LINKSYS WUSB54GCV2 802.11 b/g Wireless USB Dongle User Manual

LINKSYS LLC 802.11 b/g Wireless USB Dongle

User manual

USER GUIDE11G USB Wireless AdapterWUSB54GC V2
About This GuideiAbout This GuideIcon DescriptionsWhile reading through the User Guide you may seevarious icons that call attention to specific items. Below isa description of these icons:NOTE: This check mark indicates that there isa note of interest and is something that youshould pay special attention to while using theproduct.WARNING: This exclamation point indicatesthat there is a caution or warning and it issomething that could damage your property orproduct.WEB: This globe icon indicates a noteworthywebsite address or e-mail address.Online ResourcesWebsite addresses in this document are listed withouthttp:// in front of the address because most current webbrowsers do not require it. If you use an older web browser,you may have to addhttp://in front of the web address.Resource WebsiteLinksys www.linksys.comLinksys Internationalwww.linksys.com/internationalGlossarywww.linksys.com/glossaryNetwork Securitywww.linksys.com/securityCopyright and TrademarksLinksys, Cisco and the Cisco Logo are  registered trademarks or trademarksof Cisco Systems, Inc. and/or itsaffiliates in the U.S. and certain othercountries. Copyright © 2008 CiscoSystems, Inc. All rights reserved.Other brands and product names aretrademarks or registered trademarksof their respective holders.
Table of ContentsiiChapter 1: Product Overview 3LEDs ......................................................3Chapter 2: Wireless Security Checklist 4General Network Security Guidelines .................................4Additional Security Tips  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Chapter 3: Advanced Conguration 5How to Access the Wireless Network Monitor............................5How to Use the Wireless Network Monitor..............................5Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  5Connect  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Proles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Appendix A: Troubleshooting 17Appendix B: Wi-Fi Protected Setup 18Appendix C: Specications 20Appendix D: Warranty Information 21Limited Warranty..............................................21Appendix E: Regulatory Information 23FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Safety Notices................................................23Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive)   .  .24Wireless Equipment (Wireless-N/G/A/B Products) . . . . . . . . . . . . . . . . . . . . . . . . .25CE Marking  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25National Restrictions  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Product Usage Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Technical Documents on www.linksys.com/international . . . . . . . . . . . . . . . . . . . .26User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) ..............................27Appendix F: Software License Agreement 31Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Chapter 1 Product Overview3Chapter 1:  Product OverviewThank you for choosing the Compact Wireless-G USBAdapter. The Adapter connects to your PC via a USB port,leaving your PC’s slots available for other purposes. TheAdapter also lets you connect with any of the growingnumber of wireless hotspots in public places such ascoffee shops, airports, hotels and convention centers. Withthis Adapter, your wireless networking experience can befaster and easier than ever.LEDsLink(Green) The LED flashes when there iswireless network activity.
Chapter 2 Wireless Security Checklist4Chapter 2:  Wireless Security ChecklistWireless networks are convenient and easy to install, sohomes with high-speed Internet access are adopting themat a rapid pace. Because wireless networking operates bysending information over radio waves, it can be morevulnerable to intruders than a traditional wired network.Like signals from your cellular or cordless phones, signalsfrom your wireless network can also be intercepted. Sinceyou cannot physically prevent someone from connectingto your wireless network, you need to take some additionalsteps to keep your network secure.1. Change the default wireless network name or SSIDWireless devices have a default wireless network nameor Service Set Identifier (SSID) set by the factory. Thisis the name of your wireless network, and can be upto 32 characters in length. Linksys wireless productsuselinksys as the default wireless network name. Youshould change the wireless network name to somethingunique to distinguish your wireless network from otherwireless networks that may exist around you, but do notuse personal information (such as your Social Securitynumber) because this information may be available foranyone to see when browsing for wireless networks.2. Change the default passwordFor wireless products such as access points, routers, andgateways, you will be asked for a password when youwant to change their settings. These devices have a defaultpassword set by the factory. The Linksys default passwordisadmin. Hackers know these defaults and may try touse them to access your wireless device and change yournetwork settings. To thwart any unauthorized changes,customize the device’s password so it will be hard toguess.3. Enable MAC address filteringLinksys routers and gateways give you the ability toenable Media Access Control (MAC) address filtering. TheMAC address is a unique series of numbers and lettersassigned to every networking device. With MAC addressfiltering enabled, wireless network access is providedsolely for wireless devices with specific MAC addresses.For example, you can specify the MAC address of eachcomputer in your home so that only those computers canaccess your wireless network. 4. Enable encryptionEncryption protects data transmitted over a wirelessnetwork. Wi-Fi Protected Access (WPA/WPA2) and WiredEquivalency Privacy (WEP) offer different levels of securityfor wireless communication.A network encrypted with WPA/WPA2 is more securethan a network encrypted with WEP, because WPA/WPA2uses dynamic key encryption. To protect the informationas it passes over the airwaves, you should enable thehighest level of encryption supported by your network equipment. WEP is an older encryption standard and may be theonly option available on some older devices that do notsupport WPA.General Network Security GuidelinesWireless network security is useless if the underlyingnetwork is not secure.Password protect all computers on the network andsindividually password protect sensitive files.Change passwords on a regular basis.sInstall anti-virus software and personal firewallssoftware.Disable file sharing (peer-to-peer). Some applicationssmay open file sharing without your consent and/orknowledge.Additional Security TipsKeep wireless routers, access points, or gateways awaysfrom exterior walls and windows.Turn wireless routers, access points, or gatewayssoff when they are not being used (at night, duringvacations).Use strong passphrases that are at least eight characterssin length. Combine letters and numbers to avoid usingstandard words that can be found in the dictionary.WEB: For more information on wirelesssecurity, visit www.linksys.com/security
Chapter 3 Advanced Configuration5Chapter 3:  Advanced ConfigurationAdvanced configuration is performed through the WirelessNetwork Monitor (the Monitor). Use it to check the statusinformation, search for available wireless networks, orcreate profiles that hold different configuration settings.Diagnostics is performed through the Diagnostic utility.Use it to detect the Adapter, test the driver and Monitor,and troubleshoot if needed.How to Access the Wireless Network MonitorAfter installing the Adapter, the Monitor icon appears inthe system tray of your computer. If the Monitor is enabled,the icon is green. If the Monitor is disabled or the Adapteris not inserted, the icon is gray.Wireless Network Monitor IconDouble-click the icon to open the Monitor.How to Use the Wireless Network MonitorThe opening screen of the Monitor is theStatusscreen.From this screen, you can find out how strong the currentwireless signal is and how good the connection’s qualityis.ClickMore Information to view additional statusinformation about the current connection. To search foravailable wireless networks, click theConnect tab. Toperform configuration changes or create connectionprofiles, click the Profiles tab.StatusThe Status screen displays network mode, signal strength,and link quality information about the current connection.ClickMore Informationfor additional status information.StatusSignal Strength The Signal Strength bar indicates signalstrength.Link Quality The Link Quality bar indicates the quality of the wireless network connection.More InformationClickMore Information to viewadditional information about the wireless network connection on the Wireless Network Status screen.Wi-Fi Protected SetupClick theWi-Fi Protected Setupbuttonto connect to a router that supports Wi-FiProtected Setup. Proceed to Appendix B, “Wi-Fi ProtectedSetup”.NOTE: The Wi-Fi Protected Setup feature is notavailable on all WUSB54GCWireless Network StatusThe Wireless Network Status screen provides informationon your current network settings.Wireless Network StatusWireless Network Name This is the unique name (SSID)of the wireless network.V2 models.
Chapter 3 Advanced Configuration6Wireless ModeThis is the mode of the wireless network currently in use.Standard Channel  This is the channel used by yourwireless network.SecurityThis is the status of the wireless security feature.Authentication This is your wireless network’sauthentication method.Network Type This is the wireless network type.IP Address This is the  IP Address of the Adapter.Subnet Mask This is the Adapter’s Subnet Mask.Default Gateway This is the Default Gateway address.DNS1 This is the DNS address of the Adapter.MAC AddressThis is the MAC address of the wirelessnetwork’s wireless router or access point.Signal Strength The Signal Strength bar indicates thesignal strength.Link Quality The Link Quality bar indicates the quality of the wireless network connection.StatisticsClickStatisticsto go to the Wireless Network Statistics screen. BackClickBackto return to the initialkStatusscreen.Save to ProfileClickSave to Profile to save the currently active connection settings to a profile.Wireless Network StatisticsThe Wireless Networks Statisticsscreen provides statisticson your current network settings.Wireless Network StatisticsTransmit Rate  This is the data transmission rate of the current connection. (In Auto mode, the Adapterdynamically shifts to the fastest data transmission rate atany given time.)Receive RateThis is the rate that the Adapter receivesdata.Packets ReceivedThis shows the packets that theAdapter receives, in real time, after connecting to thewireless network or after clicking Refresh.Packets Transmitted This shows the packets that theAdapter transmits, in real time, after connecting to thewireless network or after clicking Refresh.Bytes Received This shows the bytes that the Adapterreceives, in real time, after connecting to the wirelessnetwork or after clicking Refresh.Bytes Transmitted This shows the bytes that the Adaptertransmits, in real time, after connecting to the wirelessnetwork or after clicking Refresh.Driver Version This shows the Adapter’s driver version.Signal Strength This is the intensity of the wireless signalthat the Adapter receives.Transmit PowerThis is the power output at which theAdapter transmits.Signal Strength  The Signal Strength bar indicates thesignal strength.Link Quality The Link Quality bar indicates the quality of the wireless network connection.Back ClickBackto return to the initialkStatusscreen.StatusClickStatusto go to the Wireless Network Statusscreen.Save to Profile ClickSave to Profileto save the currentlyactive connection settings to a profile.RefreshClickRefresh to update the statistics.
Chapter 3 Advanced Configuration7ConnectThe Connectscreen displays a list of available networkstin the table. The table shows each network’s wirelessnetwork name, radio band, signal strength, and securitymethod. You may click the column heading (WirelessNetwork Name, GHz, Signal strength, or Security method)to sort by that field.ConnectWireless Network Name  This is the SSID or unique nameof the wireless network.GHz This is the radio band used on the network. Thenumber 2.4 indicates Wireless-B, -G, or -N (2.4 GHz). (TBD - Is thisstill displayed? Not needed since only band is 2.4 GHz)Signal This is the percentage of signal strength, from 0to 100%.SecurityThis is the security method used by thenetwork.Wi-Fi Protected SetupClick theWi-Fi Protected Setupbuttonto connect to a router that supports Wi-FiProtected Setup. Proceed to Appendix B, “Wi-Fi ProtectedSetup”.NOTE: The Wi-Fi Protected Setup feature is notavailable on all WUSB54GC RefreshClickRefresh to perform a new search forwireless devices.Connect To connect to one of the networks on the list,select the wireless network, and click Connect.NOTE: The Wi-Fi Protected Setup feature is notavailable on all WUSB54GCProceed to the appropriate section,“Wireless SecurityDisabled”or“WirelessSecurity Enabled”.Wireless Security DisabledIf you connect to a network whose wireless security isdisabled, then you will view this screen:Click Connect AnywayClick1.Connect Anyway.Click2.Finish.CongratulationsCongratulations! The Adapter is connected to the network.Wireless Security EnabledIf you connect to a network whose wireless security isenabled, then you will view one of three screens.Proceed to the appropriate instructions below for the1.type of wireless security that the network is using:WPA2, WPA, or WEP.V2 models.V2 models.
Chapter 3 Advanced Configuration8WPA2 (Wi-Fi Protected Access 2)If the network uses WPA2 Personal security, then theWPA2-Personal Key Needed for Connectionscreen appears.WPA2-Personal SecurityPassphraseEnter the network’s Passphrase (alsocalled a pre-shared key) of 8-63 characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.WPA (Wi-Fi Protected Access)If the network uses WPA Personal security, then theWPA-Personal Key Needed for Connection screen appears.WPA-Personal SecurityPassphraseEnter the network’s Passphrase (alsocalled a pre-shared key) of 8-63 characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.WEP (Wired Equivalent Privacy)If the network uses WEP encryption, then theWEP Key or Passphrase Needed for Connectionscreen appears.WEP SecurityPassphraseEnter the Passphrase or WEP key.The passphrase is case-sensitive and must be 16 orfewer alphanumeric characters. It must match thepassphrase of your other wireless network devicesand is compatible with Linksys wireless products only.(For non-Linksys wireless products, enter the WEP keymanually.)If you enter the network’s WEP key, enter theappropriate number of hexadecimal characters (“0” to“9” and “A” to “F”). For 64-bit encryption, enter exactly10 hexadecimal characters. For 128-bit encryption,enter exactly 26 hexadecimal characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.Click2.Finish.CongratulationsCongratulations! The Adapter is connected to the network.
Chapter 3 Advanced Configuration9ProfilesThe Profiles screen lets you save different configurationprofiles for different network setups. The table on the leftdisplays a list of available profiles with their profile namesand wireless network names.ProfilesProfileThis is the name of the profile.Wireless Network Name This is the SSID or unique name of the wireless network.Profile InformationFor each profile selected, the following are listed:Wireless Mode This is the mode of the wireless network currently in use.Standard Channel This is the channel used by yourwireless network.SecurityThis is the status of the wireless security.Authentication This is the authentication setting for thenetwork.IP Address This is the method used by the network toassign IP addresses.Connect  To connect to a wireless network using aspecific profile, select the profile, and click Connect.NewClickNew to create a new profile. See the nextsection, “Create a New Profile,” for instructions.EditSelect the profile you want to change and click Edit.ImportClickImport to import a profile that is saved inanother location. Select the appropriate file, and click Open.Export Select the profile you want to save in a differentlocation, and click Export. Direct Windows to theappropriate folder, and click Save.Delete Select the profile you want to delete and click Delete.NOTE: If you want to export more than oneprofile, you must export them one at a time.Create a New ProfileThe next screen is theAvailable Wireless Networks screen.Available Wireless NetworksThis screen provides two options for setting up theAdapter.Available Wireless Networks (For most users)Use thisoption if you already have a network set up. The networksavailable to this Adapter are listed on this screen. Youcan choose one of these networks and click Connectto connect to it. Click Refresh to update the AvailableWireless Networks list.Advanced SetupIf your network is not listed on thisscreen, select Advanced Setupto set up the Adaptermanually. This method is for advanced users only.The setup for each option is described, step by step, underthe appropriate heading on the following pages.Available Wireless NetworksThe available networks are listed in the table on the centerof the screen by Wireless Network Name. Select the wirelessnetwork you wish to connect to and click Connect. (If youdo not see your network listed, click Refresh to bring thelist up again.)Proceed to the appropriate section,“Wireless SecurityDisabled” or “Wireless Security Enabled”.
Chapter 3 Advanced Configuration10Wireless Security DisabledIf you connect to a network whose wireless security isdisabled, then you will view this screen:Click Connect AnywayClick1.Connect Anyway.Click2.Finish.CongratulationsCongratulations! The Adapter is connected to the network.Wireless Security EnabledIf you connect to a network whose wireless security isenabled, then you will view one of three screens.Proceed to the appropriate instructions below for the1.type of wireless security that the network is using:WPA2, WPA, or WEP.WPA2 (Wi-Fi Protected Access 2)If the network uses WPA2 Personal security, thentheWPA2-Personal Key Needed for Connection screenappears.WPA2-Personal SecurityPassphraseEnter the network’s Passphrase (alsocalled a pre-shared key) of 8-63 characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.WPA (Wi-Fi Protected Access)If the network uses WPA Personal security, thentheWPA-Personal Key Needed for Connectionscreenappears.WPA-Personal SecurityPassphraseEnter the network’s Passphrase (alsocalled a pre-shared key) of 8-63 characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.
Chapter 3 Advanced Configuration11WEP (Wired Equivalent Privacy)If the network uses WEP encryption, then theWEP Key or Passphrase Needed for Connectionscreen appears.WEP SecurityPassphraseEnter the Passphrase or WEP key.The passphrase is case-sensitive and must be 16 orfewer alphanumeric characters. It must match thepassphrase of your other wireless network devicesand is compatible with Linksys wireless products only.(For non-Linksys wireless products, enter the WEP keymanually.)If you enter the network’s WEP key, enter theappropriate number of hexadecimal characters (“0” to“9” and “A” to “F”). For 64-bit encryption, enter exactly10 hexadecimal characters. For 128-bit encryption,enter exactly 26 hexadecimal characters.To connect to the network, click Connect. To cancelthe connection, click Cancel.Click2.Finish.CongratulationsCongratulations! The Adapter is connected to the network.Advanced SetupIf your network is not listed with the available networks,use Advanced Setup.Available Wireless NetworksClick1.Advanced Setupon the Available WirelessNetworksscreen to set up the Adapter manually.The 2.Network Settings screen appears.Wireless NetworkIf your network has a router or other DHCP server, selectObtain network settings automatically (DHCP).If your network does not have a DHCP server or router,select Specify network settings. Enter an IP Address,Subnet Mask, Default Gateway, and DNS addressesappropriate for your network. You must specify theIP Address and Subnet Mask on this screen. If you areunsure about the Default Gateway and DNS addresses,leave these fields blank.IP Address–This IP Address must be unique toyour network.Subnet Mask–The Adapter’s Subnet Mask must bethe same as your wired network’s Subnet Mask.
Chapter 3 Advanced Configuration12Default Gateway–Enter the IP address of yournetwork’s Gateway. DNS 1 and DNS 2–Enter the DNS address of yourwired Ethernet network.ClickNext to continue, or click Backto return to thekprevious screen.The3.Wireless Mode screen shows a choice of twowireless modes.Wireless ModeInfrastructure Mode–Select this mode if you wantto connect to a wireless router or access point.Ad-Hoc Mode–Select this mode if you want toconnect to another wireless device directly withoutusing a wireless router or access point.Wireless Network Name–Enter a wireless network name (SSID) that must be used for all devices inyour wireless network. It is case-sensitive andshould be a unique name to help prevent othersfrom entering your network.ClickNext to continue, or click Back to return to thekprevious screen.If you chose Infrastructure Mode, go to step 5 now.4.If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settingsscreen appears.NOTE:The Adapter only supports Ad-Hoc Modefor 2.4 GHz networks: Wireless-B, Wireless-G,and Wireless-N (using 2.4 GHz).Ad-Hoc Mode SettingsStandard Channel–Select the correct channelfor your wireless network. If you are unsure aboutwhich channel to use, keep the default, Auto.Click Next to continue, or click Backto return to thekprevious screen.If your wireless network does not have wireless security,5.selectDisable and then click Next to continue. Proceed to step 6.Wireless SecurityIf your wireless network has wireless security, selectthe method of security used: WEP, WPA Personal,WPA2 Personal, WPA Enterprise, WPA2 Enterprise, orRADIUS. WEP stands for Wired Equivalent Privacy, andWPA stands for Wi-Fi Protected Access. WPA2 stands
Chapter 3 Advanced Configuration13for Wi-Fi Protected Access 2. WPA is a stronger securitymethod than WEP. WPA2 is a stronger security methodthan WPA. RADIUS stands for Remote AuthenticationDial-In User Service. Click Next to continue, or click Back to return to the previous screen.kProceed to the section for your security method.WEPMake sure the settings you configure match the settingsof your wireless network.WEPWEPSelect64-bitor128-bit encryption.PassphraseEnter the network’s Passphrase, so a WEPkey is automatically generated. It is case-sensitive andshould not be longer than 16 alphanumeric characters.This passphrase must match the passphrase of your otherwireless network devices and is compatible with Linksyswireless products only. (If you have any non-Linksyswireless products, enter the WEP key manually on thoseproducts.)WEP KeyIf you do not have the Passphrase, enter theWEP key of your wireless network. For 64-bit encryption,enter exactly 10 hexadecimal characters. For 128-bitencryption, enter exactly 26 hexadecimal characters. Validhexadecimal characters are “0” to “9” and “A”  to “F”.Advanced UsersTX Key The default is1. If your network’s wireless routeror access point uses transmit key number 2, 3, or 4, selectthe appropriate number.Authentication The default is Open System. For OpenSystem authentication, the sender and the recipient donot share a WEP key for authentication. For Shared Keyauthentication, both the sender and the recipient share aWEP key for authentication.ClickNextto continue, or click Back to return to thekprevious screen.WPA PersonalWPA Personal offers two encryption methods, TKIP andAES, with dynamic encryption keys.WPA PersonalEncryptionSelectTKIP orAES.PassphraseEnter the network’s Passphrase (also called apre-shared key) of 8-63 characters.ClickNext to continue, or click Back to return to thekprevious screen.WPA2 PersonalWPA2 Personal uses the encryption method, AES, withdynamic encryption keys.WPA2 PersonalPassphraseEnter the network’s Passphrase (also called apre-shared key) of 8-63 characters.ClickNext to continue, or click Back to return to thekprevious screen.
Chapter 3 Advanced Configuration14WPA EnterpriseWPA Enterprise features WPA security used in coordinationwith a RADIUS server. (This should only be used when aRADIUS server is connected to the router.) WPA Enterpriseoffers two authentication methods, EAP-TLS and PEAP,as well as two encryption methods, TKIP and AES, withdynamic encryption keys.Authentication Select the authentication method yournetwork is using,EAP-TLS orPEAP.EAP-TLSWPA Enterprise - EAP-TLSIf you selected EAP-TLS, configure the following:Login NameEnter the login name of your wirelessnetwork.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network.Encryption Select the type of encryption,TKIP orAES.ClickNext to continue, or click Back to return to thekprevious screen.PEAPWPA Enterprise - PEAPIf you selected PEAP, configure the following:Login NameEnter the login name of your wirelessnetwork.Password Enter the password of your wireless network.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network. If you want touse any certificate, keep the default,Trust Any.Inner Authen.Select the authentication method usedinside the PEAP tunnel.Encryption Select the type of encryption,TKIP orAES.ClickNext to continue, or click Back to return to thekprevious screen.WPA2 EnterpriseWPA2 Enterprise features WPA2 security used incoordination with a RADIUS server. (This should only beused when a RADIUS server is connected to the router.)WPA2 Enterprise offers two authentication methods,EAP-TLS and PEAP.-Authentication Select the authentication method yournetwork is using,EAP-TLS orPEAP.
Chapter 3 Advanced Configuration15EAP-TLSWPA2 Enterprise - EAP-TLSIf you selected EAP-TLS, configure the following:Login NameEnter the login name of your wirelessnetwork.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network.ClickNext to continue, or click Back to return to thekprevious screen.PEAPWPA2 Enterprise - PEAPIf you selected PEAP, configure the following:Login NameEnter the login name of your wirelessnetwork.Password Enter the password of your wireless network.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network. If you want touse any certificate, keep the default, Trust Any.Inner Authen. Select the authentication method usedinside the PEAP tunnel.ClickNext to continue, or click Back to return to thekprevious screen.RADIUSRADIUS features use of a RADIUS server. (This should onlybe used when a RADIUS server is connected to the router.)RADIUS offers two authentication types: EAP-TLS andPEAP.Authentication Select the authentication method yournetwork is using,EAP-TLS orPEAP.EAP-TLSRADIUS - EAP-TLSIf you selected EAP-TLS, configure the following:Login NameEnter the login name of your wirelessnetwork.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network.ClickNext to continue, or click Back to return to thekprevious screen.
Chapter 3 Advanced Configuration16PEAPRADIUS - PEAPIf you selected PEAP, configure the following:Login NameEnter the login name of your wirelessnetwork.Password Enter the password of your wireless network.Server Name Enter the name of the authentication server(this is optional).Certificate Select the certificate you installed toauthenticate you on your wireless network. If you want touse any certificate, keep the default,Trust Any.Inner Authen.Select the authentication method usedinside the PEAP tunnel.ClickNext to continue, or click Back to return to thekprevious screen.The 6.Confirm New Settings screen appears.Confirm New SettingsTo save the new settings, click Save. To edit the newsettings, click Back. To exit Advanced Setup throughthe Monitor, click Exit.The 7.Congratulationsscreen appears. Click Connect toNetwork to implement the new settings immediatelykand return to the Status screen. Click Return to Profilesscreen to keep the current settings active and returnto the Profiles screen.CongratulationsCongratulations! The profile is successfully configured.
Appendix A Troubleshooting17Appendix A: TroubleshootingYour computer does not recognize the Adapter.Make sure that the Adapter is properly inserted into theUSB slot.The Adapter does not work properly.Remove the Adapter, and then reinsert it into thecomputer’s USB slot.Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructureconguration.Make sure that the computers are powered on.1.Make sure that the Adapter is configured with the2.same Wireless Network Name (SSID) and wirelesssecurity settings as the other wireless computers inthe Infrastructure configuration.WEB: If your questions are not addressed here,refer to the Linksys website, www.linksys.com
Appendix B Wi-Fi Protected Setup18Appendix B:  Wi-Fi Protected SetupNOTE: Make sure the router supports Wi-FiProtected Setup.Before you begin, make sure the router and the computerwith the Adapter are in the same room. Then select themethod that is most convenient for you.Select a MethodPush Button (Recommended) Select this option to usethe push button method.Use Adapter’s PIN number Select this option to enterthe Adapter’s PIN number on the router.ClickNext to continue, or click Back to return to thekprevious screen.Proceed to the instructions for the method you selected.Use the Push ButtonUse the Push ButtonPress the1.Wi-Fi Protected Setup button on therouter.Within two minutes, click the 2.Wi-Fi Protected Setupbutton on this screen.The Adapter connects to the network.3.Connecting to the NetworkClick4.Printto print out your wireless network settings.Then clickFinishk to return to the Statusscreen, or click Exit to exit the Monitor.CongratulationsCongratulations! The Adapter is connected to the network.
Appendix B Wi-Fi Protected Setup19Enter the Adapter’s PIN NumberEnter the PIN NumberAccess the web-based utility of the router. (Refer to the5.router’s documentation for instructions.)On the router’s6.Wi-Fi Protected Setup screen, enterthe Adapter’s PIN number in thePINfield. Then click NRegister.On the Adapter’s PIN number screen, click 7.Next.Enter the PIN NumberThe Adapter connects to the network.8.Connecting to the NetworkClick9.Printto print out your wireless network settings.Then clickFinishk to return to the Statusscreen, or click Exit to exit the Monitor.CongratulationsCongratulations! The Adapter is connected to thenetwork.
Appendix C Specifications20Appendix C:  SpecificationsModelStandardsIEEE 802.11b, IEEE 802.11g, USB1.1,USB2.0Channels802.11b / 802.11g 11 Channels (most of North,Central, and South America)13 Channels (most of Europeand Asia)LEDsLinkProtocols 802.11b: CCK (11 Mbps), DQPSK(2Mbps), DBPSK (1Mbps)802.11g: OFDMReceive Sensitivity11Mbps @ -80dBm (Typical) 54Mbps @ -65dBm (Typical)Security FeaturesWEP Encryption, WPA, WPA2WEP Key Bits64, 128-bitEnvironmentalDimensions91 x 11 x 28 mm3.86” x 0.43” x 1.10”Weight                            23 g (0.5 oz)CerticationsFCC, Wi-Fi, CEOperating Temp.0 to 45ºCStorage Temp. -20 to 60ºCOperating Humidity10 to 85%, NoncondensingStorage Humidity5 to 90%, NoncondensingWUSB54GC V2Transmitted Power        802.11b:17.05 dBm for FCC802.11g;18.38 dBm for FCC802.11b;19.36 dBm for CE802.11g;19.41 dBm for CE
Appendix D Warranty Information21Appendix D: Warranty InformationLimited WarrantyLinksys warrants that this Linksys hardware product will besubstantially free of defects in materials and workmanshiparising under normal use during the Warranty Period,which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below:Two (2) years for new productsNinety (90) days for refurbished productsThis limited warranty is non-transferable and extends onlyto the original end-user purchaser. Your exclusive remedyand Linksys’ entire liability under this limited warrantywill be for Linksys, at its option, to (a) repair the productwith new or refurbished parts, (b) replace the productwith a reasonably available equivalent new or refurbishedLinksys product, or (c) refund the purchase price of theproduct less any rebates. Any repaired or replacementproducts will be warranted for the remainder of theoriginal Warranty Period or thirty (30) days, whichever islonger. All products and/or parts that are replaced becomethe property of Linksys.This limited warranty shall apply in addition to anystatutory or other rights which you may have under acontract of sale.Exclusions and Limitations This limited warranty does not apply if: (a) the productassembly seal has been removed or damaged, (b) theproduct has been altered or modified, except by Linksys,(c) the product damage was caused by use with non-Linksys products, (d) the product has not been installed,operated, repaired, or maintained in accordance withinstructions supplied by Linksys, (e) the product hasbeen subjected to abnormal physical or electrical stress,misuse, negligence, or accident, (f) the serial number onthe Product has been altered, defaced, or removed, or (g)the product is supplied or licensed for beta, evaluation,testing or demonstration purposes for which Linksys doesnot charge a purchase price or license fee.ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT,WHETHER FACTORY LOADED ON THE PRODUCT ORCONTAINED ON MEDIA ACCOMPANYING THE PRODUCT,IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANYKIND. Without limiting the foregoing, Linksys does notwarrant that the operation of the product or software willbe uninterrupted or error free. Also, due to the continualdevelopment of new techniques for intruding upon andattacking networks, Linksys does not warrant that theproduct, service, software or any equipment, system ornetwork on which the product or software is used will befree of vulnerability to intrusion or attack. The productmay include or be bundled with third party software orservice offerings. This limited warranty shall not apply tosuch third party software or service offerings. This limitedwarranty does not guarantee any continued availabilityof a third party’s service for which this product’s use oroperation may require.TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIEDWARRANTIES AND CONDITIONS OF MERCHANTABILITY,SATISFACTORY QUALITY OR FITNESS FOR A PARTICULARPURPOSE ARE LIMITED TO THE DURATION OF THEWARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES,INCLUDING, BUT NOT LIMITED TO, ANY IMPLIEDWARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.Some jurisdictions do not allow limitations on how longan implied warranty lasts, so the above limitation may notapply to you. This limited warranty gives you specific legalrights, and you may also have other rights which vary byjurisdiction.TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THETHEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISINGOUT OF OR RELATED TO THE USE OF OR INABILITY TOUSE THE PRODUCT (INCLUDING ANY SOFTWARE), EVENIF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.  IN NO EVENT WILL LINKSYS’ LIABILITYEXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.The foregoing limitations will apply even if any warrantyor remedy provided under this limited warranty fails of its essential purpose. Some jurisdictions do not allowthe exclusion or limitation of incidental or consequentialdamages, so the above limitation or exclusion may notapply to you.Obtaining Warranty ServiceIf you have a question about your product or experience aproblem with it, please go towww.linksys.com/supporypptwhere you will find a variety of online support tools andinformation to assist you with your product. If the productproves defective during the Warranty Period, contactLinksys Technical Support for instructions on how toobtain warranty service. The telephone number for LinksysTechnical Support in your area can be found in the productUser Guide and atwww.linksys.comy. Have your productserial number and proof of purchase on hand when calling.A DATED PROOF OF ORIGINAL PURCHASE IS REQUIREDTO PROCESS WARRANTY CLAIMS. If you are requested toreturn your product, you will be given a Return MaterialsAuthorization (RMA) number. You are responsible forproperly packaging and shipping your product to Linksysat your cost and risk. You must include the RMA number
Appendix D Warranty Information22and a copy of your dated proof of original purchase whenreturning your product. Products received without a RMAnumber and dated proof of original purchase will berejected. Do not include any other items with the productyou are returning to Linksys. Defective product coveredby this limited warranty will be repaired or replaced andreturned to you without charge. Customers outside of the United States of America and Canada are responsiblefor all shipping and handling charges, custom duties,VAT and other associated taxes and charges. Repairs orreplacements not covered under this limited warranty willbe subject to charge at Linksys’ then-current rates.Technical SupportThis limited warranty is neither a service nor asupport contract.  Information about Linksys’ currenttechnical support offerings and policies (includingany fees for support services) can be found atwww.linksys.com/supporypptGeneralThis limited warranty is governed by the laws of thejurisdiction in which the Product was purchased by you.If any portion of this limited warranty is found to be voidor unenforceable, its remaining provisions shall remain infull force and effect.Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,CA 92623.For more information, please contact uswww.linksys.comySelect your country, and then select SUPPORT/TECHNICAL For product returns:Select your Country and then select CUSTOMER SUPPORT
Appendix E Regulatory Information23Appendix E: Regulatory InformationFCC StatementThis product has been tested and complies with thespecifications for a Class B digital device, pursuant to Part15 of the FCC Rules. These limits are designed to providereasonable protection against harmful interference ina residential installation. This equipment generates,uses, and can radiate radio frequency energy and, if notinstalled and used according to the instructions, maycause harmful interference to radio communications.However, there is no guarantee that interference will notoccur in a particular installation. If this equipment doescause harmful interference to radio or television reception,which is found by turning the equipment off and on, theuser is encouraged to try to correct the interference byone or more of the following measures:Reorient or relocate the receiving antennasIncrease the separation between the equipment orsdevicesConnect the equipment to an outlet other than thesreceiver’sConsult a dealer or an experienced radio/TV techniciansfor assistanceFCC Radiation Exposure StatementThis equipment complies with FCC radiation exposurelimits set forth for an uncontrolled environment. Safety NoticesCaution: To reduce the risk of fire, use only No.26 AWGsor larger telecommunication line cord.Do not use this product near water, for example, in aswet basement or near a swimming pool.Avoid using this product during an electrical storm.sThere may be a remote risk of electric shock fromlightning.Wireless DisclaimerThe maximum performance for wireless is derived fromIEEE Standard 802.11 specifications. Actual performancecan vary, including lower wireless network capacity,data throughput rate, range and coverage. Performancedepends on many factors, conditions and variables,including distance from the access point, volume of network traffic, building materials and construction,operating system used, mix of wireless products used,interference and other adverse conditions.
Appendix E Regulatory Information24Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive)ComplianceInfoffrmationforff2,4-GHzWirelessProductsRelevantto the EU and OtherCountriesFollowingthe EU Directive 1999/5/EC (R&TTE Directive)Български [Bulgarian]Това оборудване отговаря на съществените изисквания и приложими клаузи на Директива 1999/5/ЕС.Česky [Czech]:Toto zařízení je v souladu se základními požadavky a ostatními odpovídajícími ustanoveními Směrnice 1999/5/EC.Dansk[Danish]:Dette udstyr er i overensstemmelse med de væsentlige krav og andre relevante bestemmelser i Direktiv 1999/5/EF.Deutsch [German]:Dieses Gerät entspricht den grundlegenden Anforderungen und den weiteren entsprechenden Vorgaben der Richtlinie 1999/5/EU.Eesti [Estonian]:See seade vastab direktiivi 1999/5/EÜ olulistele nõuetele ja teistele asjakohastele sätetele.English:This equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.Español[Spanish]:Este equipo cumple con los requisitos esenciales asi como con otras disposiciones de la Directiva 1999/5/CE.Ελληνική [Greek]:Αυτός ο εξοπλισµός είναι σε συµµόρφωση µε τις ουσιώδεις απαιτήσεις και άλλες σχετικές διατάξεις της Οδηγίας 1999/5/EC.Français [French]:Cet appareil est conforme aux exigences essentielles et aux autres dispositions pertinentes de la Directive 1999/5/EC.Íslenska [Icelandic]:Þetta tæki er samkvæmt grunnkröfum og öðrum viðeigandi ákvæðum Tilskipunar 1999/5/EC.Italiano [Italian]:Questo apparato é conforme ai requisiti essenziali ed agli altri principi sanciti dalla Direttiva 1999/5/CE.Latviski [Latvian]:Šī iekārta atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem.Lietuvių[Lithuanian]:Šis įrenginys tenkina 1999/5/EB Direktyvos esminius reikalavimus ir kitas šios direktyvos nuostatas.Nederlands[Dutch]:Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999/5/EC.Malti [Maltese]:Dan l-apparat huwa konformi mal-ħtiġiet essenzjali u l-provedimenti l-oħra rilevanti tad-Direttiva 1999/5/EC.Magyar[Hungarian]:Ez a készülék teljesíti az alapvető követelményeket és más 1999/5/EK irányelvben meghatározott vonatkozó rendelkezéseket.Norsk[Norwegian]:Dette utstyret er i samsvar med de grunnleggende krav og andre relevante bestemmelser i EU-direktiv 1999/5/EF.Polski [Polish]:Urządzenie jest zgodne z ogólnymi wymaganiami oraz szczególnymi warunkami określonymi Dyrektywą UE: 1999/5/EC.Português [Portuguese]:Este equipamento está em conformidade com os requisitos essenciais e outras provisões relevantes da Directiva 1999/5/EC.Română [Romanian]Acest echipament este in conformitate cu cerintele esentiale si cu alte prevederi relevante ale Directivei 1999/5/EC.Slovensko [Slovenian]:Ta naprava je skladna z bistvenimi zahtevami in ostalimi relevantnimi pogoji Direktive 1999/5/EC.Slovensky [Slovak]:Toto zariadenie je v zhode so základnými požiadavkami a inými príslušnými nariadeniami direktív: 1999/5/EC. Suomi[Finnish]:Tämä laite täyttää direktiivin 1999/5/EY olennaiset vaatimukset ja on siinä asetettujen muiden laitetta koskevien määräysten mukainen.Svenska [Swedish]:Denna utrustning är i överensstämmelse med de väsentliga kraven och andra relevanta bestämmelser i Direktiv 1999/5/EC.For all products, the Declaration of Conformity (DofC) isavailable through one or more of these options:A pdf file is included on the product’s CD.sA print copy is included with the product.sA pdf file is available on the product’s webpage.sVisitwww.linksys.com/international and select yourcountry or region. Then select your product.If you need any other technical documentation, see the“Technical Documents on www.linksys.com/international” section, as shown later in this appendix.
Appendix E Regulatory Information25Wireless Equipment  (Wireless-N/G/A/B Products)The following standards were applied during theassessment of the product against the requirements of the Directive 1999/5/EC:Radio: EN 300 328 andsEMC: EN 301 489-1, EN 301 489-17sSafety: EN 60950 and either EN 50385 or EN 50371sDFS: The equipment meets the DFS requirements asdefined in ETSI EN 301 893. This feature is required bythe regulations to avoid interference with Radio LocationServices (radars).CE MarkingFor the Linksys Wireless-N, -G, -B, and/or -A products,the following CE mark, notified body number (whereapplicable), and class 2 identifier are added to theequipment.Check the CE label on the product to find out whichnotified body was involved during the assessment.National RestrictionsThis product may be used in all EU countries (and othercountries following the EU directive 1999/5/EC) withoutany limitation except for the countries mentioned below:Ce produit peut être utilisé dans tous les pays de l’UE (et danstous les pays ayant transposés la directive 1999/5/CE) sansaucune limitation, excepté pour les pays mentionnés ci-dessous:Questo prodotto è utilizzabile in tutte i paesi EU (ed in tutti gli altri paesi che seguono le direttive EU 1999/5/EC) senzanessuna limitazione, eccetto per i paesi menzionati di seguito:Das Produkt kann in allen EU Staaten ohne Einschränkungeneingesetzt werden (sowie in anderen Staaten die der EU Direktive 1999/5/CE folgen) mit Außnahme der folgendenaufgeführten Staaten:In the majority of the EU and other European countries,the 2,4-GHz bandshave been madeavailablefor the use of wireless local area networks (LANs). Thetablelabeled“Overview of RegulatoryRequirementsforffWireless LANs” provides an overview of the regulatoryrequirements applicablefor the 2,4ff-GHz bands.Later in this document you will find an overview of countries in which additionalrestrictions or requirementsor both are applicable.The requirements for any country may evolve. Linksysrecommends that you check with the local authorities forthe latest status of their national regulations for both the2,4-GHz wireless LANs.Overview of Regulatory Requirements for Wireless LANsFrequency Band (MHz)Max Power Level (EIRP) (mW)IndoorONLYIndoor & Outdoor2400-2483.5100X The following countries have restrictions and/orrequirements in addition to those given in the tablelabeled “Overview of Regulatory Requirements forWireless LANs”:
Appendix E Regulatory Information26FranceFor 2,4 GHz, the product should not be used outdoorsin the band 2454 - 2483,5 MHz. There are no restrictionswhen used in other parts of the 2,4 GHz band when usedindoors. Check http://www.arcep.fr/ for more details.Pour la bande 2,4 GHz, l’ équipement ne doit pas être utiliséen extérieur dans la bande 2454 - 2483,5 MHz. Il n’y a pas derestrictions pour des utilisations en intérieur dans d’autresparties de la bande 2,4GHz. Consultez http://www.arcep.fr/ pour de plus amples détails.Applicable Power Levels in FranceLocation Frequency Range (MHz) Power (EIRP)Indoor(No restrictions)2400-2483.5100 mW (20 dBm)Outdoor2400-24542454-2483.5100 mW (20 dBm)10 mW (10 dBm)ItalyThis product meets the National Radio Interface andthe requirements specified in the National FrequencyAllocation Table for Italy. Unless this 2,4-GHz wireless LANproduct is operating within the boundaries of the owner’sproperty, its use requires a “general authorization”. Pleasecheck http://www.comunicazioni.it/it/ for more details.Questo prodotto è conforme alla specifiche di InterfacciaRadio Nazionali e rispetta il Piano Nazionale di ripartizionedelle frequenze in Italia. Se non viene installato all’internodel proprio fondo, l’utilizzo di prodotti Wireless LAN a2,4 GHz richiede una “Autorizzazione Generale”. Consultarehttp://www.comunicazioni.it/it/ per maggiori dettagli.LatviaThe outdoor usage of the 2,4 GHz band requires anauthorization from the Electronic Communications Office.Please check http://www.esd.lv for more details.2,4 GHz frekveču joslas izmantošanai ārpus telpāmnepieciešama atļauja no Elektronisko sakaru direkcijas.Vairāk informācijas: http://www.esd.lv.Notes: Although Norway, Switzerland and Liechtenstein are1.not EU member states, the EU Directive 1999/5/EC hasalso been implemented in those countries.The regulatory limits for maximum output power are2.specified in EIRP. The EIRP level of a device can becalculated by adding the gain of the antenna used(specified in dBi) to the output power available at theconnector (specified in dBm).Product Usage RestrictionsThis product is designed for indoor usage only. Outdoorusage is not recommended, unless otherwise noted.2,4 GHz RestrictionsThis product is designed for use with the standard, integralor dedicated (external) antenna(s) that is/are shippedtogether with the equipment. However, some applicationsmay require the antenna(s), if removable, to be separatedfrom the product and installed remotely from the deviceby using extension cables. For these applications, Linksysoffers an R-SMA extension cable (AC9SMA) and an R-TNCextension cable (AC9TNC). Both of these cables are 9meters long and have a cable loss (attenuation) of 5 dB. Tocompensate for the attenuation, Linksys also offers highergain antennas, the HGA7S (with R-SMA connector) andHGA7T (with R-TNC connector). These antennas have again of 7 dBi and may only be used with either the R-SMAor R-TNC extension cable.Combinations of extension cables and antennas resultingin a radiated power level exceeding 100 mW EIRP areillegal.Third-Party Software or FirmwareThe use of software or firmware not supported/providedby Linksys may result that the equipment is no longercompliant with the regulatory requirements.Technical Documents on www.linksys.com/internationalFollow these steps to access technical documents:Enter http://www.linksys.com/international in your1.web browser.Select the country or region in which you live.2.Click the3.Products tab.Select the appropriate product category.4.Select the product sub-category, if necessary.5.Select the product.6.Select the type of documentation you want from the7.More Information section. The document will openin PDF format if you have Adobe Acrobat installed onyour computer.NOTE: If you have questions regardingthe compliance of this product or youcannot find the information you need,please contact your local sales office or visitwww.linksys.com/international
Appendix E Regulatory Information27User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE)This document contains important information for userswith regards to the proper disposal and recycling of Linksys products. Consumers are required to comply withthis notice for all electronic products bearing the followingsymbol:English - Environmental Information for Customers inthe European UnionEuropean Directive 2002/96/EC requires that the equipment bearing this symbol  on the product and/or its packaging must not be disposed of with unsorted municipal waste. The symbol indicates that this product should be disposed of separately from regular household waste streams. It is your responsibility to dispose of this and other electric and electronic equipment via designated collection facilities appointed by the government or local authorities. Correct disposal and recycling will help prevent potential negative consequences to the environment and human health. For more detailed information about the disposal of your old equipment, please contact your local authorities, waste disposal service, or the shop where you purchased the product.Български (Bulgarian) - Информация относноопазването на околната среда за потребители вЕвропейския съюзЕвропейска директива 2002/96/EC изисква уредите, носещи този символ   върху изделието и/или опаковката му, да несе изхвърля т с несортирани битови отпадъци. Символът обозначава, че изделието трябва да се изхвърля отделно от сметосъбирането на обикновените битови отпадъци. Ваша е отговорността този и другите електрически и електронни уреди да се изхвърлят в предварително определени от държавните или общински органи специализирани пунктове за събиране. Правилното изхвърляне и рециклиране ще спомогнат да се предотвратят евентуални вредни за околната среда и здравето на населението последствия. За по-подробна информация относно изхвърлянето на вашите стари уреди се обърнете към местните власти, службите за сметосъбиране или магазина, от който сте закупили уреда.Ceština (Czech)-Informace o ochraně životníhoprostředí pro zákazníky v zemích Evropské unieEvropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem  na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem. Tento symbol udává, že daný produkt musí být likvidován odděleně od běžného komunálního odpadu. Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady. Správná likvidace a recyklace pomáhá předcházet potenciálním negativním dopadům na životní prostředí a lidské zdraví. Podrobnější informace o likvidaci starého vybavení si laskavě vyžádejte od místních úřadů, podniku zabývajícího se likvidací komunálních odpadů nebo obchodu, kde jste produkt zakoupili.Dansk (Danish) - Miljøinformation for kunder i EUEU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol  på produktet og/eller emballagen ikke må bortskaffes som usorteret kommunalt affald. Symbolet betyder, at dette produkt skal bortskaffes adskilt fra det almindelige husholdningsaffald. Det er dit ansvar at bortskaffe dette og andet elektrisk og elektronisk udstyr via bestemte indsamlingssteder udpeget af staten eller de lokale myndigheder. Korrekt bortskaffelse og genvinding vil hjælpe med til at undgå mulige skader for miljøet og menneskers sundhed. Kontakt venligst de lokale myndigheder, renovationstjenesten eller den butik, hvor du har købt produktet, angående mere detaljeret information om bortskaffelse af dit gamle udstyr.Deutsch (German) - Umweltinformation für Kundeninnerhalb der Europäischen UnionDie Europäische Richtlinie 2002/96/EC verlangt, dass technische Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit diesem Symbol versehen ist , nicht zusammen mit unsortiertemGemeindeabfall entsorgt werden darf. Das Symbol weist darauf hin, dass das Produkt von regulärem Haushaltmüll getrennt entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses Gerät und andere elektrische und elektronische Geräte über die dafür zuständigen und von der Regierung oder örtlichen Behörden dazu bestimmten Sammelstellen zu entsorgen. Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei, potentielle negative Folgen für Umwelt und die menschliche Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an die örtlichen Behörden oder städtischen Entsorgungsdienste oder an den Händler, bei dem Sie das Produkt erworben haben.
Appendix E Regulatory Information28Eesti (Estonian) - Keskkonnaalane informatsioonEuroopa Liidus asuvatele klientideleEuroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol ,keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike ametiasutuste poolt ette nähtud kogumispunktide kaudu. Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida võimalikke negatiivseid tagajärgi keskkonnale ning inimeste tervisele. Vanade seadmete kõrvaldamise kohta täpsema informatsiooni saamiseks võtke palun ühendust kohalike ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te toote ostsite.Español (Spanish) - Información medioambiental paraclientes de la Unión EuropeaLa Directiva 2002/96/CE de la UE exige que los equipos que lleven este símbolo  en el propio aparato y/o en su embalaje no deben eliminarse junto con otros residuos urbanos no seleccionados. El símbolo indica que el producto en cuestión debe separarse de los residuos domésticos convencionales con vistas a su eliminación. Es responsabilidad suya desechar este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición el gobierno y las autoridades locales. Al desechar y reciclar correctamente estos aparatos estará contribuyendo a evitar posibles consecuencias negativas para el medio ambiente y la salud de las personas. Si desea obtener información más detallada sobre la eliminación segura de su aparato usado, consulte a las autoridades locales, al servicio de recogida y eliminación de residuos de su zona o pregunte en la tienda donde adquirió el producto.ξλληνικά (Greek) - Στοιχεία περιβαλλοντικήςπροστασίας για πελάτες εντός της ΕυρωπαϊκήςΈνωσηςΗ Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίος φέρει αυτό το σύμβολο   στο προϊόν και/ή στη συσκευασία του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές. Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία. Για περισσότερες πληροφορίες σχετικά με την απόρριψη του παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο αγοράσατε το προϊόν.Français (French) - Informations environnementalespour les clients de l’Union européenneLa directive européenne 2002/96/CE exige que l’équipement sur lequel est apposé ce symbole   sur le produit et/ou sonemballage ne soit pas jeté avec les autres ordures ménagères. Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages. Il est de votre responsabilité de jeter ce matériel ainsi que tout autre matériel électrique ou électronique par les moyens de collecte indiqués par le gouvernement et les pouvoirs publics des collectivités territoriales. L’élimination et le recyclage en bonne et due forme ont pour but de lutter contre l’impact néfaste potentiel de ce type de produits sur l’environnement et la santé publique. Pour plus d’informations sur le mode d’élimination de votre ancien équipement, veuillez prendre contact avec les pouvoirs publics locaux, le service de traitement des déchets, ou l’endroit où vous avez acheté le produit.Italiano (Italian) - Informazioni relative all’ambienteper i clienti residenti nell’Unione EuropeaLa direttiva europea 2002/96/EC richiede che le apparecchiature contrassegnate con questo simbolo  sul prodotto e/o sull’imballaggio non siano smaltite insieme ai rifiuti urbani non differenziati. Il simbolo indica che questo prodotto non deve essere smaltito insieme ai normali rifiuti domestici. È responsabilità del proprietario smaltire sia questi prodotti sia le altre apparecchiature elettriche ed elettroniche mediante le specifiche strutture di raccolta indicate dal governo o dagli enti pubblici locali. Il corretto smaltimento ed il riciclaggio aiuteranno a prevenire conseguenze potenzialmente negative per l’ambiente e per la salute dell’essere umano. Per ricevere informazioni più dettagliate circa lo smaltimento delle vecchie apparecchiature in Vostro possesso, Vi invitiamo a contattare gli enti pubblici di competenza, il servizio di smaltimento rifiuti o il negozio nel quale avete acquistato il prodotto.Latviešu valoda (Latvian) - Ekoloģiska informācijaklientiem Eiropas Savienības jurisdikcijāDirektīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst izmest nešķirotā veidā kopā ar komunālajiem atkritumiem (tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo un citas elektriskas un elektroniskas ierīces izmest atkritumos, izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos un pārstrāde tiek veikta pareizi, tad mazinās iespējamais kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā, kur iegādājāties šo izstrādājumu.
Appendix E Regulatory Information29Lietuvškai (Lithuanian) - Aplinkosaugos informacija,skirta Europos Sąjungos vartotojamsEuropos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad ši ir kita elektros ar elektroninė įranga būtų šalinama per tam tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose įsigijote tą gaminį.Malti (Maltese) - Informazzjoni Ambjentali għal Klijentifl-Unjoni EwropeaId-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih is-simbolufuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika li dan il-prodott għandu jintrema separatament minn ma’ l-iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew il-ħanut minn fejn xtrajt il-prodott.Magyar (Hungarian) - Környezetvédelmi információ azeurópai uniós vásárlók számáraA 2002/96/EC számú európai uniós irányelv megkívánja, hogy azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán az alábbi címke   megjelenik, tilos a többi szelektálatlan lakossági hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott termék kidobásakor a szokványos háztartási hulladékelszállítási rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön felelõssége, hogy ezt, és más elektromos és elektronikus berendezéseit a kormányzati vagy a helyi hatóságok által kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ hulladékfeldolgozás segít a környezetre és az emberi egészségre potenciálisan ártalmas negatív hatások megelõzésében. Ha elavult berendezéseinek felszámolásához további részletes információra van szüksége, kérjük, lépjen kapcsolatba a helyi hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal üzlettel, ahol a terméket vásárolta.Nederlands (Dutch) - Milieu-informatie voor klantenin de Europese UnieDe Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die is voorzien van dit symbool  op het product of de verpakking, niet mag worden ingezameld met niet-gescheiden huishoudelijk afval. Dit symbool geeft aan dat het product apart moet worden ingezameld. U bent zelf verantwoordelijk voor de vernietiging van deze en andere elektrische en elektronische apparatuur via de daarvoor door de landelijke of plaatselijke overheid aangewezen inzamelingskanalen. De juiste vernietiging en recycling van deze apparatuur voorkomt mogelijke negatieve gevolgen voor het milieu en de gezondheid. Voor meer informatie over het vernietigen van uw oude apparatuur neemt u contact op met de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de winkel waar u het product hebt aangeschaft.Norsk (Norwegian) - Miljøinformasjon for kunder i EUEU-direktiv 2002/96/EF krever at utstyr med følgende symbol  avbildet på produktet og/eller pakningen, ikke må kastes sammen med usortert avfall. Symbolet indikerer at dette produktet skal håndteres atskilt fra ordinær avfallsinnsamling for husholdningsavfall. Det er ditt ansvar å kvitte deg med dette produktet og annet elektrisk og elektronisk avfall via egne innsamlingsordninger slik myndighetene eller kommunene bestemmer. Korrekt avfallshåndtering og gjenvinning vil være med på å forhindre mulige negative konsekvenser for miljø og helse. For nærmere informasjon om håndtering av det kasserte utstyret ditt, kan du ta kontakt med kommunen, en innsamlingsstasjon for avfall eller butikken der du kjøpte produktet.Polski (Polish) - Informacja dla klientów w UniiEuropejskiej o przepisach dotyczących ochronyśrodowiskaDyrektywa Europejska 2002/96/EC wymaga, aby sprzęt oznaczony symbolem  znajdującym się na produkcie i/lub jego opakowaniu nie był wyrzucany razem z innymi niesortowanymi odpadami komunalnymi. Symbol ten wskazuje, że produkt nie powinien być usuwany razem ze zwykłymi odpadami z gospodarstw domowych. Na Państwu spoczywa obowiązek wyrzucania tego i innych urządzeń elektrycznych oraz elektronicznych w punktach odbioru wyznaczonych przez władze krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób i jego recykling pomogą zapobiec potencjalnie negatywnym konsekwencjom dla środowiska i zdrowia ludzkiego. W celu uzyskania szczegółowych informacji o usuwaniu starego sprzętu, prosimy zwrócić się do lokalnych władz, służb oczyszczania miasta lub sklepu, w którym produkt został nabyty.
Appendix E Regulatory Information30Português (Portuguese) - Informação ambiental paraclientes da União EuropeiaA Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo  no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares. É da sua responsabilidade eliminar este e qualquer outro equipamento eléctrico e electrónico através das instalações de recolha designadas pelas autoridades governamentais ou locais. A eliminação e reciclagem correctas ajudarão a prevenir as consequências negativas para o ambiente e para a saúde humana. Para obter informações mais detalhadas sobre a forma de eliminar o seu equipamento antigo, contacte as autoridades locais, os serviços de eliminação de resíduos ou o estabelecimento comercial onde adquiriu o produto.Română (Romanian) - Informaţii de mediu pentruclienţii din Uniunea EuropeanăDirectiva europeană 2002/96/CE impune ca echipamentele care prezintă acest simbol   pe produs şi/sau pe ambalajul acestuia să nu fie casate împreună cu gunoiul menajer municipal. Simbolul indică faptul că acest produs trebuie să fie casat separat de gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi acest produs şi alte echipamente electrice şi electronice prin intermediul unităţilor de colectare special desemnate de guvern sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta la prevenirea potenţialelor consecinţe negative asupra sănătăţii mediului şi a oamenilor. Pentru mai multe informaţii detaliate cu privire la casarea acestui echipament vechi, contactaţi autorităţile locale, serviciul de salubrizare sau magazinul de la care aţi achiziţionat produsul.Slovenčina (Slovak) - Informácie o ochrane životnéhoprostredia pre zákazníkov v Európskej úniiPodľa európskej smernice 2002/96/ES zariadenie s týmto symbolom na produkte a/alebo jeho balení nesmie byť likvidované spolu s netriedeným komunálnym odpadom. Symbol znamená, že produkt by sa mal likvidovať oddelene od bežného odpadu z domácností. Je vašou povinnosťou likvidovať toto i ostatné elektrické a elektronické zariadenia prostredníctvom špecializovaných zberných zariadení určených vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia pomôže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia, obráťte sa, prosím, na miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili.Slovenčina (Slovene) - Okoljske informacije za strankev Evropski unijiEvropska direktiva 2002/96/EC prepoveduje odlaganje opreme, označene s tem simbolom   – na izdelku in/ali na embalaži – med običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba izdelek odvreči ločeno od preostalih gospodinjskih odpadkov. Vaša odgovornost je, da to in preostalo električno in elektronsko opremo odnesete na posebna zbirališča, ki jih določijo državne ustanove ali lokalna uprava. S pravilnim odlaganjem in recikliranjem boste preprečili morebitne škodljive vplive na okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer ste izdelek kupili.Suomi (Finnish) - Ympäristöä koskevia tietoja EU-alueen asiakkailleEU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä symboli  itse tuotteessa ja/tai sen pakkauksessa, laitteistoa ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana. Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet viemällä tuote tai tuotteet viranomaisten määräämään keräyspisteeseen. Laitteiston oikea hävittäminen estää mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä myymälästä, josta ostit tuotteen.Svenska (Swedish) - Miljöinformation för kunder iEuropeiska unionenDet europeiska direktivet 2002/96/EC kräver att utrustning med denna symbol  på produkten och/eller förpackningen inte får kastas med osorterat kommunalt avfall. Symbolen visar att denna produkt bör kastas efter att den avskiljts från vanligt hushållsavfall. Det faller på ditt ansvar att kasta denna och annan elektrisk och elektronisk utrustning på fastställda insamlingsplatser utsedda av regeringen eller lokala myndigheter. Korrekt kassering och återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten.WEB: For additional information, please visitwww.linksys.com/international
31Appendix F Software License AgreementAppendix F: Software License AgreementSoftware in Linksys ProductsThis product from Cisco-Linksys LLC or from one of itsaffiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco-Linksys K.K. (“Linksys”) contains software (includingfirmware) originating from Linksys and its suppliersand may also contain software from the open sourcecommunity. Any software originating from Linksys and itssuppliers is licensed under the Linksys Software LicenseAgreement contained at Schedule 1 below. You may alsobe prompted to review and accept that Linksys SoftwareLicense Agreement upon installation of the softwareAny software from the open source community is licensedunder the specific license terms applicable to that softwaremade available by Linksys atwww.linksys.com/gplygp or asprovided for in Schedules 2, 3 and 4 below.Where such specific license terms entitle you to the sourcecode of such software, that source code is upon requestavailable at cost from Linksys for at least three yearsfrom the purchase date of this product and may also beavailable for download fromwww.linksys.com/gplygp. Fordetailed license terms and additional information onopen source software in Linksys products please look atthe Linksys public web site at:www.linksys.com/gpl/ygporSchedules 2, 3 or 4 below as applicable.BY DOWNLOADING OR INSTALLING THE SOFTWARE,OR USING THE PRODUCT CONTAINING THE SOFTWARE,YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARELICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TOALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD,INSTALL OR USE THE SOFTWARE. YOU MAY RETURNUNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIEDAS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT)FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINALPURCHASE, SUBJECT TO THE RETURN PROCESS ANDPOLICIES OF THE PARTY FROM WHICH YOU PURCHASEDSUCH PRODUCT OR SOFTWARE.Software LicensesThe software Licenses applicable to software from Linksysare made available at the Linksys public web site at:www.linksys.comy. For your convenience of reference, acopy of the Linksys Software License Agreement and themain open source code licenses used by Linksys in itsproducts are contained in the Schedules below.Schedule 1 - Linksys Software License AgreementTHIS LICENSE AGREEMENT IS BETWEEN YOU ANDCISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCOSYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYSK.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OFCISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLINGTHE SOFTWARE, OR USING THE PRODUCT CONTAININGTHE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BYTHIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESETERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USETHE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHERPRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUNDUP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TOTHE RETURN PROCESS AND POLICIES OF THE PARTY FROMWHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.License.Subject to the terms and conditions of thisAgreement, Linksys grants the original end user purchaserof the Linksys product containing the Software (“You”)a nonexclusive license to use the Software solely asembedded in or (where authorized in the applicabledocumentation) for communication with such product.This license may not be sublicensed, and is not transferableexcept to a person or entity to which you transferownership of the complete Linksys product containingthe Software, provided you permanently transfer all rightsunder this Agreement and do not retain any full or partialcopies of the Software, and the recipient agrees to theterms of this Agreement.“Software” includes, and this Agreement will apply to(a)the software of Linksys or its suppliers provided in orwith the applicable Linksys product, excluding technologyfrom the open source community, and (b) any upgrades,updates, bug fixes or modified versions (“Upgrades”) orbackup copies of the Software supplied to You by Linksysor an authorized reseller, provided you already hold avalid license to the original software and have paid anyapplicable fee for the Upgrade.Protection of Information. The Software anddocumentation contain trade secrets and/or copyrightedmaterials of Linksys or its suppliers. You will not copyor modify the Software or decompile, decrypt, reverseengineer or disassemble the Software (except to theextent expressly permitted by law notwithstanding thisprovision), and You will not disclose or make availablesuch trade secrets or copyrighted material in any formto any third party. Title to and ownership of the Softwareand documentation and any portion thereof, will remainsolely with Linksys or its suppliers.Collection and Processing of Information. You agree thatLinksys and/or its affiliates may, from time to time, collectand process information about your Linksys product and/or the Software and/or your use of either in order (i) toenable Linksys to offer you Upgrades; (ii) to ensure that
32Appendix F Software License Agreementyour Linksys product and/or the Software is being used inaccordance with the terms of this Agreement; (iii) to provideimprovements to the way Linksys delivers technology toyou and to other Linksys customers; (iv) to enable Linksysto comply with the terms of any agreements it has withany third parties regarding your Linksys product and/orSoftware and/or (v) to enable Linksys to comply with allapplicable laws and/or regulations, or the requirementsof any regulatory authority or government agency.Linksys and/ or its affiliates may collect and processthis information provided that it does not identify youpersonally. Your use of your Linksys product and/or theSoftware constitutes this consent by you to Linksys and/or its affiliates’ collection and use of such information and,for EEA customers, to the transfer of such information to alocation outside the EEA.Software Upgrades etc.If the Software enables you toreceive Upgrades, you may elect at any time to receivethese Upgrades either automatically or manually. If youelect to receive Upgrades manually or you otherwiseelect not to receive or be notified of any Upgrades, youmay expose your Linksys product and/or the Softwareto serious security threats and/or some features withinyour Linksys product and/or Software may becomeinaccessible. There may be circumstances where weapply an Upgrade automatically in order to comply withchanges in legislation, legal or regulatory requirementsor as a result of requirements to comply with the termsof any agreements Linksys has with any third partiesregarding your Linksys product and/or the Software. Youwill always be notified of any Upgrades being deliveredto you. The terms of this license will apply to any suchUpgrade unless the Upgrade in question is accompaniedby a separate license, in which event the terms of thatlicense will apply.Open Source Software.The GPL or other open sourcecode incorporated into the Software and the open sourcelicense for such source code are available for free downloadat http://www.linksys.com/gplpygp. If You would like a copyof the GPL or other open source code in this Software on aCD, Linksys will mail to You a CD with such code for $9.99plus the cost of shipping, upon request.Term and Termination. You may terminate this Licenseat any time by destroying all copies of the Softwareand documentation. Your rights under this License willterminate immediately without notice from Linksys if Youfail to comply with any provision of this Agreement.Limited Warranty. The warranty terms and periodspecified in the applicable Linksys Product User Guideshall also apply to the Software.Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS ORITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OFCAUSE (INCLUDING NEGLIGENCE), ARISING OUT OFOR RELATED TO THE USE OF OR INABILITY TO USE THESOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OFTHE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILLLINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOUFOR THE PRODUCT. The foregoing limitations will applyeven if any warranty or remedy under this Agreement failsof its essential purpose. Some jurisdictions do not allowthe exclusion or limitation of incidental or consequentialdamages, so the above limitation or exclusion may notapply to You.Export. Software, including technical data, may be subjectto U.S. export control laws and regulations and/or exportor import regulations in other countries. You agree tocomply strictly with all such laws and regulations.U.S. Government Users.The Software and documentationqualify as “commercial items” as defined at 48 C.F.R. 2.101and 48 C.F.R. 12.212. All Government users acquire theSoftware and documentation with only those rightsherein that apply to non-governmental customers.General Terms. This Agreement will be governed by andconstrued in accordance with the laws of the State of California, without reference to conflict of laws principles.The United Nations Convention on Contracts for theInternational Sale of Goods will not apply. If any portionof this Agreement is found to be void or unenforceable,the remaining provisions will remain in full force andeffect. This Agreement constitutes the entire agreementbetween the parties with respect to the Software andsupersedes any conflicting or additional terms containedin any purchase order or elsewhere.END OF SCHEDULE 1Schedule 2If this Linksys product contains open source softwarelicensed under Version 2 of the “GNU General PublicLicense” then the license terms below in this Schedule 2will apply to that open source software. The license termsbelow in this Schedule 2 are from the public web site athttp://www.gnu.org/copyleft/gpl.htmlpggpygpGNU GENERAL PUBLIC LICENSEVersion 2, June 1991Copyright © 1989, 1991 Free Software Foundation, Inc.51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,USAEveryone is permitted to copy and distribute verbatimcopies of this license document, but changing it is notallowed.PreambleThe licenses for most software are designed to take awayyour freedom to share and change it. By contrast, the
33Appendix F Software License AgreementGNU General Public License is intended to guarantee yourfreedom to share and change free software–to make surethe software is free for all its users. This General PublicLicense applies to most of the Free Software Foundation’ssoftware and to any other program whose authorscommit to using it. (Some other Free Software Foundationsoftware is covered by the GNU Lesser General PublicLicense instead.) You can apply it to your programs, too.When we speak of free software, we are referring tofreedom, not price. Our General Public Licenses aredesigned to make sure that you have the freedom todistribute copies of free software (and charge for thisservice if you wish), that you receive source code or canget it if you want it, that you can change the software oruse pieces of it in new free programs; and that you knowyou can do these things.To protect your rights, we need to make restrictions thatforbid anyone to deny you these rights or to ask you tosurrender the rights. These restrictions translate to certainresponsibilities for you if you distribute copies of thesoftware, or if you modify it.For example, if you distribute copies of such a program,whether gratis or for a fee, you must give the recipientsall the rights that you have. You must make sure that they,too, receive or can get the source code. And you mustshow them these terms so they know their rights.We protect your rights with two steps: (1) copyright thesoftware, and (2) offer you this license which gives youlegal permission to copy, distribute and/or modify thesoftware. Also, for each author’s protection and ours, we want tomake certain that everyone understands that there is nowarranty for this free software. If the software is modifiedby someone else and passed on, we want its recipientsto know that what they have is not the original, so thatany problems introduced by others will not reflect on theoriginal authors’ reputations.Finally, any free program is threatened constantly bysoftware patents. We wish to avoid the danger thatredistributors of a free program will individually obtainpatent licenses, in effect making the program proprietary.To prevent this, we have made it clear that any patent mustbe licensed for everyone’s free use or not licensed at all.The precise terms and conditions for copying, distributionand modification follow.TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATIONThis License applies to any program or other work 0.which contains a notice placed by the copyrightholder saying it may be distributed under the termsof this General Public License. The “Program”, below,refers to any such program or work, and a “work based on the Program” means either the Programor any derivative work under copyright law: that isto say, a work containing the Program or a portionof it, either verbatim or with modifications and/or translated into another language. (Hereinafter,translation is included without limitation in the term“modification”.) Each licensee is addressed as “you”.Activities other than copying, distribution andmodification are not covered by this License; theyare outside its scope. The act of running the Programis not restricted, and the output from the Program iscovered only if its contents constitute a work based onthe Program (independent of having been made byrunning the Program). Whether that is true dependson what the Program does.You may copy and distribute verbatim copies of the1.Program’s source code as you receive it, in any medium,provided that you conspicuously and appropriatelypublish on each copy an appropriate copyrightnotice and disclaimer of warranty; keep intact all thenotices that refer to this License and to the absenceof any warranty; and give any other recipients of theProgram a copy of this License along with the Program.You may charge a fee for the physical act of transferringa copy, and you may at your option offer warrantyprotection in exchange for a fee.You may modify your copy or copies of the Program2.or any portion of it, thus forming a work based on theProgram, and copy and distribute such modificationsor work under the terms of Section 1 above, providedthat you also meet all of these conditions:You must cause the modified files to carrya.prominent notices stating that you changed thefiles and the date of any change.You must cause any work that you distribute orb.publish, that in whole or in part contains or isderived from the Program or any part thereof, to belicensed as a whole at no charge to all third partiesunder the terms of this License.
34Appendix F Software License AgreementIf the modified program normally reads commandsc.interactively when run, you must cause it, whenstarted running for such interactive use in the mostordinary way, to print or display an announcementincluding an appropriate copyright notice anda notice that there is no warranty (or else, sayingthat you provide a warranty) and that users mayredistribute the program under these conditions,and telling the user how to view a copy of this License. (Exception: if the Program itself isinteractive but does not normally print such anannouncement, your work based on the Programis not required to print an announcement.)These requirements apply to the modified work asa whole. If identifiable sections of that work are notderived from the Program, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part of a whole which is a work based onthe Program, the distribution of the whole must be onthe terms of this License, whose permissions for otherlicensees extend to the entire whole, and thus to eachand every part regardless of who wrote it.Thus, it is not the intent of this section to claim rightsor contest your rights to work written entirely by you;rather, the intent is to exercise the right to control thedistribution of derivative or collective works based onthe Program. In addition, mere aggregation of another work notbased on the Program with the Program (or with awork based on the Program) on a volume of a storageor distribution medium does not bring the other work under the scope of this License. You may copy and distribute the Program (or a3.work based on it, under Section 2) in object code orexecutable form under the terms of Sections 1 and 2above provided that you also do one of the following:Accompany it with the complete correspondinga.machine-readable source code, which must bedistributed under the terms of Sections 1 and 2above on a medium customarily used for softwareinterchange; or, Accompany it with a written offer, valid for at leastb.three years, to give any third party, for a chargeno more than your cost of physically performingsource distribution, a complete machine-readablecopy of the corresponding source code, to bedistributed under the terms of Sections 1 and 2above on a medium customarily used for softwareinterchange; or, Accompany it with the information you received asc.to the offer to distribute corresponding source code.(This alternative is allowed only for noncommercialdistribution and only if you received the programin object code or executable form with such anoffer, in accord with Subsection b above.)The source code for a work means the preferred formof the work for making modifications to it. For anexecutable work, complete source code means allthe source code for all modules it contains, plus anyassociated interface definition files, plus the scriptsused to control compilation and installation of theexecutable. However, as a special exception, the sourcecode distributed need not include anything that isnormally distributed (in either source or binary form)with the major components (compiler, kernel, and soon) of the operating system on which the executableruns, unless that component itself accompanies theexecutable.If distribution of executable or object code is madeby offering access to copy from a designated place,then offering equivalent access to copy the sourcecode from the same place counts as distribution of the source code, even though third parties are notcompelled to copy the source along with the objectcode.You may not copy, modify, sublicense, or distribute4.the Program except as expressly provided underthis License. Any attempt otherwise to copy, modify,sublicense or distribute the Program is void, and willautomatically terminate your rights under this License.However, parties who have received copies, or rights,from you under this License will not have their licensesterminated so long as such parties remain in fullcompliance.You are not required to accept this License, since you5.have not signed it. However, nothing else grants youpermission to modify or distribute the Program or itsderivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifyingor distributing the Program (or any work based on theProgram), you indicate your acceptance of this Licenseto do so, and all its terms and conditions for copying,distributing or modifying the Program or works basedon it. Each time you redistribute the Program (or any work 6.based on the Program), the recipient automaticallyreceives a license from the original licensor to copy,distribute or modify the Program subject to theseterms and conditions. You may not impose any furtherrestrictions on the recipients’ exercise of the rightsgranted herein. You are not responsible for enforcingcompliance by third parties to this License.
35Appendix F Software License AgreementIf, as a consequence of a court judgment or allegation7.of patent infringement or for any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions of this License, they donot excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence youmay not distribute the Program at all. For example,if a patent license would not permit royalty-freeredistribution of the Program by all those who receivecopies directly or indirectly through you, then the onlyway you could satisfy both it and this License would beto refrain entirely from distribution of the Program.If any portion of this section is held invalid orunenforceable under any particular circumstance,the balance of the section is intended to apply andthe section as a whole is intended to apply in othercircumstances.It is not the purpose of this section to induce you toinfringe any patents or other property right claims orto contest validity of any such claims; this section hasthe sole purpose of protecting the integrity of the freesoftware distribution system, which is implementedby public license practices. Many people havemade generous contributions to the wide range of software distributed through that system in relianceon consistent application of that system; it is up tothe author/donor to decide if he or she is willing todistribute software through any other system and alicensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence of the rest of thisLicense.If the distribution and/or use of the Program is8.restricted in certain countries either by patents or bycopyrighted interfaces, the original copyright holderwho places the Program under this License may add anexplicit geographical distribution limitation excludingthose countries, so that distribution is permitted onlyin or among countries not thus excluded. In such case,this License incorporates the limitation as if written inthe body of this License. The Free Software Foundation may publish revised9.and/or new versions of the General Public Licensefrom time to time. Such new versions will be similar inspirit to the present version, but may differ in detail toaddress new problems or concerns.Each version is given a distinguishing version number.If the Program specifies a version number of thisLicense which applies to it and “any later version”, youhave the option of following the terms and conditionseither of that version or of any later version publishedby the Free Software Foundation. If the Program doesnot specify a version number of this License, youmay choose any version ever published by the FreeSoftware Foundation.If you wish to incorporate parts of the Program into10.other free programs whose distribution conditions aredifferent, write to the author to ask for permission. Forsoftware which is copyrighted by the Free SoftwareFoundation, write to the Free Software Foundation; wesometimes make exceptions for this. Our decision willbe guided by the two goals of preserving the free statusof all derivatives of our free software and of promotingthe sharing and reuse of software generally.NO WARRANTYBECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,11.THERE IS NO WARRANTY FOR THE PROGRAM, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THEPROGRAM “AS IS” WITHOUT WARRANTY OF ANYKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE PROGRAM IS WITH YOU.SHOULD THE PROGRAM PROVE DEFECTIVE, YOUASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR12.AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,OR ANY OTHER PARTY WHO MAY MODIFY AND/ORREDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANYGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIALDAMAGES ARISING OUT OF THE USE OR INABILITY TOUSE THE PROGRAM (INCLUDING BUT NOT LIMITED TOLOSS OF DATA OR DATA BEING RENDERED INACCURATEOR LOSSES SUSTAINED BY YOU OR THIRD PARTIES ORA FAILURE OF THE PROGRAM TO OPERATE WITH ANYOTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHERPARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.END OF TERMS AND CONDITIONSEND OF SCHEDULE 2Schedule 3If this Linksys product contains open source softwarelicensed under Version 2.1 of the “GNU Lesser General PublicLicense” then the license terms below in this Schedule 3will apply to that open source software. The license termsbelow in this Schedule 3 are from the public web site athttp://www.gnu.org/licenses/old-licenses/lgpl-2.1.htmlpgg gp.
36Appendix F Software License AgreementGNU LESSER GENERAL PUBLIC LICENSEVersion 2.1, February 1999Copyright (C) 1991, 1999 Free Software Foundation, Inc.51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,USAEveryone is permitted to copy and distribute verbatimcopies of this license document, but changing it is notallowed.[This is the first released version of the Lesser GPL. It alsocounts as the successor of the GNU Library Public License,version 2, hence the version number 2.1.]PreambleThe licenses for most software are designed to take awayyour freedom to share and change it. By contrast, the GNUGeneral Public Licenses are intended to guarantee yourfreedom to share and change free software—to makesure the software is free for all its users.This license, the Lesser General Public License, applies tosome specially designated software packages—typicallylibraries—of the Free Software Foundation and otherauthors who decide to use it. You can use it too, but wesuggest you first think carefully about whether this licenseor the ordinary General Public License is the better strategyto use in any particular case, based on the explanationsbelow.When we speak of free software, we are referring tofreedom of use, not price. Our General Public Licensesare designed to make sure that you have the freedomto distribute copies of free software (and charge for thisservice if you wish); that you receive source code or canget it if you want it; that you can change the software anduse pieces of it in new free programs; and that you areinformed that you can do these things.To protect your rights, we need to make restrictions thatforbid distributors to deny you these rights or to ask youto surrender these rights. These restrictions translate tocertain responsibilities for you if you distribute copies of the library or if you modify it.For example, if you distribute copies of the library,whether gratis or for a fee, you must give the recipientsall the rights that we gave you. You must make sure thatthey, too, receive or can get the source code. If you link other code with the library, you must provide completeobject files to the recipients, so that they can relink themwith the library after making changes to the library andrecompiling it. And you must show them these terms sothey know their rights.We protect your rights with a two-step method: (1) wecopyright the library, and (2) we offer you this license,which gives you legal permission to copy, distribute and/or modify the library.To protect each distributor, we want to make it very clearthat there is no warranty for the free library. Also, if thelibrary is modified by someone else and passed on, therecipients should know that what they have is not theoriginal version, so that the original author’s reputationwill not be affected by problems that might be introducedby others.Finally, software patents pose a constant threat to theexistence of any free program. We wish to make surethat a company cannot effectively restrict the users of a free program by obtaining a restrictive license from apatent holder. Therefore, we insist that any patent licenseobtained for a version of the library must be consistentwith the full freedom of use specified in this license.Most GNU software, including some libraries, is coveredby the ordinary GNU General Public License. This license,the GNU Lesser General Public License, applies to certaindesignated libraries, and is quite different from theordinary General Public License. We use this license forcertain libraries in order to permit linking those librariesinto non-free programs.When a program is linked with a library, whetherstatically or using a shared library, the combination of the two is legally speaking a combined work, a derivativeof the original library. The ordinary General PublicLicense therefore permits such linking only if the entirecombination fits its criteria of freedom. The Lesser GeneralPublic License permits more lax criteria for linking othercode with the library.We call this license the “Lesser” General Public Licensebecause it does Less to protect the user’s freedom thanthe ordinary General Public License. It also providesother free software developers Less of an advantage overcompeting non-free programs. These disadvantages arethe reason we use the ordinary General Public Licensefor many libraries. However, the Lesser license providesadvantages in certain special circumstances.For example, on rare occasions, there may be a specialneed to encourage the widest possible use of a certainlibrary, so that it becomes a de-facto standard. To achievethis, non-free programs must be allowed to use the library.A more frequent case is that a free library does the samejob as widely used non-free libraries. In this case, there islittle to gain by limiting the free library to free softwareonly, so we use the Lesser General Public License.In other cases, permission to use a particular library in non-free programs enables a greater number of people to usea large body of free software. For example, permission touse the GNU C Library in non-free programs enables manymore people to use the whole GNU operating system, aswell as its variant, the GNU/Linux operating system.Although the Lesser General Public License is Lessprotective of the users’ freedom, it does ensure that theuser of a program that is linked with the Library has the
37Appendix F Software License Agreementfreedom and the wherewithal to run that program using amodified version of the Library.The precise terms and conditions for copying, distributionand modification follow. Pay close attention to thedifference between a “work based on the library” and a“work that uses the library”. The former contains codederived from the library, whereas the latter must becombined with the library in order to run.GNU LESSER GENERAL PUBLIC LICENSETERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATIONThis License Agreement applies to any software library0.or other program which contains a notice placed bythe copyright holder or other authorized party sayingit may be distributed under the terms of this LesserGeneral Public License (also called “this License”). Eachlicensee is addressed as “you”. A “library” means a collection of software functionsand/or data prepared so as to be conveniently linkedwith application programs (which use some of thosefunctions and data) to form executables.The “Library”, below, refers to any such software libraryor work which has been distributed under these terms.A “work based on the Library” means either the Libraryor any derivative work under copyright law: that is tosay, a work containing the Library or a portion of it,either verbatim or with modifications and/or translatedstraightforwardly into another language. (Hereinafter,translation is included without limitation in the term“modification”.)“Source code” for a work means the preferred form of the work for making modifications to it. For a library,complete source code means all the source code forall modules it contains, plus any associated interfacedefinition files, plus the scripts used to controlcompilation and installation of the library.Activities other than copying, distribution andmodification are not covered by this License; they areoutside its scope. The act of running a program usingthe Library is not restricted, and output from such aprogram is covered only if its contents constitute awork based on the Library (independent of the useof the Library in a tool for writing it). Whether that istrue depends on what the Library does and what theprogram that uses the Library does.You may copy and distribute verbatim copies of the1.Library’s complete source code as you receive it, inany medium, provided that you conspicuously andappropriately publish on each copy an appropriatecopyright notice and disclaimer of warranty; keepintact all the notices that refer to this License and tothe absence of any warranty; and distribute a copy of this License along with the Library.You may charge a fee for the physical act of transferringa copy, and you may at your option offer warrantyprotection in exchange for a fee.You may modify your copy or copies of the Library or2.any portion of it, thus forming a work based on theLibrary, and copy and distribute such modificationsor work under the terms of Section 1 above, providedthat you also meet all of these conditions:The modified work must itself be a softwarea)library.You must cause the files modified to carryb)prominent notices stating that you changed thefiles and the date of any change.You must cause the whole of the work to bec)licensed at no charge to all third parties under theterms of this License.If a facility in the modified Library refers to a functiond)or a table of data to be supplied by an applicationprogram that uses the facility, other than as anargument passed when the facility is invoked, thenyou must make a good faith effort to ensure that,in the event an application does not supply suchfunction or table, the facility still operates, andperforms whatever part of its purpose remainsmeaningful.(For example, a function in a library to computesquare roots has a purpose that is entirely well-defined independent of the application. Therefore,Subsection 2d requires that any application-supplied function or table used by this functionmust be optional: if the application does not supplyit, the square root function must still computesquare roots.)These requirements apply to the modified work asa whole. If identifiable sections of that work are notderived from the Library, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, donot apply to those sections when you distributethem as separate works. But when you distributethe same sections as part of a whole which is awork based on the Library, the distribution of thewhole must be on the terms of this License, whosepermissions for other licensees extend to the entirewhole, and thus to each and every part regardlessof who wrote it.
38Appendix F Software License AgreementThus, it is not the intent of this section to claimrights or contest your rights to work written entirelyby you; rather, the intent is to exercise the right tocontrol the distribution of derivative or collectiveworks based on the Library.In addition, mere aggregation of another work not based on the Library with the Library (or witha work based on the Library) on a volume of astorage or distribution medium does not bring theother work under the scope of this License.You may opt to apply the terms of the ordinary GNU3.General Public License instead of this License to agiven copy of the Library. To do this, you must alter allthe notices that refer to this License, so that they referto the ordinary GNU General Public License, version2, instead of to this License. (If a newer version thanversion 2 of the ordinary GNU General Public Licensehas appeared, then you can specify that versioninstead if you wish.) Do not make any other change inthese notices.Once this change is made in a given copy, it isirreversible for that copy, so the ordinary GNU GeneralPublic License applies to all subsequent copies andderivative works made from that copy.This option is useful when you wish to copy part of thecode of the Library into a program that is not a library.You may copy and distribute the Library (or a portion4.or derivative of it, under Section 2) in object code orexecutable form under the terms of Sections 1 and2 above provided that you accompany it with thecomplete corresponding machine-readable sourcecode, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily usedfor software interchange.If distribution of object code is made by offeringaccess to copy from a designated place, then offeringequivalent access to copy the source code from thesame place satisfies the requirement to distributethe source code, even though third parties are notcompelled to copy the source along with the objectcode.A program that contains no derivative of any portion5.of the Library, but is designed to work with the Libraryby being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is nota derivative work of the Library, and therefore fallsoutside the scope of this License.However, linking a “work that uses the Library” withthe Library creates an executable that is a derivativeof the Library (because it contains portions of theLibrary), rather than a “work that uses the library”. Theexecutable is therefore covered by this License. Section6 states terms for distribution of such executables.When a “work that uses the Library” uses material froma header file that is part of the Library, the object codefor the work may be a derivative work of the Libraryeven though the source code is not. Whether this istrue is especially significant if the work can be linkedwithout the Library, or if the work is itself a library. Thethreshold for this to be true is not precisely defined bylaw.If such an object file uses only numerical parameters,data structure layouts and accessors, and small macrosand small inline functions (ten lines or less in length),then the use of the object file is unrestricted, regardlessof whether it is legally a derivative work. (Executablescontaining this object code plus portions of the Librarywill still fall under Section 6.)Otherwise, if the work is a derivative of the Library, youmay distribute the object code for the work under theterms of Section 6. Any executables containing thatwork also fall under Section 6, whether or not they arelinked directly with the Library itself.As an exception to the Sections above, you may also6.combine or link a “work that uses the Library” with theLibrary to produce a work containing portions of theLibrary, and distribute that work under terms of yourchoice, provided that the terms permit modificationof the work for the customer’s own use and reverseengineering for debugging such modifications.You must give prominent notice with each copy of the work that the Library is used in it and that theLibrary and its use are covered by this License. Youmust supply a copy of this License. If the work duringexecution displays copyright notices, you must includethe copyright notice for the Library among them, aswell as a reference directing the user to the copy of thisLicense. Also, you must do one of these things:Accompany the work with the completea)corresponding machine-readable source codefor the Library including whatever changes wereused in the work (which must be distributedunder Sections 1 and 2 above); and, if the work is an executable linked with the Library, with thecomplete machine-readable “work that uses theLibrary”, as object code and/or source code, so thatthe user can modify the Library and then relink to produce a modified executable containing themodified Library. (It is understood that the userwho changes the contents of definitions files in theLibrary will not necessarily be able to recompile theapplication to use the modified definitions.)
39Appendix F Software License AgreementUse a suitable shared library mechanism for linkingb)with the Library. A suitable mechanism is one that(1) uses at run time a copy of the library alreadypresent on the user’s computer system, rather thancopying library functions into the executable, and(2) will operate properly with a modified version of the library, if the user installs one, as long as themodified version is interface-compatible with theversion that the work was made with.Accompany the work with a written offer, validc)for at least three years, to give the same user thematerials specified in Subsection 6a, above, for acharge no more than the cost of performing thisdistribution.If distribution of the work is made by offering accessd)to copy from a designated place, offer equivalentaccess to copy the above specified materials fromthe same place.Verify that the user has already received a copy of e)these materials or that you have already sent thisuser a copy.For an executable, the required form of the “work thatuses the Library” must include any data and utilityprograms needed for reproducing the executable fromit. However, as a special exception, the materials to bedistributed need not include anything that is normallydistributed (in either source or binary form) with themajor components (compiler, kernel, and so on) of theoperating system on which the executable runs, unlessthat component itself accompanies the executable.It may happen that this requirement contradicts thelicense restrictions of other proprietary libraries thatdo not normally accompany the operating system.Such a contradiction means you cannot use boththem and the Library together in an executable thatyou distribute.You may place library facilities that are a work based7.on the Library side-by-side in a single library togetherwith other library facilities not covered by this License,and distribute such a combined library, provided thatthe separate distribution of the work based on theLibrary and of the other library facilities is otherwisepermitted, and provided that you do these twothings:Accompany the combined library with a copy of thea)same work based on the Library, uncombined withany other library facilities. This must be distributedunder the terms of the Sections above.Give prominent notice with the combined library of b)the fact that part of it is a work based on the Library,and explaining where to find the accompanyinguncombined form of the same work.You may not copy, modify, sublicense, link with, or8.distribute the Library except as expressly providedunder this License. Any attempt otherwise to copy,modify, sublicense, link with, or distribute the Libraryis void, and will automatically terminate your rightsunder this License. However, parties who have receivedcopies, or rights, from you under this License will nothave their licenses terminated so long as such partiesremain in full compliance.You are not required to accept this License, since you9.have not signed it. However, nothing else grants youpermission to modify or distribute the Library or itsderivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifyingor distributing the Library (or any work based on theLibrary), you indicate your acceptance of this Licenseto do so, and all its terms and conditions for copying,distributing or modifying the Library or works basedon it.Each time you redistribute the Library (or any work 10.based on the Library), the recipient automaticallyreceives a license from the original licensor to copy,distribute, link with or modify the Library subjectto these terms and conditions. You may not imposeany further restrictions on the recipients’ exercise of the rights granted herein. You are not responsiblefor enforcing compliance by third parties with thisLicense.If, as a consequence of a court judgment or allegation11.of patent infringement or for any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions of this License, they donot excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence you maynot distribute the Library at all. For example, if a patentlicense would not permit royalty-free redistribution of the Library by all those who receive copies directly orindirectly through you, then the only way you couldsatisfy both it and this License would be to refrainentirely from distribution of the Library.If any portion of this section is held invalid orunenforceable under any particular circumstance,the balance of the section is intended to apply, andthe section as a whole is intended to apply in othercircumstances.It is not the purpose of this section to induce you toinfringe any patents or other property right claims orto contest validity of any such claims; this section hasthe sole purpose of protecting the integrity of the freesoftware distribution system which is implementedby public license practices. Many people havemade generous contributions to the wide range of
40Appendix F Software License Agreementsoftware distributed through that system in relianceon consistent application of that system; it is up tothe author/donor to decide if he or she is willing todistribute software through any other system and alicensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence of the rest of thisLicense.If the distribution and/or use of the Library is restricted12.in certain countries either by patents or by copyrightedinterfaces, the original copyright holder who placesthe Library under this License may add an explicitgeographical distribution limitation excluding thosecountries, so that distribution is permitted only in oramong countries not thus excluded. In such case, thisLicense incorporates the limitation as if written in thebody of this License.The Free Software Foundation may publish revised13.and/or new versions of the Lesser General PublicLicense from time to time. Such new versions will besimilar in spirit to the present version, but may differ indetail to address new problems or concerns.Each version is given a distinguishing version number.If the Library specifies a version number of this Licensewhich applies to it and “any later version”, you have theoption of following the terms and conditions either of that version or of any later version published by the FreeSoftware Foundation. If the Library does not specify alicense version number, you may choose any versionever published by the Free Software Foundation.If you wish to incorporate parts of the Library into14.other free programs whose distribution conditions areincompatible with these, write to the author to ask forpermission. For software which is copyrighted by theFree Software Foundation, write to the Free SoftwareFoundation; we sometimes make exceptions forthis. Our decision will be guided by the two goals of preserving the free status of all derivatives of our freesoftware and of promoting the sharing and reuse of software generally.NO WARRANTYBECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE,15.THERE IS NO WARRANTY FOR THE LIBRARY, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THELIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULDTHE LIBRARY PROVE DEFECTIVE, YOU ASSUME THECOST OF ALL NECESSARY SERVICING, REPAIR ORCORRECTION.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW16.OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFYAND/OR REDISTRIBUTE THE LIBRARY AS PERMITTEDABOVE, BE LIABLE TO YOU FOR DAMAGES,INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL ORCONSEQUENTIAL DAMAGES ARISING OUT OF THEUSE OR INABILITY TO USE THE LIBRARY (INCLUDINGBUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BYYOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARYTO OPERATE WITH ANY OTHER SOFTWARE), EVEN IFSUCH HOLDER OR OTHER PARTY HAS BEEN ADVISEDOF THE POSSIBILITY OF SUCH DAMAGES.END OF TERMS AND CONDITIONSEND OF SCHEDULE 3Schedule 4If this Linksys product contains open source softwarelicensed under the OpenSSL license:This product includes software developed by theOpenSSL Project for use in the OpenSSL Toolkit.(http://www.openssl.org/ppg).This product includes cryptographic software written byEric Young (eay@cryptsoft.com).This product includes software written by Tim Hudson(tjh@cryptsoft.com).In addition, if this Linksys product contains opensource software licensed under the OpenSSL licensethen the license terms below in this Schedule 3 willapply to that open source software. The license termsbelow in this Schedule 3 are from the public web site athttp://www.openssl.org/source/license.htmlppg.The OpenSSL toolkit stays under a dual license, i.e. boththe conditions of the OpenSSL License and the originalSSLeay license apply to the toolkit. See below for theactual license texts. Actually both licenses are BSD-styleOpen Source licenses. In case of any license issues relatedto OpenSSL please contact openssl-core@openssl.org.
41Appendix F Software License AgreementOpenSSL LicenseCopyright © 1998-2007 The OpenSSL Project. All rightsreserved.Redistribution and use in source and binary forms, withor without modification, are permitted provided that thefollowing conditions are met:Redistributions of source code must retain the above1.copyright notice, this list of conditions and thefollowing disclaimer.Redistributions in binary form must reproduce the2.above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/orother materials provided with the distribution.All advertising materials mentioning features or3.use of this software must display the followingacknowledgment: “This product includes softwaredeveloped by the OpenSSL Project for use in theOpenSSL Toolkit. (http://www.openssl.org/ppg)”The names “OpenSSL Toolkit” and “OpenSSL Project” 4.must not be used to endorse or promote productsderived from this software without prior writtenpermission. For written permission, please contactopenssl-core@openssl.org.Products derived from this software may not be called5.“OpenSSL” nor may “OpenSSL” appear in their nameswithout prior written permission of the OpenSSLProject.Redistributions of any form whatsoever must retain6.the following acknowledgment: “This product includessoftware developed by the OpenSSL Project for use inthe OpenSSL Toolkit (http://www.openssl.org/ppg)”THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BELIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTEGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OROTHERWISE) ARISING IN ANY WAY OUT OF THE USE OFTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OFSUCH DAMAGE.This product includes cryptographic software written byEric Young (eay@cryptsoft.com). This product includessoftware written by Tim Hudson (tjh@cryptsoft.com).Original SSLeay LicenseCopyright © 1995-1998 Eric Young (eay@cryptsoft.com)Allrights reserved.This package is an SSL implementation written by EricYoung (eay@cryptsoft.com).The implementation was written so as to conform withNetscape’s SSL.This library is free for commercial and non-commercialuse as long as the following conditions are adhered to.The following conditions apply to all code found in thisdistribution, be it the RC4, RSA, lhash, DES, etc., code; notjust the SSL code. The SSL documentation included withthis distribution is covered by the same copyright termsexcept that the holder is Tim Hudson (tjh@cryptsoft.com).Copyright remains Eric Young’s, and as such any Copyrightnotices in the code are not to be removed.If this package is used in a product, Eric Young should begiven attribution as the author of the parts of the libraryused. This can be in the form of a textual message atprogram startup or in documentation (online or textual)provided with the package.Redistribution and use in source and binary forms, withor without modification, are permitted provided that thefollowing conditions are met:Redistributions of source code must retain the1.copyright notice, this list of conditions and thefollowing disclaimer.Redistributions in binary form must reproduce the2.above copyright notice, this list of conditions and thefollowing disclaimer in the documentation and/orother materials provided with the distribution.All advertising materials mentioning features or3.use of this software must display the followingacknowledgement:“This product includes cryptographic software writtenby Eric Young (eay@cryptsoft.com)”The word ‘cryptographic’ can be left out if the routinesfrom the library being used are not cryptographicrelated.If you include any Windows specific code (or a derivative4.thereof) from the apps directory (application code)you must include an acknowledgement: “This productincludes software written by Tim Hudson (tjh@cryptsoft.com)”THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” ANDANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THEAUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
42Appendix F Software License AgreementDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License.]END OF SCHEDULE 4  You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. FCC RF Radiation Exposure Statement: 1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.  REMARK˜˘˘˘ʳˋ˃˅ˁ˄˄˵ʳ̂̅ʳˋ˃˅ˁ˄˄˺ʳ̂̃˸̅˴̇˼̂́ʳ̂˹ʳ̇˻˼̆ʳ̃̅̂˷̈˶̇ʳ˼́ʳ̇˻˸ʳ˨ˁ˦ˁ˔ˁʳ˼̆ʳ˹˼̅̀̊˴̅˸ˀ˿˼̀˼̇˸˷ʳ̇̂ʳ˶˻˴́́˸˿̆ʳ˄ʳ̇˻̅̂̈˺˻ʳ˄˄ˁϘOperation is subject to the following two conditions:(1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.” REMARK IEEE 802.11b or 802.11g operation of this product in the Canada is firmware-limited to channels 1 through 11. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference and (2) this device must accept any interference received, including interference that may cause undesired operation

Navigation menu