a value for the DHCP server tostart with when issuing IP addresses. Because the Router’s default IP address is 192.168.1.1, the Start IP Address must be 192.168.1.2 or greater, but smaller than 192.168.1.253. The default Starting IP Address is 192.168.1.100.Maximum Number of UsersEnter the maximumnumber of PCs that you want the DHCP server to assignIP addresses to. This number cannot be greater than 253.The default is 50.IP Address RangeDisplayed here is the range of availableIP addresses.
Chapter 3 Advanced Configuration11Wireless-N Gigabit RouterClient Lease TimeThe Client Lease Time is the amountof time a network user will be allowed connection to theRouter with their current dynamic IP address. Enter theamount of time, in minutes, that the user will be “leased” this dynamic IP address. After the time is up, the user willbe automatically assigned a new dynamic IP address. Thedefault is0 minutes, which means one day.Static DNS 1-3The Domain Name System (DNS) is how the Internet translates domain or website names into Internet addresses or URLs. Your ISP will provide you with at least one DNS Server IP Address. If you wish to use another, enter that IP Address in one of these fields. You can enter up to three DNS Server IP Addresses here. The Router will use these for quicker access to functioning DNS servers.WINS The Windows Internet Naming Service (WINS)manages each PC’s interaction with the Internet. If youuse a WINS server, enter that server’s IP Address here.Otherwise, leave this blank.Time SettingTime ZoneSelect the time zone in which your network functions from this drop-down menu. (You can evenautomatically adjust for daylight saving time.)Time SettingClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Setup > DDNSThe Router offers a Dynamic Domain Name System (DDNS)feature. DDNS lets you assign a fixed host and domainname to a dynamic Internet IP address. It is useful whenyou are hosting your own website, FTP server, or otherserver behind the Router.Before you can use this feature, you need to signup for DDNS service with a DDNS service provider,www.dyndns.org or www.TZO.com. If you do not want touse this feature, keep the default setting,Disabled.DDNSDDNS ServiceIf your DDNS service is provided by DynDNS.org, thenselect DynDNS.org from the drop-down menu. If yourDDNS service is provided by TZO, then select TZO.com.The features available on theDDNS screen will vary,depending on which DDNS service provider you use.DynDNS.orgSetup > DDNS > DynDNSUsername Enter the Username for your DDNS account.Password Enter the Password for your DDNS account.Host NameThe is the DDNS URL assigned by the DDNSservice.SystemSelect the DynDNS service you use:Dynamic,Static, orCustom. The default selection isDynamic.Mail Exchange (Optional)Enter the address of your mailexchange server, so e-mails to your DynDNS address go toyour mail server.Backup MX This feature allows the mail exchange serverto be a backup. To disable this feature, keep the default,Disabled. To enable the feature, select Enabled. If you are not sure which setting to select, keep the default,Disabled.Wildcard This setting enables or disables wildcardsfor your host. For example, if your DDNS address ismyplace.dyndns.org and you enable wildcards, thenx.myplace.dyndns.orgwill work as well (x is the wildcard).To disable wildcards, keep the default,Disabled. To enablewildcards, select Enabled. If you are not sure which settingto select, keep the default, Disabled.Internet IP Address The Router’s Internet IP address isdisplayed here. Because it is dynamic, it will change.Status The status of the DDNS service connection isdisplayed here.UpdateTo manually trigger an update, click this button.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.
Chapter 3 Advanced Configuration12Wireless-N Gigabit RouterTZO.comSetup > DDNS > TZOE-mail Address, TZO Key, and Domain Name Enter thesettings of the account you set up with TZO.Internet IP Address The Router’s Internet IP address isdisplayed here. Because it is dynamic, it will change.Status The status of the DDNS service connection isdisplayed here.UpdateTo manually trigger an update, click this button.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Setup > MAC Address CloneA MAC address is a 12-digit code assigned to a uniquepiece of hardware for identification. Some ISPs will requireyou to register a MAC address in order to access theInternet. If you do not wish to re-register the MAC addresswith your ISP, you may assign the MAC address you havecurrently registered with your ISP to the Router with theMAC Address Clone feature.Setup > MAC Address CloneMAC Address CloneEnabled/Disabled To have the MAC Address cloned,select Enabled.MAC AddressEnter the MAC Address registered withyour ISP here.Clone My PC’s MACClick this button to clone the MACaddress of the computer you are using.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Setup > Advanced RoutingThis screen is used to set up the Router’s advancedfunctions. Operating Mode allows you to select thetype(s) of advanced functions you use. Dynamic Routingautomatically adjusts how packets travel on your network.Static Routing sets up a fixed route to another network destination.Setup > Advanced RoutingAdvanced RoutingNATEnabled/DisabledIf this Router is hosting your network’sconnection to the Internet, keep the default,Enabled. If another router exists on your network, select Disabled.When the NAT setting is disabled, dynamic routing will beenabled.Dynamic Routing (RIP)Enabled/Disabled This feature enables the Router toautomatically adjust to physical changes in the network’slayout and exchange routing tables with the other router(s).The Router determines the network packets’ route basedon the fewest number of hops between the source andthe destination. When the NAT setting is enabled, theDynamic Routing feature is automatically disabled. Whenthe NAT setting is disabled, this feature is available. SelectEnabledto use the Dynamic Routing feature.Static RoutingA static route is a pre-determined pathway that network information must travel to reach a specific host or network.Enter the information described below to set up a newstatic route.
Chapter 3 Advanced Configuration13Wireless-N Gigabit RouterRoute EntriesTo set up a static route between the Routerand another network, select a number from the drop-down list. Click Delete This Entry to delete a static route.Enter Route Name Enter a name for the Route here,using a maximum of 25 alphanumeric characters.Destination LAN IPThe Destination LAN IP is the addressof the remote network or host to which you want to assigna static route.Subnet Mask The Subnet Mask determines whichportion of a Destination LAN IP address is the network portion, and which portion is the host portion.Gateway This is the IP address of the gateway device thatallows for contact between the Router and the remotenetwork or host.Interface This interface tells you whether the DestinationIP Address is on the LAN & Wireless (Ethernet and wirelessnetworks) or the WAN(Internet).ClickShow Routing Table to view the static routes youhave already set up.Advanced Routing > Routing TableRouting TableFor each route, the Destination LAN IP address, SubnetMask, Gateway, and Interface are displayed. Click Refreshto update the information. Click Close to exitthis screen.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Wireless > Basic Wireless SettingsThe basic settings for wireless networking are set on thisscreen.There are two ways to configure the Router’s wirelessnetwork(s), manual and Wi-Fi Protected Setup.Wi-Fi Protected Setup is a feature that makes it easy to setup your wireless network. If you have client devices, suchas wireless adapters, that support Wi-Fi Protected Setup,then you can use Wi-Fi Protected Setup.Wireless ConfigurationTo manually configure yourwireless network, selectManual. Proceed to the “BasicWireless Settings” section. To use Wi-Fi Protected Setup,select  Wi-Fi Protected Setup. Proceed to the “Wi-FiProtected Setup” section.Basic Wireless SettingsWireless > Basic Wireless Settings (Manual Setup)Network ModeFrom this drop-down menu, you canselect the wireless standards running on your network. If you have Wireless-N, Wireless-G, and Wireless-B devices inyour network, keep the default setting, Mixed. If you have only Wireless-G and Wireless-B devices in your network,select BG-Mixed. If you have only Wireless-N devices,select  Wireless-N Only. If you have only Wireless-Gdevices, select Wireless-G Only. If you have only Wireless-B devices, selectWireless-B Only. If you do not have anywireless devices in your network, selectDisabled.Network Name (SSID) The SSID is the network nameshared among all points in a wireless network. TheSSID must be identical for all devices in the wirelessnetwork. It is case-sensitive and must not exceed32 characters (use any of the characters on the keyboard).Make sure this setting is the same for all points in yourwireless network. For added security, you should changethe default SSID (linksys) to a unique name.Radio BandFor best performance in a network usingWireless-N, Wireless-G and Wireless-B devices, keep thedefault,Wide - 40MHz Channel. For Wireless-G andWireless-B networking only, select Standard - 20MHzChannel. If you are not sure which radio band to select,keep the default,Auto.NOTE: If you select Wide - 40MHz Channel forthe Radio Band setting, then Wireless-N can usetwo channels: a primary one (Wide Channel)and a secondary one (Standard Channel). Thiswill enhance Wireless-N performance.Wide ChannelIf you selected Wide - 40MHz Channel forthe Radio Band setting, then this setting will be availablefor your primary Wireless-N channel. Select any channelfrom the drop-down menu. If you are not sure whichchannel to select, keep the default,Auto.
Chapter 3 Advanced Configuration14Wireless-N Gigabit RouterStandard ChannelIf you selected Wide - 40MHz Channelor Standard - 20MHz Channel for the Radio Band setting,then this setting will be available. Select the channel forWireless-N, Wireless-G, and Wireless-B networking. If you selected Wide – 40MHz Channel for the Radio Bandsetting, then the Standard Channel will be a secondarychannel for Wireless-N.SSID Broadcast When wireless clients survey the localarea for wireless networks to associate with, they willdetect the SSID broadcast by the Router. To broadcast theRouter’s SSID, keep the default setting,Enabled. If youdo not want to broadcast the Router’s SSID, then selectDisabled.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Wi-Fi Protected SetupThere are three methods available. Use the method thatapplies to the client device you are configuring.Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)Wi-Fi Protected Setup > CongratulationsNOTE: Wi-Fi Protected Setup configures oneclient device at a time. Repeat the instructionsfor each client device that supports Wi-FiProtected Setup.Method #1Use this method if your client device has a Wi-Fi ProtectedSetup button.Click or press the1. Wi-Fi Protected Setup button onthe client device.Click the2.Wi-Fi Protected Setupbutton on thisscreen.After the client device has been configured, click 3.OK. Then refer back to your client device or itsdocumentation for further instructions.Method #2Use this method if your client device has a Wi-Fi ProtectedSetup PIN number.Enter the PIN number in the1.field on this screen.Click2.Register.After the client device has been configured, click 3.OK. Then refer back to your client device or itsdocumentation for further instructions.Method #3Use this method if your client device asks for the Router’sPIN number.Enter the PIN number listed on this screen. (It is also1.listed on the label on the bottom of the Router.)After the client device has been configured, click 2.OK. Then refer back to your client device or itsdocumentation for further instructions.The Wi-Fi Protected Setup Status, Network Name (SSID),Security, Encryption, and Passphrase are displayed at thebottom of the screen.NOTE: If you have client devices that do notsupport Wi-Fi Protected Setup, note the wirelesssettings, and then manually configure thoseclient devices.Wireless > Wireless SecurityThe Wireless Securityscreen configures the security of yyour wireless network. There are six wireless securitymode options supported by the Router: WPA Personal,WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,and WEP. (WPA stands for Wi-Fi Protected Access, whichis a security standard stronger than WEP encryption. WEPstands for Wired Equivalent Privacy, while RADIUS stands
Chapter 3 Advanced Configuration15Wireless-N Gigabit Routerfor Remote Authentication Dial-In User Service.) Thesesix are briefly discussed here. For detailed instructionson configuring wireless security for the Router, refer to“Chapter 2: Wireless Security.”Wireless SecuritySecurity ModeSelect the security method for your wireless network. If you do not want to use wireless security, keep the default,Disabled.WPA PersonalNOTE: If you are using WPA, always rememberthat each device in your wireless network MUST use the same WPA method and shared key, orelse the network will not function properly.Security Mode > WPA PersonalPassphraseEnter a Passphrase of 8-63 characters.Key Renewal Enter a Key Renewal period, which instructsthe Router how often it should change the encryption keys.The default Group Key Renewal period is3600 seconds.WPA2 PersonalSecurity Mode > WPA2 PersonalEncryption WPA2 supports two encryption methods,TKIP and AES, with dynamic encryption keys. Select thetype of algorithm, AESor TKIP or AES. The default is TKIPor AES.PassphraseEnter a Passphrase of 8-63 characters.Key Renewal Enter a Key Renewal period, which instructsthe Router how often it should change the encryption keys.The default Group Key Renewal period is3600 seconds.WPA EnterpriseThis option features WPA used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)Security Mode > WPA EnterpriseRADIUS Server Enter the IP Address of the RADIUSserver.RADIUS Port Enter the port number of the RADIUSserver. The default value is1812.Shared SecretEnter the key shared between the Routerand the server.Key Renewal Enter a Key Renewal period, which instructsthe Router how often it should change the encryptionkeys. The default Key Renewal period is3600 seconds.WPA2 EnterpriseThis option features WPA2 used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)Security Mode > WPA2 EnterpriseEncryptionWPA2 supports two encryption methods,TKIP and AES, with dynamic encryption keys. Select the
Chapter 3 Advanced Configuration16Wireless-N Gigabit Routertype of algorithm, AESor TKIP or AES. The default is TKIPor AES.RADIUS Server Enter the IP Address of the RADIUSserver.RADIUS Port Enter the port number of the RADIUSserver. The default value is1812.Shared SecretEnter the key shared between the Routerand the server.Key Renewal Enter a Key Renewal period, which instructsthe Router how often it should change the encryptionkeys. The default Key Renewal period is 3600 seconds.RADIUSThis option features WEP used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)Security Mode > RADIUSIMPORTANT: If you are using WEP encryption, always remember that each device in yourwireless network MUST use the same WEPencryption method and encryption key, or else your wireless network will not function properly.RADIUS Server Enter the IP Address of the RADIUSserver.RADIUS Port Enter the port number of the RADIUSserver. The default value is1812.Shared SecretEnter the key shared between the Routerand the server.Encryption Select a level of WEP encryption,40/64 bits (10 hex digits)or 104/128 bits (26 hex digits).The default is40/64 bits (10 hex digits).PassphraseEnter a Passphrase to automatically generateWEP keys. Then click Generate.Key 1-4If you did not enter a Passphrase, enter the WEPkey(s) manually.TX KeySelect which TX (Transmit) Key to use. The defaultis1.WEPWEP is a basic encryption method, which is not as secureas WPA. Security Mode > WEPEncryption Select a level of WEP encryption,40/64 bits (10 hex digits)or 104/128 bits (26 hex digits).The default is40/64 bits (10 hex digits).PassphraseEnter a Passphrase to automatically generateWEP keys. Then click Generate.Key 1-4If you did not enter a Passphrase, enter the WEPkey(s) manually.TX KeySelect which TX (Transmit) Key to use. The defaultis1.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Wireless > Wireless MAC FilterWireless access can be filtered by using the MAC addresses of the wireless devices transmitting within your network’s radius.
Chapter 3 Advanced Configuration17Wireless-N Gigabit RouterWireless > Wireless MAC FilterWireless MAC FilterEnabled/DisabledTo filter wireless users by MAC Address,either permitting or blocking access, select Enabled. If youdo not wish to filter users by MAC Address, keep the defaultsetting, Disabled.Access RestrictionPreventSelect thisto block wireless access by MACAddress. This button is selected by default.PermitSelect this to allow wireless access by MACAddress. This button is not selected by default.MAC Address Filter ListWireless Client ListClick this to open theWireless Client Listscreen.tWireless Client ListWireless Client ListThis screen shows computers and other devices onthe wireless network. The list can be sorted by ClientName, Interface, IP Address, MAC Address, and Status.SelectSave to MAC Address Filter List for any device you want to add to the MAC Address Filter List. ThenclickAdd.To retrieve the most up-to-date information, click Refresh. To exit this screen and return to theWirelessMAC Filterscreen, click rClose.MAC 01-50Enter the MAC addresses of the deviceswhose wireless access you want to block or allow.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Wireless > Advanced Wireless SettingsThis Advanced Wireless Settings screen is used to set upthe Router’s advanced wireless functions. These settingsshould only be adjusted by an expert administrator asincorrect settings can reduce wireless performance.Wireless > Advanced Wireless SettingsAdvanced WirelessAP IsolationThis isolates all wireless clients and wirelessdevices on your network from each other. Wireless deviceswill be able to communicate with the Router but notwith each other. To use this function, selectEnabled. APIsolation is disabled by default.Frame Burst Enabling this option should provide yournetwork with greater performance, depending on themanufacturer of your wireless products. To use this option,keep the default, Enabled. Otherwise, selectDisabled.Authentication Type The default is set toAuto, whichallows either Open System or Shared Key authenticationto be used. With Open System authentication, the senderand the recipient do NOT use a WEP key for authentication.
Chapter 3 Advanced Configuration18Wireless-N Gigabit RouterWith Shared Key authentication, the sender and recipientuse a WEP key for authentication. SelectShared Key toonly use Shared Key authentication.Basic RateThe Basic Rate setting is not actually one rateof transmission but a series of rates at which the Routercan transmit. The Router will advertise its Basic Rate to theother wireless devices in your network, so they know whichrates will be used. The Router will also advertise that it willautomatically select the best rate for transmission. Thedefault setting is Default, when the Router can transmitat all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,18Mbps, and 24Mbps). Other options are1-2Mbps, foruse with older wireless technology, andAll, when theRouter can transmit at all wireless rates. The Basic Rateis not the actual rate of data transmission. If you want tospecify the Router’s rate of data transmission, configurethe Transmission Rate setting.Transmission Rate The rate of data transmission shouldbe set depending on the speed of your wireless network.You can select from a range of transmission speeds, or youcan selectAutoto have the Router automatically use thefastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possibleconnection speed between the Router and a wirelessclient. The default is Auto.N Transmission Rate The rate of data transmissionshould be set depending on the speed of your Wireless-Nnetworking. You can select from a range of transmissionspeeds, or you can selectAuto to have the Routerautomatically use the fastest possible data rate and enablethe Auto-Fallback feature. Auto-Fallback will negotiate thebest possible connection speed between the Router and awireless client. The default isAuto.CTS Protection ModeThe Router will automaticallyuse CTS (Clear-To-Send) Protection Mode when yourWireless-N and Wireless-G products are experiencingsevere problems and are not able to transmit to theRouter in an environment with heavy 802.11b traffic. Thisfunction boosts the Router’s ability to catch all Wireless-N and Wireless-G transmissions but will severely decreaseperformance. The default isAuto.Beacon Interval Enter a value between 1 and 65,535milliseconds. The Beacon Interval value indicates thefrequency interval of the beacon. A beacon is a packetbroadcast by the Router to synchronize the wirelessnetwork. The default value is100.DTIM Interval This value, between 1 and 255, indicatesthe interval of the Delivery Traffic Indication Message(DTIM). A DTIM field is a countdown field informingclients of the next window for listening to broadcastand multicast messages. When the Router has bufferedbroadcast or multicast messages for associated clients, itsends the next DTIM with a DTIM Interval value. Its clientshear the beacons and awaken to receive the broadcastand multicast messages. The default value is1.Fragmentation Threshold This value specifies themaximum size for a packet before data is fragmentedinto multiple packets. If you experience a high packeterror rate, you may slightly increase the FragmentationThreshold. Setting the Fragmentation Threshold too lowmay result in poor network performance. Only minorreduction of the default value is recommended. In mostcases, it should remain at its default value of 2346.RTS Threshold Should you encounter inconsistent dataflow, only minor reduction of the default value, 2347, isrecommended. If a network packet is smaller than thepreset RTS threshold size, the RTS/CTS mechanism willnot be enabled. The Router sends Request to Send (RTS)frames to a particular receiving station and negotiatesthe sending of a data frame. After receiving an RTS, thewireless station responds with a Clear to Send (CTS) frameto acknowledge the right to begin transmission. The RTSThreshold value should remain at its default value of 2347.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Security > FirewallThe Firewall screen is used to configure a firewall that canlfilter out various types of unwanted traffic on the Router’slocal network. Security > FirewallFirewallSPI Firewall Protection To use firewall protection,keep the default selection, Enabled. To turn off firewallprotection, selectDisabled.Internet FilterFilter Anonymous Internet RequestsThis featuremakes it more difficult for outside users to work theirway into your network. This feature is selectedby default.
Chapter 3 Advanced Configuration19Wireless-N Gigabit RouterDeselect the feature to allow anonymous Internetrequests.Filter MulticastMulticasting allows for multipletransmissions to specific recipients at the same time. If multicasting is permitted, then the Router will allow IPmulticast packets to be forwarded to the appropriatecomputers. Select this feature to filter multicasting. Thisfeature is not selected by default.Filter Internet NAT RedirectionThis feature uses portforwarding to block access to local servers from localnetworked computers. Select this feature to filter InternetNAT redirection. It is not selected by default.Filter IDENT (Port 113)This feature keeps port 113 frombeing scanned by devices outside of your local network.This feature is selected by default. Deselect this feature todisable it.Web FilterProxy Use of WAN proxy servers may compromise theGateway’s security. Denying Proxy will disable access toany WAN proxy servers. Select this feature to enable proxyfiltering. Deselect the feature to allow proxy access.Java Java is a programming language for websites. If youdeny Java, you run the risk of not having access to Internetsites created using this programming language. Selectthis feature to enable Java filtering. Deselect the featureto allow Java usage.ActiveXActiveX is a programming language for websites.If you deny ActiveX, you run the risk of not having access toInternet sites created using this programming language.Select this feature to enable ActiveX filtering. Deselect thefeature to allow ActiveX usage.CookiesA cookie is data stored on your computer andused by Internet sites when you interact with them. Selectthis feature to filter cookies. Deselect the feature to allowcookie usage.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Security > VPN PassthroughTheVPN Passthrough screen allows you to enable VPN tunnels using IPSec, PPTP, or L2TP protocols to pass through the Router’s firewall.Security > VPN PassthroughVPN PassthroughIPSec PassthroughInternet Protocol Security (IPSec) isa suite of protocols used to implement secure exchangeof packets at the IP layer. To allow IPSec tunnels to passthrough the Router, keep the default, Enabled.PPTP PassthroughPoint-to-Point Tunneling Protocol(PPTP) allows the Point-to-Point Protocol (PPP) to betunneled through an IP network. To allow PPTP tunnels topass through the Router, keep the default, Enabled.L2TP PassthroughLayer 2 Tunneling Protocol is themethod used to enable Point-to-Point sessions via theInternet on the Layer 2 level. To allow L2TP tunnels to passthrough the Router, keep the default, Enabled.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Access Restrictions > Internet AccessThe Internet Access screen allows you to block or allowspecific kinds of Internet usage and traffic, such as Internetaccess, designated services, and websites during specificdays and times.
Chapter 3 Advanced Configuration20Wireless-N Gigabit RouterAccess Restrictions > Internet AccessInternet Access PolicyAccess Policy Access can be managed by a policy. Use thesettings on this screen to establish an access policy (afterSave Settings is clicked). Selecting a policy from the drop-down menu will display that policy’s settings. To delete apolicy, select that policy’s number and click Delete ThisPolicy. To view all the policies, click Summary.SummaryThe policies are listed with the following information: No.,Policy Name, Access, Days, Time, and status (Enabled). Toenable a policy, select Enabled. To delete a policy, click Delete. Click Save Settings to save your changes, or click Cancel Changes to cancel your changes. To return to theInternet Access Policyscreen, click yClose.SummaryStatusPolicies are disabled by default. To enable a policy,select the policy number from the drop-down menu, andselect Enabled.To create a policy, follow steps 1-11. Repeat these steps tocreate additional policies, one at a time.Select a number from the1.Access Policydrop-downymenu.Enter a Policy Name in the field provided.2.To enable this policy, select3.Enabled.Click4.Edit Listto select which PCs will be affected by the policy. The  List of PCs screen appears. You can select a PC by MAC address or IP address. You can also enter a range of IP addresses if you want this policy to affect a group of PCs. After making your changes, click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Then click Close.List of PCsSelect the appropriate option,5.DenyorAllow,depending on whether you want to block or allowInternet access for the PCs you listed on the List of PCsscreen.Decide which days and what times you want this policy6.to be enforced. Select the individual days during whichthe policy will be in effect, or selectEveryday. Thenenter a range of hours and minutes during which thepolicy will be in effect, or select 24 Hours.You can block websites with specific URL addresses.7.Enter each URL in a separateURL field.You can also block websites using specific keywords.8.Enter each keyword in a separateKeyword field. d
Chapter 3 Advanced Configuration21Wireless-N Gigabit RouterYou can filter access to various services accessed9.over the Internet, such as FTP or telnet. (Youcan block up to three applications per policy.)From the Applications list, select the application youwant to block. Then click the>>button to move it tothe Blocked List. To remove an application from theBlocked List, select it and click the<< button.If the application you want to block is not listed10.or you want to edit a service’s settings, enter theapplication’s name in the Application Namefield. Enter its range in thePort Rangefields. Select its protocolfrom theProtocol drop-down menu. Then click lAdd.To modify a service, select it from theApplication list. Change its name, port range,and/or protocol setting. Then click Modify.To delete a service, select it from the Application list.Then clickDeletek.Click11.Save Settings to save the policy’s settings. Tocancel the policy’s settings, click Cancel Changes.Applications and Gaming > Single PortForwardingThe Single Port Forwarding screen allows you to customizeport services for common applications on this screen.When users send these types of requests to your network viathe Internet, the Router will forward those requests to theappropriate servers (computers). Before using forwarding,you should assign static IP addresses to the designatedservers (use the DHCP Reservation feature on the Basic Setupscreen).Applications and Gaming > Single Port ForwardingSingle Port ForwardingCommon applications are available for the first fiveentries. Select the appropriate application. Then enter theIP address of the server that should receive these requests.SelectEnabledto activate this entry.For additional applications, complete the following fields:Application NameEnter the name you wish to give theapplication. Each name can be up to 12 characters.External Port Enter the external port number used bythe server or Internet application. Check with the Internetapplication documentation for more information.Internal Port Enter the internal port number used bythe server or Internet application. Check with the Internetapplication documentation for more information.Protocol Select the protocol used for this application,eitherTCPor UDP, orBoth.To IP Address For each application, enter the IP addressof the PC that should receive the requests. If you assigneda static IP address to the PC, then you can click DHCPReservation on theBasic Setup screen to look up its staticIP address.Enabled For each application, selectEnabledto enable port forwarding.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Applications and Gaming > Port Range ForwardingThe Port Range Forwarding screen allows you to set uppublic services on your network, such as web servers,ftp servers, e-mail servers, or other specialized Internetapplications. (Specialized Internet applications are anyapplications that use Internet access to perform functionssuch as videoconferencing or online gaming. Some Internetapplications may not require any forwarding.)When users send these types of requests to your network viathe Internet, the Router will forward those requests to theappropriate servers (computers). Before using forwarding,you should assign static IP addresses to the designatedservers (use the DHCP Reservation feature on the Basic Setupscreen).If you need to forward all ports to one computer, click theDMZtab.
Chapter 3 Advanced Configuration22Wireless-N Gigabit RouterApplications and Gaming > Port Range ForwardingPort Range ForwardingTo forward a port, enter the information on each line forthe criteria required.Application NameIn this field, enter the name youwish to give the application. Each name can be up to 12characters.Start~End PortEnter the number or range of port(s)used by the server or Internet applications. Check with the Internet application documentation for moreinformation.Protocol Select the protocol used for this application,eitherTCPor UDP, orBoth.To IP Address For each application, enter the IP addressof the PC running the specific application. If you assigneda static IP address to the PC, then you can click DHCPReservation on theBasic Setup screen to look up its staticIP address.Enabled Select  Enabledto enable port forwarding forthe applications you have defined.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Applications & Gaming > Port Range TriggeringThe  Port Range Triggering screen allows the Router towatch outgoing data for specific port numbers. The IPaddress of the computer that sends the matching data isremembered by the Router, so that when the requesteddata returns through the Router, the data is pulled back to the proper computer by way of IP address and portmapping rules.Applications and Gaming > Port Range TriggeringPort Range TriggeringApplication Name Enter the application name of thetrigger.Triggered Range For each application, enter the startingand ending port numbers of the triggered port numberrange. Check with the Internet application documentationfor the port number(s) needed.Forwarded Range For each application, enter the startingand ending port numbers of the forwarded port numberrange. Check with the Internet application documentationfor the port number(s) needed.EnabledSelect Enabledto enable port triggering for theapplications you have defined.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Applications and Gaming > DMZThe DMZ feature allows one network computer to beexposed to the Internet for use of a special-purposeservice such as Internet gaming or videoconferencing.DMZ hosting forwards all the ports at the same time toone PC. The Port Range Forwarding feature is more securebecause it only opens the ports you want to have opened,while DMZ hosting opens all the ports of one computer,exposing the computer to the Internet.
Chapter 3 Advanced Configuration23Wireless-N Gigabit RouterApplications and Gaming > DMZDMZAny PC whose port is being forwarded must have its DHCPclient function disabled and should have a new static IPaddress assigned to it because its IP address may changewhen using the DHCP function.Enabled/Disabled To disable DMZ hosting, selectDisabled. To expose one PC, select Enabled. Thenconfigure the following settings:Source IP Address If you want any IP address to be thesource, select Any IP Address. If you want to specify an IPaddress or range of IP addresses as the designated source,select and complete the IP address range fields.DestinationIf you want to specify the DMZ host by IPaddress, select IP Address and enter the IP address inthe field provided. If you want to specify the DMZ hostby MAC address, select MAC Address and enter the MACaddress in the field provided. To retrieve this information,clickDHCP Client Table.DMZ > DHCP Client TableDHCP Client TableThe DHCP Client Table lists computers and otherdevices that have been assigned IP addresses by theRouter. The list can be sorted by Client Name, Interface,IP Address, MAC Address, and Expired Time (how muchtime is left for the current IP address). To select a DHCPclient, click Select. To retrieve the most up-to-dateinformation, click Refresh. To exit this screen andreturn to the DMZscreen, click ZClose.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Applications and Gaming > QoSQuality of Service (QoS) ensures better service tohigh-priority types of network traffic, which mayinvolve demanding, real-time applications, such asvideoconferencing. Applications and Gaming > QoSQoS (Quality of Service)WirelessYou can configure the support and No Acknowledgementsettings in this section.WMM Support If you have other devices that support Wi-Fi Multimedia (WMM) on your network, keep the default,Enabled. Otherwise, select Disabled.No AcknowledgementIf you want to disable the Router’sAcknowledgement feature, so the Router will not re-senddata if an error occurs, then select Enabled. Otherwise,keep the default, Disabled.Internet Access PriorityIn this section, you can set the bandwidth priority for avariety of applications and devices. There are four levelspriority: High, Medium, Normal, or Low. When you setpriority, do not set all applications to High, because this willdefeat the purpose of allocating the available bandwidth.If you want to select below normal bandwidth, select Low.Depending on the application, a few attempts may beneeded to set the appropriate bandwidth priority.Enabled/Disabled To use the QoS policies you have set,keep the default, Enabled. Otherwise, selectDisabled.
Chapter 3 Advanced Configuration24Wireless-N Gigabit RouterCategoryThere are four categories available. Select one of thefollowing: Applications,Online Games,MAC Address,Ethernet Port, or Voice Device. Proceed to the instructionsfor your selection.ApplicationsApplications Select the appropriate application. If youselect Add a New Application, follow the Add a NewApplication instructions.PrioritySelect the appropriate priority:High,Medium,Normal, orLow.ClickAdd to save your changes. Your new entry will appearin the Summary list.Add a New ApplicationQoS > Add a New ApplicationEnter a Name Enter any name to indicate the name of the entry.Port Range Enter the port range that the application willbe using. For example, if you want to allocate bandwidthfor FTP, you can enter 21-21. If you need services for anapplication that uses from 1000 to 1250, you enter 1000-1250 as your settings. You can have up to three rangesto define for this bandwidth allocation. Port numberscan range from 1 to 65535. Check your application’sdocumentation for details on the service ports used.Select the protocol TCPorUDP, or select Both.PrioritySelect the appropriate priority: High,Medium(Recommend),Normal, orLow.ClickAdd to save your changes. Your new entry will appearin the Summary list.Online GamesQoS > Online GamesGamesSelect the appropriate game.PrioritySelect the appropriate priority: High,Medium(Recommend),Normal, orLow.ClickAdd to save your changes. Your new entry will appearin the Summary list.MAC AddressQoS > MAC AddressEnter a Name Enter a name for your device.MAC AddressEnter the MAC address of your device.PrioritySelect the appropriate priority: High,Medium(Recommend),Normal, orLow.ClickAdd to save your changes. Your new entry will appearin the Summary list.Ethernet PortQoS > Ethernet PortEthernet Select the appropriate Ethernet port.PrioritySelect the appropriate priority: High,Medium(Recommend),Normal, orLow.ClickAdd to save your changes. Your new entry will appearin the Summary list.Voice DeviceQoS > Voice DeviceEnter a Name Enter a name for your voice device.MAC AddressEnter the MAC address of your voicedevice.PrioritySelect the appropriate priority:High(Recommend),Medium,Normal, or Low.ClickAdd to save your changes. Your new entry will appearin the Summary list.
Chapter 3 Advanced Configuration25Wireless-N Gigabit RouterSummaryThis lists the QoS entries you have created for yourapplications and devices.PriorityThis column displays the bandwidth priority of High, Medium, Normal, or Low.Name This column displays the application, device, orport name.Information This column displays the port range orMAC address entered for your entry. If a pre-configuredapplication or game was selected, there will be no validentry shown in this section.RemoveClick this button to remove an entry.EditClick this button to make changes.ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Administration > ManagementThe Administration > Managementscreen allows the tnetwork’s administrator to manage specific Routerfunctions for access and security.Administration > ManagementManagementRouter AccessTo ensure the Router’s security, you will be asked for yourpassword when you access the Router’s web-based utility.The default isadmin.Router Password Enter a new password for the Router.Re-enter to confirmEnter the password again toconfirm.Web AccessWeb Utility Access HTTP (HyperText Transport Protocol)is the communications protocol used to connect to serverson the World Wide Web. HTTPS uses SSL (Secured SocketLayer) to encrypt data transmitted for higher security.SelectHTTPor HTTPS.HTTPis the default.Web Utility Access via Wireless If you are using theRouter in a public domain where you are giving wirelessaccess to your guests, you can disable wireless access tothe Router’s web-based utility. You will only be able toaccess the utility via a wired connection if you disablethe setting. Keep the default,Enabled, to allow wirelessaccess to the utility, or selectDisabled to block wirelessaccess to the utility.Remote AccessRemote ManagementTo permit remote access of theRouter, from outside the local network, select Enabled.Otherwise, keep the default, Disabled.Web Utility Access HTTP (HyperText Transport Protocol)is the communications protocol used to connect to serverson the World Wide Web. HTTPS uses SSL (Secured SocketLayer) to encrypt data transmitted for higher security.SelectHTTPor HTTPS.HTTPis the default.Remote Upgrade If you want to be able to upgrade theRouter remotely, from outside the local network, selectEnabled. (You must have the Remote Managementfeature enabled as well.) Otherwise, keep the default,Disabled.Allowed Remote IP AddressIf you want to be able toaccess the Router from any external IP address, selectAnyIP Address. If you want to specify an external IP address orrange of IP addresses, then select the second option andcomplete the fields provided.Remote Management Port Enter the port number thatwill be open to outside access.NOTE: When you are in a remote locationand wish to manage the Router, enterhttp://<Internet_IP_address>:portorhttps://<Internet_IP_address>:port,depending on whether you use HTTP or HTTPS.Enter the Router’s specific Internet IP address inplace of <Internet_IP_address>, and enter theRemote Management Port number in place of the word port.UPnPUniversal Plug and Play (UPnP) allows Windows Me and XPto automatically configure the Router for various Internetapplications, such as gaming and videoconferencing.
Chapter 3 Advanced Configuration26Wireless-N Gigabit RouterUPnP If you want to use UPnP, keep the default setting,Enabled. Otherwise, select Disabled.Allow Users to ConfigureKeep the default, Enabled,if you want to be able to make manual changes to theRouter while using the UPnP feature. Otherwise, selectDisabled.Allow Users to Disable Internet AccessSelect Enabled,if you want to be able to prohibit any and all Internetconnections. Otherwise, keep the default setting,Disabled.Backup and RestoreBackup ConfigurationsTo back up the Router’sconfiguration settings, click this button and follow the on-screen instructions.Restore ConfigurationsTo restore the Router’sconfiguration settings, click this button and follow the on-screen instructions. (You must have previously backed upthe Router’s configuration settings.)ClickSave Settingsto apply your changes, or click CancelChangesto cancel your changes.Administration > LogThe Router can keep logs of all traffic for your Internetconnection.Administration > LogLogLogTo disable the Log function, select Disabled. Tomonitor traffic between the network and the Internet,keep the default, Enabled.With logging enabled, you canchoose to view temporary logs.View LogTo view the logs, click View Log.Log > View LogLogTypesSelectIncoming Log,Outgoing Log,Security Log, orDHCP Client Log.<Type> LogsThe Incoming Log will display atemporary log of the source IP addresses anddestination port numbers for the incoming Internettraffic. The Outgoing Log will display a temporarylog of the local IP addresses, destination URLs/IPaddresses, and service/port numbers for the outgoingInternet traffic. The Security log will display the logininformation for the web-based utility. The DHCPClient Log will display the LAN DHCP server statusinformation.ClickSave the Log to save this information to a file on your PC’s hard drive. Click Refresh to update the log. Click Clearto clear all the information that isdisplayed.ClickSave Settings to apply your changes, or click Cancel Changes to cancel your changes.Administration > DiagnosticsThe diagnostic tests (Ping and Traceroute) allow you tocheck the connections of your network devices, includingconnection to the Internet.Administration > Diagnostics
Chapter 3 Advanced Configuration27Wireless-N Gigabit RouterDiagnosticsPing TestThe Ping test checks the status of a connection.IP or URL Address Enter the address of the PC whoseconnection you wish to test.Packet Size Enter the packet size you want to use. Thedefault is32bytes.Times to PingEnter many times you wish to test it.Start to Ping To run the test, click this button. ThePingTestscreen will show if the test was successful. Click tCloseto return to theDiagnosticsscreen.Diagnostics > PingTraceroute TestThe Traceroute test tests the performance of aconnection.IP or URL Address Enter the address of the PC whoseconnection you wish to test.Start to TracerouteTo run the test, click this button. TheTraceroute Test screen will show if the test was successful.tClickClose to return to theDiagnosticsscreen.Diagnostics > TracerouteAdministration > Factory DefaultsThe Administration > Factory Defaultsscreen allows youto restore the Router’s configuration to its factory defaultsettings. Administration > Factory DefaultsNOTE: Do not restore the factory defaults unlessyou are having difficulties with the Router andhave exhausted all other troubleshootingmeasures. Once the Router is reset, you will haveto re-enter all of your configuration settings.Factory DefaultsRestore All Settings To reset the Router’s settings to thedefault values, click this button and then follow the on-screen instructions. Any settings you have saved will belost when the default settings are restored.Administration > Firmware UpgradeTheFirmware Upgrade screen allows you to upgrade the Router’s firmware. Do not upgrade the firmware unlessyou are experiencing problems with the Router or the new firmware has a feature you want to use. Administration > Firmware UpgradeNOTE: The Router may lose the settings youhave customized. Before you upgrade itsfirmware, write down all of your custom settings.After you upgrade its firmware, you will have tore-enter all of your configuration settings.
Chapter 3 Advanced Configuration28Wireless-N Gigabit RouterFirmware UpgradeBefore upgrading the firmware, download the Router’sfirmware upgrade file from the Linksys website,www.linksys.com. Then extract the file.Please select a file to upgrade the firmwareClickBrowse and select the extracted firmware upgrade file.Start to Upgrade After you have selected theappropriate file, click this button, and follow the on-screen ffinstructions.Status > RouterThe Router screen displays information about the Routerrand its current settings.Status > RouterRouter InformationFirmware VersionThis is the version number of theRouter’s current firmware.Current TimeThis shows the time set on the Router.Internet MAC AddressThis is the Router’s MAC Address,as seen by your ISP.Host NameIf required by your ISP, this was entered ontheBasic Setup screen.Domain NameIf required by your ISP, this was enteredon theBasic Setup screen.Internet ConnectionThis section shows the current network informationstored in the Router. The information varies depending onthe Internet connection type selected on theBasic Setupscreen.ClickRefreshto update the on-screen information.Status > Local NetworkThe Local Network screen displays information about theklocal, wired network.Status > Local NetworkLocal NetworkLocal MAC Address The MAC address of the Router’slocal, wired interface is displayed here.Router IP AddressThis shows the Router’s IP address, asit appears on your local network.Subnet Mask This shows the Subnet Mask of the Router.DHCP ServerDHCP Server The status of the Router’s DHCP serverfunction is displayed here.Start IP AddressFor the range of IP addresses used bydevices on your local network, the starting IP address isshown here.End IP Address For the range of IP addresses used bydevices on your local network, the ending IP address isshown here.DHCP Clients TableClick this button to view a list of PCsthat are using the Router as a DHCP server.DHCP Clients Table
Chapter 3 Advanced Configuration29Wireless-N Gigabit RouterDHCP Client TableThe DHCP Client Table lists computers and otherdevices that have been assigned IP addresses by theRouter. The list can be sorted by Client Name, Interface,IP Address, MAC Address, and Expired Time (howmuch time is left for the current IP address). To removea DHCP client, click Delete. To retrieve the most up-to-date information, click Refresh. To exit this screen andreturn to the Local Network screen, click Close.Status > Wireless NetworkThe  Wireless Networkscreen displays information aboutkyour wireless network.Status > WirelessWireless NetworkMAC Address The MAC address of the Router’s local,wireless interface is displayed here.ModeDisplayed here is the wireless mode used by thenetwork.Network Name (SSID)Displayed here is the name of thewireless network, which is also called the SSID.Radio BandShown here is the Radio Band settingselected on theBasic Wireless Settings screen.Wide Channel Shown here is the Wide Channel settingselected on theBasic Wireless Settings screen.Standard Channel Shown here is the Standard Channelsetting selected on the Basic Wireless Settingsscreen.Security Displayed here is the wireless security methodused by the Router.SSID Broadcast Displayed here is the status of the SSIDBroadcast feature.
Appendix A Troubleshooting30Wireless-N Gigabit RouterAppendix A: TroubleshootingYour computer cannot connect to the Internet.Follow these instructions until your computer can connectto the Internet:Make sure that the Router is powered on. The PowersLED should be green and not flashing.If the Power LED is flashing, then power off all of syour network devices, including the modem, Router,and computers. Then power on each device in thefollowing order:Cable or DSL modem1.Router2.Computer3.Check the cable connections. The computer shouldsbe connected to one of the ports numbered 1-4 onthe Router, and the modem must be connected to theInternet port on the Router.The modem does not have an Ethernet port.The modem is a dial-up modem for traditional dial-upservice. To use the Router, you need a cable/DSL modemand high-speed Internet connection.You cannot use the DSL service to connect manually tothe Internet.After you have installed the Router, it will automaticallyconnect to your Internet Service Provider (ISP), so you nolonger need to connect manually.The DSL telephone line does not t into the Router’sInternet port.The Router does not replace your modem. You still needyour DSL modem in order to use the Router. Connect thetelephone line to the DSL modem, and then insert thesetup CD into your computer. Click Setup and follow theon-screen instructions.When you double-click the web browser, you areprompted for a username and password. If you want toget rid of the prompt, follow these instructions.Launch the web browser and perform the following steps(these steps are specific to Internet Explorer but are similarfor other browsers):Select1.Tools>Internet Options.Click the2.Connections tab.Select3.Never dial a connection.Click4.OK.The Router does not have a coaxial port for the cableconnection.The Router does not replace your modem. You still needyour cable modem in order to use the Router. Connectyour cable connection to the cable modem, and theninsert the setup CD into your computer. Click Setup andfollow the on-screen instructions.The computer cannot connect wirelessly to the network.Make sure the wireless network name or SSID is the sameon both the computer and the Router. If you have enabledwireless security, then make sure the same securitymethod and key are used by both the computer and theRouter.You need to modify the settings on the Router.Open the web browser (for example, Internet Explorer orFirefox), and enter the Router’s IP address in the addressfield (the default IP address is 192.168.1.1). Whenprompted, enter the password to the Router (the default isadmin). Click the appropriate tab to change the settings.WEB: If your questions are not addressed here,refer to the Linksys website,www.linksys.com
Appendix B Specifications31Wireless-N Gigabit RouterAppendix B:  SpecificationsModelWRT310NStandardsDraft 802.11n, 802.11g, 802.11b,802.3, 802.3u, 802.3abPorts Power, Internet, and EthernetButtonsReset, Wi-Fi Protected SetupLEDs Ethernet (1-4), Wi-Fi ProtectedSetup, Wireless, Internet, PowerCabling TypeCAT 5eNumber of Antennas3Max. Rated RF power: 17.5 dBm +/- 1.5 dBUPnP able/certAbleSecurity FeaturesWEP, WPA, WPA2Security Key Bits128-BitEnvironmentalDimensions7.95" x 6.3" x 1.34"(202 x 160 x 34 mm)Weight13.40 oz (0.38 kg)Power12VCerticationFCC, CE, IC-03, Wi-FiOperating Temp.32 to 104°F (0 to 40°C)Storage Temp. -4 to 140°F (-20 to 60°C)Operating Humidity10 to 85% NoncondensingStorage Humidity5 to 90% Noncondensing* The Router has two main antennas.Specications are subject to change without notice.
Appendix C Warranty Information32Wireless-N Gigabit RouterAppendix C:  Warranty InformationLimited WarrantyLinksys warrants this Linksys hardware product againstdefects in materials and workmanship under normaluse for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts forthe period specified below:One (1) year for new productsNinety (90) days for refurbished productsThis limited warranty is non-transferable and extends onlyto the original end-user purchaser. Your exclusive remedyand Linksys’ entire liability under this limited warrantywill be for Linksys, at its option, to (a) repair the productwith new or refurbished parts, (b) replace the productwith a reasonably available equivalent new or refurbishedLinksys product, or (c) refund the purchase price of theproduct less any rebates. Any repaired or replacementproducts will be warranted for the remainder of theoriginal Warranty Period or thirty (30) days, whichever islonger. All products and parts that are replaced becomethe property of Linksys.Exclusions and LimitationsThis limited warranty does not apply if: (a) the productassembly seal has been removed or damaged, (b) theproduct has been altered or modified, except by Linksys, (c)the product damage was caused by use with non-Linksys products, (d) the product has not been installed, operated,repaired, or maintained in accordance with instructionssupplied by Linksys, (e) the product has been subjected toabnormal physical or electrical stress, misuse, negligence,or accident, (f) the serial number on the Product has beenaltered, defaced, or removed, or (g) the product is suppliedor licensed for beta, evaluation, testing or demonstrationpurposes for which Linksys does not charge a purchaseprice or license fee.ALL SOFTWARE PROVIDED BY LINKSYS WITH THEPRODUCT, WHETHER FACTORY LOADED ON THEPRODUCT OR CONTAINED ON MEDIA ACCOMPANYINGTHE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTYOF ANY KIND. Without limiting the foregoing, Linksys doesnot warrant that the operation of the product or softwarewill be uninterrupted or error free. Also, due to thecontinual development of new techniques for intrudingupon and attacking networks, Linksys does not warrantthat the product, software or any equipment, system ornetwork on which the product or software is used will befree of vulnerability to intrusion or attack. The productmay include or be bundled with third party software orservice offerings. This limited warranty shall not apply tosuch third party software or service offerings. This limitedwarranty does not guarantee any continued availabilityof a third party’s service for which this product’s use oroperation may require.TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIEDWARRANTIES AND CONDITIONS OF MERCHANTABILITY,SATISFACTORY QUALITY OR FITNESS FOR A PARTICULARPURPOSE ARE LIMITED TO THE DURATION OF THEWARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES,INCLUDING, BUT NOT LIMITED TO, ANY IMPLIEDWARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.Some jurisdictions do not allow limitations on how longan implied warranty lasts, so the above limitation may notapply to you. This limited warranty gives you specific legalrights, and you may also have other rights which vary byjurisdiction.TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THETHEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISINGOUT OF OR RELATED TO THE USE OF OR INABILITY TOUSE THE PRODUCT (INCLUDING ANY SOFTWARE), EVENIF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITYEXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.The foregoing limitations will apply even if any warrantyor remedy provided under this limited warranty fails of its essential purpose. Some jurisdictions do not allowthe exclusion or limitation of incidental or consequentialdamages, so the above limitation or exclusion may notapply to you.Obtaining Warranty ServiceIf you have a question about your product or experience aproblem with it, please go towww.linksys.com/supportyppwhere you will find a variety of online support tools andinformation to assist you with your product. If the productproves defective during the Warranty Period, contactLinksys Technical Support for instructions on how toobtain warranty service. The telephone number for LinksysTechnical Support in your area can be found in the productUser Guide and atwww.linksys.comy. Have your productserial number and proof of purchase on hand when calling.A DATED PROOF OF ORIGINAL PURCHASE IS REQUIREDTO PROCESS WARRANTY CLAIMS. If you are requested toreturn your product, you will be given a Return MaterialsAuthorization (RMA) number. You are responsible forproperly packaging and shipping your product to Linksysat your cost and risk. You must include the RMA numberand a copy of your dated proof of original purchase whenreturning your product. Products received without a RMAnumber and dated proof of original purchase will be
Appendix C Warranty Information33Wireless-N Gigabit Routerrejected. Do not include any other items with the productyou are returning to Linksys. Defective product coveredby this limited warranty will be repaired or replaced andreturned to you without charge. Customers outside of the United States of America and Canada are responsiblefor all shipping and handling charges, custom duties,VAT and other associated taxes and charges. Repairs orreplacements not covered under this limited warranty willbe subject to charge at Linksys’ then-current rates.Technical SupportThis limited warranty is neither a service nor a supportcontract. Information about Linksys’ current technicalsupport offerings and policies (including any fees forsupport services) can be found at:www.linksys.com/supporyppt.This limited warranty is governed by the laws of thejurisdiction in which the Product was purchased by you.Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,CA 92623.
Appendix D Regulatory Information34Wireless-N Gigabit RouterAppendix D: Regulatory InformationFCC StatementThis device complies with Part 15 of the FCC Rules.Operation is subject to the following two conditions: (1)This device may not cause harmful interference, and (2) thisdevice must accept any interference received, includinginterference that may cause undesired operation.This product has been tested and complies with thespecifications for a Class B digital device, pursuant to Part15 of the FCC Rules. These limits are designed to providereasonable protection against harmful interference ina residential installation. This equipment generates,uses, and can radiate radio frequency energy and, if notinstalled and used according to the instructions, maycause harmful interference to radio communications.However, there is no guarantee that interference will notoccur in a particular installation. If this equipment doescause harmful interference to radio or television reception,which is found by turning the equipment off and on, theuser is encouraged to try to correct the interference byone or more of the following measures:Reorient or relocate the receiving antennasIncrease the separation between the equipment orsdevicesConnect the equipment to an outlet other than thesreceiver’sConsult a dealer or an experienced radio/TV techniciansfor assistanceFCC Caution: Any changes or modifications not expresslyapproved by the party responsible for compliance couldvoid the user’s authority to operate this equipment.FCC Radiation Exposure StatementThis equipment complies with FCC radiation exposurelimits set forth for an uncontrolled environment. Thisequipment should be installed and operated withminimum distance 20cm between the radiator and yourbody.This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter. IEEE802.11b or 802.11g operation of this product in the USA isfirmware-limited to channels 1 through 11.Safety NoticesCaution: To reduce the risk of fire, use only No.26 AWGsor larger telecommunication line cord.Do not use this product near water, for example, in aswet basement or near a swimming pool.Avoid using this product during an electrical storm.sThere may be a remote risk of electric shock fromlightning.WARNING: This product contains lead, knownto the State of California to cause cancer, andbirth defects or other reproductive harm. Washhands after handling.Industry Canada StatementThis Class B digital apparatus complies with CanadianICES-003 and RSS210.Operation is subject to the following two conditions:This device may not cause interference and1.This device must accept any interference, including2.interference that may cause undesired operation of thedevice. This device has been designed to operate withan antenna having a maximum gain of 2dBi. Antennahaving a higher gain is strictly prohibited per regulationsof Industry Canada. The required antenna impedanceis 50 ohms.To reduce potential radio interference to other users,the antenna type and its gain should be so chosenthat the EIRP is not more than required for successfulcommunication.Industry Canada Radiation Exposure Statement:This equipment complies with IC radiation exposure limitsset forth for an uncontrolled environment. This equipmentshould be installed and operated with minimum distance20cm between the radiator & your body.This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter.
Appendix D Regulatory Information35Wireless-N Gigabit RouterAvis d’Industrie CanadaCet appareil numérique de la classe B est conforme auxnormes NMB-003 et RSS210 du Canada.L’utilisation de ce dispositif est autorisée seulement auxconditions suivantes :il ne doit pas produire de brouillage et1.il doit accepter tout brouillage radioélectrique reçu,2.même si ce brouillage est susceptible de compromettrele fonctionnement du dispositif. Le dispositif a étéconçu pour fonctionner avec une antenne ayant un gainmaximum de 2 dBi. Les règlements d’Industrie Canadainterdisent strictement l’utilisation d’antennes dont legain est supérieur à cette limite. L’impédance requisede l’antenne est de 50 ohms.Afin de réduire le risque d’interférence aux autresutilisateurs, le type d’antenne et son gain doiventêtre choisis de façon à ce que la puissance isotroperayonnée équivalente (p.i.r.e.) ne soit pas supérieureau niveau requis pour obtenir une communicationsatisfaisante.Avis d’Industrie Canada concernant l’exposition aux radiofréquences :Ce matériel est conforme aux limites établies par ICen matière d’exposition aux radiofréquences dans unenvironnement non contrôlé. Ce matériel doit être installéet utilisé à une distance d’au moins 20 cm entre l’antenneet le corps de l’utilisateur.L’émetteur ne doit pas être placé près d’une autre antenneou d’un autre émetteur, ou fonctionner avec une autreantenne ou un autre émetteur.Wireless DisclaimerThe maximum performance for wireless is derived fromIEEE Standard 802.11 specifications. Actual performancecan vary, including lower wireless network capacity,data throughput rate, range and coverage. Performancedepends on many factors, conditions and variables,including distance from the access point, volume of network traffic, building materials and construction,operating system used, mix of wireless products used,interference and other adverse conditions.Avis de non-responsabilité concernant les appareils sans filLes performances maximales pour les réseaux sans filsont tirées des spécifications de la norme IEEE 802.11.Les performances réelles peuvent varier, notammenten fonction de la capacité du réseau sans fil, du débitde la transmission de données, de la portée et de lacouverture. Les performances dépendent de facteurs,conditions et variables multiples, en particulier de ladistance par rapport au point d’accès, du volume du traficréseau, des matériaux utilisés dans le bâtiment et dutype de construction, du système d’exploitation et de lacombinaison de produits sans fil utilisés, des interférenceset de toute autre condition défavorable.
Appendix D Regulatory Information36Wireless-N Gigabit RouterUser Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE)This document contains important information for userswith regards to the proper disposal and recycling of Linksys products. Consumers are required to comply withthis notice for all electronic products bearing the followingsymbol:English - Environmental Information for Customers inthe European UnionEuropean Directive 2002/96/EC requires that the equipment bearing this symbol  on the product and/or its packaging must not be disposed of with unsorted municipal waste. The symbol indicates that this product should be disposed of separately from regular household waste streams. It is your responsibility to dispose of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities. Correct disposal and recycling will help prevent potential negative consequences to the environment and human health. For more detailed information about the disposal of your old equipment, please contact your local authorities, waste disposal service, or the shop where you purchased the product.Български (Bulgarian) - Информация относноопазването на околната среда за потребители вЕвропейския съюзЕвропейска директива 2002/96/EC изисква уредите, носещи този символ   върху изделието и/или опаковката му, да несе изхвърля т с несортирани битови отпадъци. Символът обозначава, че изделието трябва да се изхвърля отделно от сметосъбирането на обикновените битови отпадъци. Ваша е отговорността този и другите електрически и електронни уреди да се изхвърлят в предварително определени от държавните или общински органи специализирани пунктове за събиране. Правилното изхвърляне и рециклиране ще спомогнат да се предотвратят евентуални вредни за околната среда и здравето на населението последствия. За по-подробна информация относно изхвърлянето на вашите стари уреди се обърнете към местните власти, службите за сметосъбиране или магазина, от който сте закупили уреда.Ceština (Czech)-Informace o ochraně životníhoprostředí pro zákazníky v zemích Evropské unieEvropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem  na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem. Tento symbol udává, že daný produkt musí být likvidován odděleně od běžného komunálního odpadu. Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady. Správná likvidace a recyklace pomáhá předcházet potenciálním negativním dopadům na životní prostředí a lidské zdraví. Podrobnější informace o likvidaci starého vybavení si laskavě vyžádejte od místních úřadů, podniku zabývajícího se likvidací komunálních odpadů nebo obchodu, kde jste produkt zakoupili.Dansk (Danish) - Miljøinformation for kunder i EUEU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol  på produktet og/eller emballagen ikke må bortskaffes som usorteret kommunalt affald. Symbolet betyder, at dette produkt skal bortskaffes adskilt fra det almindelige husholdningsaffald. Det er dit ansvar at bortskaffe dette og andet elektrisk og elektronisk udstyr via bestemte indsamlingssteder udpeget af staten eller de lokale myndigheder. Korrekt bortskaffelse og genvinding vil hjælpe med til at undgå mulige skader for miljøet og menneskers sundhed. Kontakt venligst de lokale myndigheder, renovationstjenesten eller den butik, hvor du har købt produktet, angående mere detaljeret information om bortskaffelse af dit gamle udstyr.Deutsch (German) - Umweltinformation für Kundeninnerhalb der Europäischen UnionDie Europäische Richtlinie 2002/96/EC verlangt, dass technische Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit diesem Symbol versehen ist , nicht zusammen mit unsortiertemGemeindeabfall entsorgt werden darf. Das Symbol weist darauf hin, dass das Produkt von regulärem Haushaltmüll getrennt entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses Gerät und andere elektrische und elektronische Geräte über die dafür zuständigen und von der Regierung oder örtlichen Behörden dazu bestimmten Sammelstellen zu entsorgen. Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei, potentielle negative Folgen für Umwelt und die menschliche Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an die örtlichen Behörden oder städtischen Entsorgungsdienste oder an den Händler, bei dem Sie das Produkt erworben haben.
Appendix D Regulatory Information37Wireless-N Gigabit RouterEesti (Estonian) - Keskkonnaalane informatsioonEuroopa Liidus asuvatele klientideleEuroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol ,keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike ametiasutuste poolt ette nähtud kogumispunktide kaudu. Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida võimalikke negatiivseid tagajärgi keskkonnale ning inimeste tervisele. Vanade seadmete kõrvaldamise kohta täpsema informatsiooni saamiseks võtke palun ühendust kohalike ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te toote ostsite.Español (Spanish) - Información medioambiental paraclientes de la Unión EuropeaLa Directiva 2002/96/CE de la UE exige que los equipos que lleven este símbolo  en el propio aparato y/o en su embalaje no deben eliminarse junto con otros residuos urbanos no seleccionados. El símbolo indica que el producto en cuestión debe separarse de los residuos domésticos convencionales con vistas a su eliminación. Es responsabilidad suya desechar este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición el gobierno y las autoridades locales. Al desechar y reciclar correctamente estos aparatos estará contribuyendo a evitar posibles consecuencias negativas para el medio ambiente y la salud de las personas. Si desea obtener información más detallada sobre la eliminación segura de su aparato usado, consulte a las autoridades locales, al servicio de recogida y eliminación de residuos de su zona o pregunte en la tienda donde adquirió el producto.ξλληνικά (Greek) - Στοιχεία περιβαλλοντικήςπροστασίας για πελάτες εντός της ΕυρωπαϊκήςΈνωσηςΗ Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίος φέρει αυτό το σύμβολο   στο προϊόν και/ή στη συσκευασία του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές. Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία. Για περισσότερες πληροφορίες σχετικά με την απόρριψη του παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο αγοράσατε το προϊόν.Français (French) - Informations environnementalespour les clients de l’Union européenneLa directive européenne 2002/96/CE exige que l’équipement sur lequel est apposé ce symbole   sur le produit et/ou sonemballage ne soit pas jeté avec les autres ordures ménagères. Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages. Il est de votre responsabilité de jeter ce matériel ainsi que tout autre matériel électrique ou électronique par les moyens de collecte indiqués par le gouvernement et les pouvoirs publics des collectivités territoriales. L’élimination et le recyclage en bonne et due forme ont pour but de lutter contre l’impact néfaste potentiel de ce type de produits sur l’environnement et la santé publique. Pour plus d’informations sur le mode d’élimination de votre ancien équipement, veuillez prendre contact avec les pouvoirs publics locaux, le service de traitement des déchets, ou l’endroit où vous avez acheté le produit.Italiano (Italian) - Informazioni relative all’ambienteper i clienti residenti nell’Unione EuropeaLa direttiva europea 2002/96/EC richiede che le apparecchiature contrassegnate con questo simbolo  sul prodotto e/o sull’imballaggio non siano smaltite insieme ai rifiuti urbani non differenziati. Il simbolo indica che questo prodotto non deve essere smaltito insieme ai normali rifiuti domestici. È responsabilità del proprietario smaltire sia questi prodotti sia le altre apparecchiature elettriche ed elettroniche mediante le specifiche strutture di raccolta indicate dal governo o dagli enti pubblici locali. Il corretto smaltimento ed il riciclaggio aiuteranno a prevenire conseguenze potenzialmente negative per l’ambiente e per la salute dell’essere umano. Per ricevere informazioni più dettagliate circa lo smaltimento delle vecchie apparecchiature in Vostro possesso, Vi invitiamo a contattare gli enti pubblici di competenza, il servizio di smaltimento rifiuti o il negozio nel quale avete acquistato il prodotto.Latviešu valoda (Latvian) - Ekoloģiska informācijaklientiem Eiropas Savienības jurisdikcijāDirektīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst izmest nešķirotā veidā kopā ar komunālajiem atkritumiem (tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo un citas elektriskas un elektroniskas ierīces izmest atkritumos, izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos un pārstrāde tiek veikta pareizi, tad mazinās iespējamais kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā, kur iegādājāties šo izstrādājumu.
Appendix D Regulatory Information38Wireless-N Gigabit RouterLietuvškai (Lithuanian) - Aplinkosaugos informacija,skirta Europos Sąjungos vartotojamsEuropos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad ši ir kita elektros ar elektroninė įranga būtų šalinama per tam tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose įsigijote tą gaminį.Malti (Maltese) - Informazzjoni Ambjentali għal Klijentifl-Unjoni EwropeaId-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih is-simbolufuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika li dan il-prodott għandu jintrema separatament minn ma’ l-iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew il-ħanut minn fejn xtrajt il-prodott.Magyar (Hungarian) - Környezetvédelmi információ azeurópai uniós vásárlók számáraA 2002/96/EC számú európai uniós irányelv megkívánja, hogy azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán az alábbi címke   megjelenik, tilos a többi szelektálatlan lakossági hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott termék kidobásakor a szokványos háztartási hulladékelszállítási rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön felelõssége, hogy ezt, és más elektromos és elektronikus berendezéseit a kormányzati vagy a helyi hatóságok által kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ hulladékfeldolgozás segít a környezetre és az emberi egészségre potenciálisan ártalmas negatív hatások megelõzésében. Ha elavult berendezéseinek felszámolásához további részletes információra van szüksége, kérjük, lépjen kapcsolatba a helyi hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal üzlettel, ahol a terméket vásárolta.Nederlands (Dutch) - Milieu-informatie voor klantenin de Europese UnieDe Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die is voorzien van dit symbool  op het product of de verpakking, niet mag worden ingezameld met niet-gescheiden huishoudelijk afval. Dit symbool geeft aan dat het product apart moet worden ingezameld. U bent zelf verantwoordelijk voor de vernietiging van deze en andere elektrische en elektronische apparatuur via de daarvoor door de landelijke of plaatselijke overheid aangewezen inzamelingskanalen. De juiste vernietiging en recycling van deze apparatuur voorkomt mogelijke negatieve gevolgen voor het milieu en de gezondheid. Voor meer informatie over het vernietigen van uw oude apparatuur neemt u contact op met de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de winkel waar u het product hebt aangeschaft.Norsk (Norwegian) - Miljøinformasjon for kunder i EUEU-direktiv 2002/96/EF krever at utstyr med følgende symbol  avbildet på produktet og/eller pakningen, ikke må kastes sammen med usortert avfall. Symbolet indikerer at dette produktet skal håndteres atskilt fra ordinær avfallsinnsamling for husholdningsavfall. Det er ditt ansvar å kvitte deg med dette produktet og annet elektrisk og elektronisk avfall via egne innsamlingsordninger slik myndighetene eller kommunene bestemmer. Korrekt avfallshåndtering og gjenvinning vil være med på å forhindre mulige negative konsekvenser for miljø og helse. For nærmere informasjon om håndtering av det kasserte utstyret ditt, kan du ta kontakt med kommunen, en innsamlingsstasjon for avfall eller butikken der du kjøpte produktet.Polski (Polish) - Informacja dla klientów w UniiEuropejskiej o przepisach dotyczących ochronyśrodowiskaDyrektywa Europejska 2002/96/EC wymaga, aby sprzęt oznaczony symbolem  znajdującym się na produkcie i/lub jego opakowaniu nie był wyrzucany razem z innymi niesortowanymi odpadami komunalnymi. Symbol ten wskazuje, że produkt nie powinien być usuwany razem ze zwykłymi odpadami z gospodarstw domowych. Na Państwu spoczywa obowiązek wyrzucania tego i innych urządzeń elektrycznych oraz elektronicznych w punktach odbioru wyznaczonych przez władze krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób i jego recykling pomogą zapobiec potencjalnie negatywnym konsekwencjom dla środowiska i zdrowia ludzkiego. W celu uzyskania szczegółowych informacji o usuwaniu starego sprzętu, prosimy zwrócić się do lokalnych władz, służb oczyszczania miasta lub sklepu, w którym produkt został nabyty.
Appendix D Regulatory Information39Wireless-N Gigabit RouterPortuguês (Portuguese) - Informação ambiental paraclientes da União EuropeiaA Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo  no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares. É da sua responsabilidade eliminar este e qualquer outro equipamento eléctrico e electrónico através das instalações de recolha designadas pelas autoridades governamentais ou locais. A eliminação e reciclagem correctas ajudarão a prevenir as consequências negativas para o ambiente e para a saúde humana. Para obter informações mais detalhadas sobre a forma de eliminar o seu equipamento antigo, contacte as autoridades locais, os serviços de eliminação de resíduos ou o estabelecimento comercial onde adquiriu o produto.Română (Romanian) - Informaţii de mediu pentruclienţii din Uniunea EuropeanăDirectiva europeană 2002/96/CE impune ca echipamentele care prezintă acest simbol   pe produs şi/sau pe ambalajul acestuia să nu fie casate împreună cu gunoiul menajer municipal. Simbolul indică faptul că acest produs trebuie să fie casat separat de gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi acest produs şi alte echipamente electrice şi electronice prin intermediul unităţilor de colectare special desemnate de guvern sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta la prevenirea potenţialelor consecinţe negative asupra sănătăţii mediului şi a oamenilor. Pentru mai multe informaţii detaliate cu privire la casarea acestui echipament vechi, contactaţi autorităţile locale, serviciul de salubrizare sau magazinul de la care aţi achiziţionat produsul.Slovenčina (Slovak) - Informácie o ochrane životnéhoprostredia pre zákazníkov v Európskej úniiPodľa európskej smernice 2002/96/ES zariadenie s týmto symbolom na produkte a/alebo jeho balení nesmie byť likvidované spolu s netriedeným komunálnym odpadom. Symbol znamená, že produkt by sa mal likvidovať oddelene od bežného odpadu z domácností. Je vašou povinnosťou likvidovať toto i ostatné elektrické a elektronické zariadenia prostredníctvom špecializovaných zberných zariadení určených vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia, obráťte sa, prosím, na miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili.Slovenčina (Slovene) - Okoljske informacije za strankev Evropski unijiEvropska direktiva 2002/96/EC prepoveduje odlaganje opreme, označene s tem simbolom   – na izdelku in/ali na embalaži – med običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba izdelek odvreči ločeno od preostalih gospodinjskih odpadkov. Vaša odgovornost je, da to in preostalo električno in elektronsko opremo odnesete na posebna zbirališča, ki jih določijo državne ustanove ali lokalna uprava. S pravilnim odlaganjem in recikliranjem boste preprečili morebitne škodljive vplive na okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer ste izdelek kupili.Suomi (Finnish) - Ympäristöä koskevia tietoja EU-alueen asiakkailleEU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä symboli  itse tuotteessa ja/tai sen pakkauksessa, laitteistoa ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana. Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet viemällä tuote tai tuotteet viranomaisten määräämään keräyspisteeseen. Laitteiston oikea hävittäminen estää mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä myymälästä, josta ostit tuotteen.Svenska (Swedish) - Miljöinformation för kunder iEuropeiska unionenDet europeiska direktivet 2002/96/EC kräver att utrustning med denna symbol  på produkten och/eller förpackningen inte får kastas med osorterat kommunalt avfall. Symbolen visar att denna produkt bör kastas efter att den avskiljts från vanligt hushållsavfall. Det faller på ditt ansvar att kasta denna och annan elektrisk och elektronisk utrustning på fastställda insamlingsplatser utsedda av regeringen eller lokala myndigheter. Korrekt kassering och återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten.WEB: For additional information, please visitwww.linksys.com
40Appendix E Software License AgreementWireless-N Gigabit RouterAppendix E: SoftwareLicense AgreementSoftware in Linksys ProductsThis product from Cisco-Linksys LLC or from one of itsaffiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco-Linksys K.K. (“Linksys”) contains software (includingfirmware) originating from Linksys and its suppliersand may also contain software from the open sourcecommunity. Any software originating from Linksys and itssuppliers is licensed under the Linksys Software LicenseAgreement contained at Schedule 1 below. You may alsobe prompted to review and accept that Linksys SoftwareLicense Agreement upon installation of the softwareAny software from the open source community is licensedunder the specific license terms applicable to that softwaremade available by Linksys atwww.linksys.com/gplygp or asprovided for in Schedules 2, 3 and 4 below.Where such specific license terms entitle you to the sourcecode of such software, that source code is upon requestavailable at cost from Linksys for at least three yearsfrom the purchase date of this product and may also beavailable for download fromwww.linksys.com/gplygp. Fordetailed license terms and additional information onopen source software in Linksys products please look atthe Linksys public web site at:www.linksys.com/gpl/ygporSchedules 2, 3 or 4 below as applicable.BY DOWNLOADING OR INSTALLING THE SOFTWARE,OR USING THE PRODUCT CONTAINING THE SOFTWARE,YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARELICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TOALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD,INSTALL OR USE THE SOFTWARE. YOU MAY RETURNUNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIEDAS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT)FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINALPURCHASE, SUBJECT TO THE RETURN PROCESS ANDPOLICIES OF THE PARTY FROM WHICH YOU PURCHASEDSUCH PRODUCT OR SOFTWARE.Software LicensesThe software Licenses applicable to software from Linksysare made available at the Linksys public web site at:www.linksys.comy. For your convenience of reference, acopy of the Linksys Software License Agreement and themain open source code licenses used by Linksys in itsproducts are contained in the Schedules below.Schedule 1 - Linksys Software License AgreementTHIS LICENSE AGREEMENT IS BETWEEN YOU ANDCISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCOSYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYSK.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OFCISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLINGTHE SOFTWARE, OR USING THE PRODUCT CONTAININGTHE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BYTHIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESETERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USETHE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHERPRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUNDUP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TOTHE RETURN PROCESS AND POLICIES OF THE PARTY FROMWHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.License.Subject to the terms and conditions of thisAgreement, Linksys grants the original end user purchaserof the Linksys product containing the Software (“You”)a nonexclusive license to use the Software solely asembedded in or (where authorized in the applicabledocumentation) for communication with such product.This license may not be sublicensed, and is not transferableexcept to a person or entity to which you transferownership of the complete Linksys product containingthe Software, provided you permanently transfer all rightsunder this Agreement and do not retain any full or partialcopies of the Software, and the recipient agrees to theterms of this Agreement.“Software” includes, and this Agreement will apply to(a)the software of Linksys or its suppliers provided in orwith the applicable Linksys product, excluding technologyfrom the open source community, and (b) any upgrades,updates, bug fixes or modified versions (“Upgrades”) orbackup copies of the Software supplied to You by Linksysor an authorized reseller, provided you already hold avalid license to the original software and have paid anyapplicable fee for the Upgrade.Protection of Information. The Software anddocumentation contain trade secrets and/or copyrightedmaterials of Linksys or its suppliers. You will not copyor modify the Software or decompile, decrypt, reverseengineer or disassemble the Software (except to theextent expressly permitted by law notwithstanding thisprovision), and You will not disclose or make availablesuch trade secrets or copyrighted material in any formto any third party. Title to and ownership of the Softwareand documentation and any portion thereof, will remainsolely with Linksys or its suppliers.Collection and Processing of Information. You agree thatLinksys and/or its affiliates may, from time to time, collectand process information about your Linksys product and/or the Software and/or your use of either in order (i) toenable Linksys to offer you Upgrades; (ii) to ensure that
41Appendix E Software License AgreementWireless-N Gigabit Routeryour Linksys product and/or the Software is being used inaccordance with the terms of this Agreement; (iii) to provideimprovements to the way Linksys delivers technology toyou and to other Linksys customers; (iv) to enable Linksysto comply with the terms of any agreements it has withany third parties regarding your Linksys product and/orSoftware and/or (v) to enable Linksys to comply with allapplicable laws and/or regulations, or the requirementsof any regulatory authority or government agency.Linksys and/ or its affiliates may collect and processthis information provided that it does not identify youpersonally. Your use of your Linksys product and/or theSoftware constitutes this consent by you to Linksys and/or its affiliates’ collection and use of such information and,for EEA customers, to the transfer of such information to alocation outside the EEA.Software Upgrades etc.If the Software enables you toreceive Upgrades, you may elect at any time to receivethese Upgrades either automatically or manually. If youelect to receive Upgrades manually or you otherwiseelect not to receive or be notified of any Upgrades, youmay expose your Linksys product and/or the Softwareto serious security threats and/or some features withinyour Linksys product and/or Software may becomeinaccessible. There may be circumstances where weapply an Upgrade automatically in order to comply withchanges in legislation, legal or regulatory requirementsor as a result of requirements to comply with the termsof any agreements Linksys has with any third partiesregarding your Linksys product and/or the Software. Youwill always be notified of any Upgrades being deliveredto you. The terms of this license will apply to any suchUpgrade unless the Upgrade in question is accompaniedby a separate license, in which event the terms of thatlicense will apply.Open Source Software.The GPL or other open sourcecode incorporated into the Software and the open sourcelicense for such source code are available for free downloadat http://www.linksys.com/gplpygp. If You would like a copyof the GPL or other open source code in this Software on aCD, Linksys will mail to You a CD with such code for $9.99plus the cost of shipping, upon request.Term and Termination. You may terminate this Licenseat any time by destroying all copies of the Softwareand documentation. Your rights under this License willterminate immediately without notice from Linksys if Youfail to comply with any provision of this Agreement.Limited Warranty. The warranty terms and periodspecified in the applicable Linksys Product User Guideshall also apply to the Software.Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS ORITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OFCAUSE (INCLUDING NEGLIGENCE), ARISING OUT OFOR RELATED TO THE USE OF OR INABILITY TO USE THESOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OFTHE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILLLINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOUFOR THE PRODUCT. The foregoing limitations will applyeven if any warranty or remedy under this Agreement failsof its essential purpose. Some jurisdictions do not allowthe exclusion or limitation of incidental or consequentialdamages, so the above limitation or exclusion may notapply to You.Export. Software, including technical data, may be subjectto U.S. export control laws and regulations and/or exportor import regulations in other countries. You agree tocomply strictly with all such laws and regulations.U.S. Government Users.The Software and documentationqualify as “commercial items” as defined at 48 C.F.R. 2.101and 48 C.F.R. 12.212. All Government users acquire theSoftware and documentation with only those rightsherein that apply to non-governmental customers.General Terms. This Agreement will be governed by andconstrued in accordance with the laws of the State of California, without reference to conflict of laws principles.The United Nations Convention on Contracts for theInternational Sale of Goods will not apply. If any portionof this Agreement is found to be void or unenforceable,the remaining provisions will remain in full force andeffect. This Agreement constitutes the entire agreementbetween the parties with respect to the Software andsupersedes any conflicting or additional terms containedin any purchase order or elsewhere.END OF SCHEDULE 1Schedule 2If this Linksys product contains open source softwarelicensed under Version 2 of the “GNU General PublicLicense” then the license terms below in this Schedule 2will apply to that open source software. The license termsbelow in this Schedule 2 are from the public web site athttp://www.gnu.org/copyleft/gpl.htmlpggpygpGNU GENERAL PUBLIC LICENSEVersion 2, June 1991Copyright © 1989, 1991 Free Software Foundation, Inc.51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,USAEveryone is permitted to copy and distribute verbatimcopies of this license document, but changing it is notallowed.PreambleThe licenses for most software are designed to take awayyour freedom to share and change it. By contrast, the
42Appendix E Software License AgreementWireless-N Gigabit RouterGNU General Public License is intended to guarantee yourfreedom to share and change free software–to make surethe software is free for all its users. This General PublicLicense applies to most of the Free Software Foundation’ssoftware and to any other program whose authorscommit to using it. (Some other Free Software Foundationsoftware is covered by the GNU Lesser General PublicLicense instead.) You can apply it to your programs, too.When we speak of free software, we are referring tofreedom, not price. Our General Public Licenses aredesigned to make sure that you have the freedom todistribute copies of free software (and charge for thisservice if you wish), that you receive source code or canget it if you want it, that you can change the software oruse pieces of it in new free programs; and that you knowyou can do these things.To protect your rights, we need to make restrictions thatforbid anyone to deny you these rights or to ask you tosurrender the rights. These restrictions translate to certainresponsibilities for you if you distribute copies of thesoftware, or if you modify it.For example, if you distribute copies of such a program,whether gratis or for a fee, you must give the recipientsall the rights that you have. You must make sure that they,too, receive or can get the source code. And you mustshow them these terms so they know their rights.We protect your rights with two steps: (1) copyright thesoftware, and (2) offer you this license which gives youlegal permission to copy, distribute and/or modify thesoftware. Also, for each author’s protection and ours, we want tomake certain that everyone understands that there is nowarranty for this free software. If the software is modifiedby someone else and passed on, we want its recipientsto know that what they have is not the original, so thatany problems introduced by others will not reflect on theoriginal authors’ reputations.Finally, any free program is threatened constantly bysoftware patents. We wish to avoid the danger thatredistributors of a free program will individually obtainpatent licenses, in effect making the program proprietary.To prevent this, we have made it clear that any patent mustbe licensed for everyone’s free use or not licensed at all.The precise terms and conditions for copying, distributionand modification follow.TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATIONThis License applies to any program or other work 0.which contains a notice placed by the copyrightholder saying it may be distributed under the termsof this General Public License. The “Program”, below,refers to any such program or work, and a “work based on the Program” means either the Programor any derivative work under copyright law: that isto say, a work containing the Program or a portionof it, either verbatim or with modifications and/or translated into another language. (Hereinafter,translation is included without limitation in the term“modification”.) Each licensee is addressed as “you”.Activities other than copying, distribution andmodification are not covered by this License; theyare outside its scope. The act of running the Programis not restricted, and the output from the Program iscovered only if its contents constitute a work based onthe Program (independent of having been made byrunning the Program). Whether that is true dependson what the Program does.You may copy and distribute verbatim copies of the1.Program’s source code as you receive it, in any medium,provided that you conspicuously and appropriatelypublish on each copy an appropriate copyrightnotice and disclaimer of warranty; keep intact all thenotices that refer to this License and to the absenceof any warranty; and give any other recipients of theProgram a copy of this License along with the Program.You may charge a fee for the physical act of transferringa copy, and you may at your option offer warrantyprotection in exchange for a fee.You may modify your copy or copies of the Program2.or any portion of it, thus forming a work based on theProgram, and copy and distribute such modificationsor work under the terms of Section 1 above, providedthat you also meet all of these conditions:You must cause the modified files to carrya.prominent notices stating that you changed thefiles and the date of any change.You must cause any work that you distribute orb.publish, that in whole or in part contains or isderived from the Program or any part thereof, to belicensed as a whole at no charge to all third partiesunder the terms of this License.
43Appendix E Software License AgreementWireless-N Gigabit RouterIf the modified program normally reads commandsc.interactively when run, you must cause it, whenstarted running for such interactive use in the mostordinary way, to print or display an announcementincluding an appropriate copyright notice anda notice that there is no warranty (or else, sayingthat you provide a warranty) and that users mayredistribute the program under these conditions,and telling the user how to view a copy of this License. (Exception: if the Program itself isinteractive but does not normally print such anannouncement, your work based on the Programis not required to print an announcement.)These requirements apply to the modified work asa whole. If identifiable sections of that work are notderived from the Program, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part of a whole which is a work based onthe Program, the distribution of the whole must be onthe terms of this License, whose permissions for otherlicensees extend to the entire whole, and thus to eachand every part regardless of who wrote it.Thus, it is not the intent of this section to claim rightsor contest your rights to work written entirely by you;rather, the intent is to exercise the right to control thedistribution of derivative or collective works based onthe Program. In addition, mere aggregation of another work notbased on the Program with the Program (or with awork based on the Program) on a volume of a storageor distribution medium does not bring the other work under the scope of this License. You may copy and distribute the Program (or a3.work based on it, under Section 2) in object code orexecutable form under the terms of Sections 1 and 2above provided that you also do one of the following:Accompany it with the complete correspondinga.machine-readable source code, which must bedistributed under the terms of Sections 1 and 2above on a medium customarily used for softwareinterchange; or, Accompany it with a written offer, valid for at leastb.three years, to give any third party, for a chargeno more than your cost of physically performingsource distribution, a complete machine-readablecopy of the corresponding source code, to bedistributed under the terms of Sections 1 and 2above on a medium customarily used for softwareinterchange; or, Accompany it with the information you received asc.to the offer to distribute corresponding source code.(This alternative is allowed only for noncommercialdistribution and only if you received the programin object code or executable form with such anoffer, in accord with Subsection b above.)The source code for a work means the preferred formof the work for making modifications to it. For anexecutable work, complete source code means allthe source code for all modules it contains, plus anyassociated interface definition files, plus the scriptsused to control compilation and installation of theexecutable. However, as a special exception, the sourcecode distributed need not include anything that isnormally distributed (in either source or binary form)with the major components (compiler, kernel, and soon) of the operating system on which the executableruns, unless that component itself accompanies theexecutable.If distribution of executable or object code is madeby offering access to copy from a designated place,then offering equivalent access to copy the sourcecode from the same place counts as distribution of the source code, even though third parties are notcompelled to copy the source along with the objectcode.You may not copy, modify, sublicense, or distribute4.the Program except as expressly provided underthis License. Any attempt otherwise to copy, modify,sublicense or distribute the Program is void, and willautomatically terminate your rights under this License.However, parties who have received copies, or rights,from you under this License will not have their licensesterminated so long as such parties remain in fullcompliance.You are not required to accept this License, since you5.have not signed it. However, nothing else grants youpermission to modify or distribute the Program or itsderivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifyingor distributing the Program (or any work based on theProgram), you indicate your acceptance of this Licenseto do so, and all its terms and conditions for copying,distributing or modifying the Program or works basedon it. Each time you redistribute the Program (or any work 6.based on the Program), the recipient automaticallyreceives a license from the original licensor to copy,distribute or modify the Program subject to theseterms and conditions. You may not impose any furtherrestrictions on the recipients’ exercise of the rightsgranted herein. You are not responsible for enforcingcompliance by third parties to this License.
44Appendix E Software License AgreementWireless-N Gigabit RouterIf, as a consequence of a court judgment or allegation7.of patent infringement or for any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions of this License, they donot excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence youmay not distribute the Program at all. For example,if a patent license would not permit royalty-freeredistribution of the Program by all those who receivecopies directly or indirectly through you, then the onlyway you could satisfy both it and this License would beto refrain entirely from distribution of the Program.If any portion of this section is held invalid orunenforceable under any particular circumstance,the balance of the section is intended to apply andthe section as a whole is intended to apply in othercircumstances.It is not the purpose of this section to induce you toinfringe any patents or other property right claims orto contest validity of any such claims; this section hasthe sole purpose of protecting the integrity of the freesoftware distribution system, which is implementedby public license practices. Many people havemade generous contributions to the wide range of software distributed through that system in relianceon consistent application of that system; it is up tothe author/donor to decide if he or she is willing todistribute software through any other system and alicensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence of the rest of thisLicense.If the distribution and/or use of the Program is8.restricted in certain countries either by patents or bycopyrighted interfaces, the original copyright holderwho places the Program under this License may add anexplicit geographical distribution limitation excludingthose countries, so that distribution is permitted onlyin or among countries not thus excluded. In such case,this License incorporates the limitation as if written inthe body of this License. The Free Software Foundation may publish revised9.and/or new versions of the General Public Licensefrom time to time. Such new versions will be similar inspirit to the present version, but may differ in detail toaddress new problems or concerns.Each version is given a distinguishing version number.If the Program specifies a version number of thisLicense which applies to it and “any later version”, youhave the option of following the terms and conditionseither of that version or of any later version publishedby the Free Software Foundation. If the Program doesnot specify a version number of this License, youmay choose any version ever published by the FreeSoftware Foundation.If you wish to incorporate parts of the Program into10.other free programs whose distribution conditions aredifferent, write to the author to ask for permission. Forsoftware which is copyrighted by the Free SoftwareFoundation, write to the Free Software Foundation; wesometimes make exceptions for this. Our decision willbe guided by the two goals of preserving the free statusof all derivatives of our free software and of promotingthe sharing and reuse of software generally.NO WARRANTYBECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,11.THERE IS NO WARRANTY FOR THE PROGRAM, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THEPROGRAM “AS IS” WITHOUT WARRANTY OF ANYKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE PROGRAM IS WITH YOU.SHOULD THE PROGRAM PROVE DEFECTIVE, YOUASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR12.AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,OR ANY OTHER PARTY WHO MAY MODIFY AND/ORREDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANYGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIALDAMAGES ARISING OUT OF THE USE OR INABILITY TOUSE THE PROGRAM (INCLUDING BUT NOT LIMITED TOLOSS OF DATA OR DATA BEING RENDERED INACCURATEOR LOSSES SUSTAINED BY YOU OR THIRD PARTIES ORA FAILURE OF THE PROGRAM TO OPERATE WITH ANYOTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHERPARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.END OF TERMS AND CONDITIONSEND OF SCHEDULE 2Schedule 3If this Linksys product contains open source softwarelicensed under Version 2.1 of the “GNU Lesser General PublicLicense” then the license terms below in this Schedule 3will apply to that open source software. The license termsbelow in this Schedule 3 are from the public web site athttp://www.gnu.org/licenses/old-licenses/lgpl-2.1.htmlpgg gp.
45Appendix E Software License AgreementWireless-N Gigabit RouterGNU LESSER GENERAL PUBLIC LICENSEVersion 2.1, February 1999Copyright (C) 1991, 1999 Free Software Foundation, Inc.51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,USAEveryone is permitted to copy and distribute verbatimcopies of this license document, but changing it is notallowed.[This is the first released version of the Lesser GPL. It alsocounts as the successor of the GNU Library Public License,version 2, hence the version number 2.1.]PreambleThe licenses for most software are designed to take awayyour freedom to share and change it. By contrast, the GNUGeneral Public Licenses are intended to guarantee yourfreedom to share and change free software—to makesure the software is free for all its users.This license, the Lesser General Public License, applies tosome specially designated software packages—typicallylibraries—of the Free Software Foundation and otherauthors who decide to use it. You can use it too, but wesuggest you first think carefully about whether this licenseor the ordinary General Public License is the better strategyto use in any particular case, based on the explanationsbelow.When we speak of free software, we are referring tofreedom of use, not price. Our General Public Licensesare designed to make sure that you have the freedomto distribute copies of free software (and charge for thisservice if you wish); that you receive source code or canget it if you want it; that you can change the software anduse pieces of it in new free programs; and that you areinformed that you can do these things.To protect your rights, we need to make restrictions thatforbid distributors to deny you these rights or to ask youto surrender these rights. These restrictions translate tocertain responsibilities for you if you distribute copies of the library or if you modify it.For example, if you distribute copies of the library,whether gratis or for a fee, you must give the recipientsall the rights that we gave you. You must make sure thatthey, too, receive or can get the source code. If you link other code with the library, you must provide completeobject files to the recipients, so that they can relink themwith the library after making changes to the library andrecompiling it. And you must show them these terms sothey know their rights.We protect your rights with a two-step method: (1) wecopyright the library, and (2) we offer you this license,which gives you legal permission to copy, distribute and/or modify the library.To protect each distributor, we want to make it very clearthat there is no warranty for the free library. Also, if thelibrary is modified by someone else and passed on, therecipients should know that what they have is not theoriginal version, so that the original author’s reputationwill not be affected by problems that might be introducedby others.Finally, software patents pose a constant threat to theexistence of any free program. We wish to make surethat a company cannot effectively restrict the users of a free program by obtaining a restrictive license from apatent holder. Therefore, we insist that any patent licenseobtained for a version of the library must be consistentwith the full freedom of use specified in this license.Most GNU software, including some libraries, is coveredby the ordinary GNU General Public License. This license,the GNU Lesser General Public License, applies to certaindesignated libraries, and is quite different from theordinary General Public License. We use this license forcertain libraries in order to permit linking those librariesinto non-free programs.When a program is linked with a library, whetherstatically or using a shared library, the combination of the two is legally speaking a combined work, a derivativeof the original library. The ordinary General PublicLicense therefore permits such linking only if the entirecombination fits its criteria of freedom. The Lesser GeneralPublic License permits more lax criteria for linking othercode with the library.We call this license the “Lesser” General Public Licensebecause it does Less to protect the user’s freedom thanthe ordinary General Public License. It also providesother free software developers Less of an advantage overcompeting non-free programs. These disadvantages arethe reason we use the ordinary General Public Licensefor many libraries. However, the Lesser license providesadvantages in certain special circumstances.For example, on rare occasions, there may be a specialneed to encourage the widest possible use of a certainlibrary, so that it becomes a de-facto standard. To achievethis, non-free programs must be allowed to use the library.A more frequent case is that a free library does the samejob as widely used non-free libraries. In this case, there islittle to gain by limiting the free library to free softwareonly, so we use the Lesser General Public License.In other cases, permission to use a particular library in non-free programs enables a greater number of people to usea large body of free software. For example, permission touse the GNU C Library in non-free programs enables manymore people to use the whole GNU operating system, aswell as its variant, the GNU/Linux operating system.Although the Lesser General Public License is Lessprotective of the users’ freedom, it does ensure that theuser of a program that is linked with the Library has the
46Appendix E Software License AgreementWireless-N Gigabit Routerfreedom and the wherewithal to run that program using amodified version of the Library.The precise terms and conditions for copying, distributionand modification follow. Pay close attention to thedifference between a “work based on the library” and a“work that uses the library”. The former contains codederived from the library, whereas the latter must becombined with the library in order to run.GNU LESSER GENERAL PUBLIC LICENSETERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATIONThis License Agreement applies to any software library0.or other program which contains a notice placed bythe copyright holder or other authorized party sayingit may be distributed under the terms of this LesserGeneral Public License (also called “this License”). Eachlicensee is addressed as “you”. A “library” means a collection of software functionsand/or data prepared so as to be conveniently linkedwith application programs (which use some of thosefunctions and data) to form executables.The “Library”, below, refers to any such software libraryor work which has been distributed under these terms.A “work based on the Library” means either the Libraryor any derivative work under copyright law: that is tosay, a work containing the Library or a portion of it,either verbatim or with modifications and/or translatedstraightforwardly into another language. (Hereinafter,translation is included without limitation in the term“modification”.)“Source code” for a work means the preferred form of the work for making modifications to it. For a library,complete source code means all the source code forall modules it contains, plus any associated interfacedefinition files, plus the scripts used to controlcompilation and installation of the library.Activities other than copying, distribution andmodification are not covered by this License; they areoutside its scope. The act of running a program usingthe Library is not restricted, and output from such aprogram is covered only if its contents constitute awork based on the Library (independent of the useof the Library in a tool for writing it). Whether that istrue depends on what the Library does and what theprogram that uses the Library does.You may copy and distribute verbatim copies of the1.Library’s complete source code as you receive it, inany medium, provided that you conspicuously andappropriately publish on each copy an appropriatecopyright notice and disclaimer of warranty; keepintact all the notices that refer to this License and tothe absence of any warranty; and distribute a copy of this License along with the Library.You may charge a fee for the physical act of transferringa copy, and you may at your option offer warrantyprotection in exchange for a fee.You may modify your copy or copies of the Library or2.any portion of it, thus forming a work based on theLibrary, and copy and distribute such modificationsor work under the terms of Section 1 above, providedthat you also meet all of these conditions:The modified work must itself be a softwarea)library.You must cause the files modified to carryb)prominent notices stating that you changed thefiles and the date of any change.You must cause the whole of the work to bec)licensed at no charge to all third parties under theterms of this License.If a facility in the modified Library refers to a functiond)or a table of data to be supplied by an applicationprogram that uses the facility, other than as anargument passed when the facility is invoked, thenyou must make a good faith effort to ensure that,in the event an application does not supply suchfunction or table, the facility still operates, andperforms whatever part of its purpose remainsmeaningful.(For example, a function in a library to computesquare roots has a purpose that is entirely well-defined independent of the application. Therefore,Subsection 2d requires that any application-supplied function or table used by this functionmust be optional: if the application does not supplyit, the square root function must still computesquare roots.)These requirements apply to the modified work asa whole. If identifiable sections of that work are notderived from the Library, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, donot apply to those sections when you distributethem as separate works. But when you distributethe same sections as part of a whole which is awork based on the Library, the distribution of thewhole must be on the terms of this License, whosepermissions for other licensees extend to the entirewhole, and thus to each and every part regardlessof who wrote it.
47Appendix E Software License AgreementWireless-N Gigabit RouterThus, it is not the intent of this section to claimrights or contest your rights to work written entirelyby you; rather, the intent is to exercise the right tocontrol the distribution of derivative or collectiveworks based on the Library.In addition, mere aggregation of another work not based on the Library with the Library (or witha work based on the Library) on a volume of astorage or distribution medium does not bring theother work under the scope of this License.You may opt to apply the terms of the ordinary GNU3.General Public License instead of this License to agiven copy of the Library. To do this, you must alter allthe notices that refer to this License, so that they referto the ordinary GNU General Public License, version2, instead of to this License. (If a newer version thanversion 2 of the ordinary GNU General Public Licensehas appeared, then you can specify that versioninstead if you wish.) Do not make any other change inthese notices.Once this change is made in a given copy, it isirreversible for that copy, so the ordinary GNU GeneralPublic License applies to all subsequent copies andderivative works made from that copy.This option is useful when you wish to copy part of thecode of the Library into a program that is not a library.You may copy and distribute the Library (or a portion4.or derivative of it, under Section 2) in object code orexecutable form under the terms of Sections 1 and2 above provided that you accompany it with thecomplete corresponding machine-readable sourcecode, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily usedfor software interchange.If distribution of object code is made by offeringaccess to copy from a designated place, then offeringequivalent access to copy the source code from thesame place satisfies the requirement to distributethe source code, even though third parties are notcompelled to copy the source along with the objectcode.A program that contains no derivative of any portion5.of the Library, but is designed to work with the Libraryby being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is nota derivative work of the Library, and therefore fallsoutside the scope of this License.However, linking a “work that uses the Library” withthe Library creates an executable that is a derivativeof the Library (because it contains portions of theLibrary), rather than a “work that uses the library”. Theexecutable is therefore covered by this License. Section6 states terms for distribution of such executables.When a “work that uses the Library” uses material froma header file that is part of the Library, the object codefor the work may be a derivative work of the Libraryeven though the source code is not. Whether this istrue is especially significant if the work can be linkedwithout the Library, or if the work is itself a library. Thethreshold for this to be true is not precisely defined bylaw.If such an object file uses only numerical parameters,data structure layouts and accessors, and small macrosand small inline functions (ten lines or less in length),then the use of the object file is unrestricted, regardlessof whether it is legally a derivative work. (Executablescontaining this object code plus portions of the Librarywill still fall under Section 6.)Otherwise, if the work is a derivative of the Library, youmay distribute the object code for the work under theterms of Section 6. Any executables containing thatwork also fall under Section 6, whether or not they arelinked directly with the Library itself.As an exception to the Sections above, you may also6.combine or link a “work that uses the Library” with theLibrary to produce a work containing portions of theLibrary, and distribute that work under terms of yourchoice, provided that the terms permit modificationof the work for the customer’s own use and reverseengineering for debugging such modifications.You must give prominent notice with each copy of the work that the Library is used in it and that theLibrary and its use are covered by this License. Youmust supply a copy of this License. If the work duringexecution displays copyright notices, you must includethe copyright notice for the Library among them, aswell as a reference directing the user to the copy of thisLicense. Also, you must do one of these things:Accompany the work with the completea)corresponding machine-readable source codefor the Library including whatever changes wereused in the work (which must be distributedunder Sections 1 and 2 above); and, if the work is an executable linked with the Library, with thecomplete machine-readable “work that uses theLibrary”, as object code and/or source code, so thatthe user can modify the Library and then relink to produce a modified executable containing themodified Library. (It is understood that the userwho changes the contents of definitions files in theLibrary will not necessarily be able to recompile theapplication to use the modified definitions.)
48Appendix E Software License AgreementWireless-N Gigabit RouterUse a suitable shared library mechanism for linkingb)with the Library. A suitable mechanism is one that(1) uses at run time a copy of the library alreadypresent on the user’s computer system, rather thancopying library functions into the executable, and(2) will operate properly with a modified version of the library, if the user installs one, as long as themodified version is interface-compatible with theversion that the work was made with.Accompany the work with a written offer, validc)for at least three years, to give the same user thematerials specified in Subsection 6a, above, for acharge no more than the cost of performing thisdistribution.If distribution of the work is made by offering accessd)to copy from a designated place, offer equivalentaccess to copy the above specified materials fromthe same place.Verify that the user has already received a copy of e)these materials or that you have already sent thisuser a copy.For an executable, the required form of the “work thatuses the Library” must include any data and utilityprograms needed for reproducing the executable fromit. However, as a special exception, the materials to bedistributed need not include anything that is normallydistributed (in either source or binary form) with themajor components (compiler, kernel, and so on) of theoperating system on which the executable runs, unlessthat component itself accompanies the executable.It may happen that this requirement contradicts thelicense restrictions of other proprietary libraries thatdo not normally accompany the operating system.Such a contradiction means you cannot use boththem and the Library together in an executable thatyou distribute.You may place library facilities that are a work based7.on the Library side-by-side in a single library togetherwith other library facilities not covered by this License,and distribute such a combined library, provided thatthe separate distribution of the work based on theLibrary and of the other library facilities is otherwisepermitted, and provided that you do these twothings:Accompany the combined library with a copy of thea)same work based on the Library, uncombined withany other library facilities. This must be distributedunder the terms of the Sections above.Give prominent notice with the combined library of b)the fact that part of it is a work based on the Library,and explaining where to find the accompanyinguncombined form of the same work.You may not copy, modify, sublicense, link with, or8.distribute the Library except as expressly providedunder this License. Any attempt otherwise to copy,modify, sublicense, link with, or distribute the Libraryis void, and will automatically terminate your rightsunder this License. However, parties who have receivedcopies, or rights, from you under this License will nothave their licenses terminated so long as such partiesremain in full compliance.You are not required to accept this License, since you9.have not signed it. However, nothing else grants youpermission to modify or distribute the Library or itsderivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifyingor distributing the Library (or any work based on theLibrary), you indicate your acceptance of this Licenseto do so, and all its terms and conditions for copying,distributing or modifying the Library or works basedon it.Each time you redistribute the Library (or any work 10.based on the Library), the recipient automaticallyreceives a license from the original licensor to copy,distribute, link with or modify the Library subjectto these terms and conditions. You may not imposeany further restrictions on the recipients’ exercise of the rights granted herein. You are not responsiblefor enforcing compliance by third parties with thisLicense.If, as a consequence of a court judgment or allegation11.of patent infringement or for any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions of this License, they donot excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence you maynot distribute the Library at all. For example, if a patentlicense would not permit royalty-free redistribution of the Library by all those who receive copies directly orindirectly through you, then the only way you couldsatisfy both it and this License would be to refrainentirely from distribution of the Library.If any portion of this section is held invalid orunenforceable under any particular circumstance,the balance of the section is intended to apply, andthe section as a whole is intended to apply in othercircumstances.It is not the purpose of this section to induce you toinfringe any patents or other property right claims orto contest validity of any such claims; this section hasthe sole purpose of protecting the integrity of the freesoftware distribution system which is implementedby public license practices. Many people havemade generous contributions to the wide range of
49Appendix E Software License AgreementWireless-N Gigabit Routersoftware distributed through that system in relianceon consistent application of that system; it is up tothe author/donor to decide if he or she is willing todistribute software through any other system and alicensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence of the rest of thisLicense.If the distribution and/or use of the Library is restricted12.in certain countries either by patents or by copyrightedinterfaces, the original copyright holder who placesthe Library under this License may add an explicitgeographical distribution limitation excluding thosecountries, so that distribution is permitted only in oramong countries not thus excluded. In such case, thisLicense incorporates the limitation as if written in thebody of this License.The Free Software Foundation may publish revised13.and/or new versions of the Lesser General PublicLicense from time to time. Such new versions will besimilar in spirit to the present version, but may differ indetail to address new problems or concerns.Each version is given a distinguishing version number.If the Library specifies a version number of this Licensewhich applies to it and “any later version”, you have theoption of following the terms and conditions either of that version or of any later version published by the FreeSoftware Foundation. If the Library does not specify alicense version number, you may choose any versionever published by the Free Software Foundation.If you wish to incorporate parts of the Library into14.other free programs whose distribution conditions areincompatible with these, write to the author to ask forpermission. For software which is copyrighted by theFree Software Foundation, write to the Free SoftwareFoundation; we sometimes make exceptions forthis. Our decision will be guided by the two goals of preserving the free status of all derivatives of our freesoftware and of promoting the sharing and reuse of software generally.NO WARRANTYBECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE,15.THERE IS NO WARRANTY FOR THE LIBRARY, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THELIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULDTHE LIBRARY PROVE DEFECTIVE, YOU ASSUME THECOST OF ALL NECESSARY SERVICING, REPAIR ORCORRECTION.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW16.OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFYAND/OR REDISTRIBUTE THE LIBRARY AS PERMITTEDABOVE, BE LIABLE TO YOU FOR DAMAGES,INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL ORCONSEQUENTIAL DAMAGES ARISING OUT OF THEUSE OR INABILITY TO USE THE LIBRARY (INCLUDINGBUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BYYOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARYTO OPERATE WITH ANY OTHER SOFTWARE), EVEN IFSUCH HOLDER OR OTHER PARTY HAS BEEN ADVISEDOF THE POSSIBILITY OF SUCH DAMAGES.END OF TERMS AND CONDITIONSEND OF SCHEDULE 3Schedule 4If this Linksys product contains open source softwarelicensed under the OpenSSL license:This product includes software developed by theOpenSSL Project for use in the OpenSSL Toolkit.(http://www.openssl.org/ppg).This product includes cryptographic software written byEric Young (eay@cryptsoft.com).This product includes software written by Tim Hudson(tjh@cryptsoft.com).In addition, if this Linksys product contains opensource software licensed under the OpenSSL licensethen the license terms below in this Schedule 3 willapply to that open source software. The license termsbelow in this Schedule 3 are from the public web site athttp://www.openssl.org/source/license.htmlppg.The OpenSSL toolkit stays under a dual license, i.e. boththe conditions of the OpenSSL License and the originalSSLeay license apply to the toolkit. See below for theactual license texts. Actually both licenses are BSD-styleOpen Source licenses. In case of any license issues relatedto OpenSSL please contact openssl-core@openssl.org.
50Appendix E Software License AgreementWireless-N Gigabit RouterOpenSSL LicenseCopyright © 1998-2007 The OpenSSL Project. All rightsreserved.Redistribution and use in source and binary forms, withor without modification, are permitted provided that thefollowing conditions are met:Redistributions of source code must retain the above1.copyright notice, this list of conditions and thefollowing disclaimer.Redistributions in binary form must reproduce the2.above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/orother materials provided with the distribution.All advertising materials mentioning features or3.use of this software must display the followingacknowledgment: “This product includes softwaredeveloped by the OpenSSL Project for use in theOpenSSL Toolkit. (http://www.openssl.org/ppg)”The names “OpenSSL Toolkit” and “OpenSSL Project” 4.must not be used to endorse or promote productsderived from this software without prior writtenpermission. For written permission, please contactopenssl-core@openssl.org.Products derived from this software may not be called5.“OpenSSL” nor may “OpenSSL” appear in their nameswithout prior written permission of the OpenSSLProject.Redistributions of any form whatsoever must retain6.the following acknowledgment: “This product includessoftware developed by the OpenSSL Project for use inthe OpenSSL Toolkit (http://www.openssl.org/ppg)”THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BELIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTEGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OROTHERWISE) ARISING IN ANY WAY OUT OF THE USE OFTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OFSUCH DAMAGE.This product includes cryptographic software written byEric Young (eay@cryptsoft.com). This product includessoftware written by Tim Hudson (tjh@cryptsoft.com).Original SSLeay LicenseCopyright © 1995-1998 Eric Young (eay@cryptsoft.com)Allrights reserved.This package is an SSL implementation written by EricYoung (eay@cryptsoft.com).The implementation was written so as to conform withNetscape’s SSL.This library is free for commercial and non-commercialuse as long as the following conditions are adhered to.The following conditions apply to all code found in thisdistribution, be it the RC4, RSA, lhash, DES, etc., code; notjust the SSL code. The SSL documentation included withthis distribution is covered by the same copyright termsexcept that the holder is Tim Hudson (tjh@cryptsoft.com).Copyright remains Eric Young’s, and as such any Copyrightnotices in the code are not to be removed.If this package is used in a product, Eric Young should begiven attribution as the author of the parts of the libraryused. This can be in the form of a textual message atprogram startup or in documentation (online or textual)provided with the package.Redistribution and use in source and binary forms, withor without modification, are permitted provided that thefollowing conditions are met:Redistributions of source code must retain the1.copyright notice, this list of conditions and thefollowing disclaimer.Redistributions in binary form must reproduce the2.above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/orother materials provided with the distribution.All advertising materials mentioning features or3.use of this software must display the followingacknowledgement:“This product includes cryptographic software writtenby Eric Young (eay@cryptsoft.com)”The word ‘cryptographic’ can be left out if the routinesfrom the library being used are not cryptographicrelated.If you include any Windows specific code (or a derivative4.thereof) from the apps directory (application code)you must include an acknowledgement: “This productincludes software written by Tim Hudson (tjh@cryptsoft.com)”THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” ANDANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THEAUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
51Appendix E Software License AgreementWireless-N Gigabit RouterDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS ORSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESSINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORYOF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.The license and distribution terms for any publicly availableversion or derivative of this code cannot be changed. i.e.this code cannot simply be copied and put under anotherdistribution license [including the GNU Public License.]END OF SCHEDULE 48100210B-ST

Navigation menu