LINKSYS WUSB54GCV2 802.11 b/g Wireless USB Dongle User Manual
LINKSYS LLC 802.11 b/g Wireless USB Dongle
LINKSYS >
User manual
USER GUIDE
11G USB Wireless Adapter
WUSB54GC V2
About This Guide
i
About
T
h
i
s
G
u
i
de
Icon Descri
p
tions
W
hile reading through the User Guide you may see
various icons that call attention to speci
f
ic items. Below is
a
description o
f
these icons
:
NOTE: Thi
s
c
h
ec
k m
a
rk in
d
i
cates
t
h
at
t
h
e
r
e
i
s
a note of interest and is something that
y
ou
sh
ou
ld
pa
y
specia
l
attention to w
h
i
l
e using t
h
e
p
roduct
.
WARNING: This exclamation point indicates
that there is a caution or warnin
g
and it is
s
omet
h
ing t
h
at cou
ld
d
amage
y
our propert
y
or
product
.
WEB: T
h
is g
l
o
b
e icon in
d
icates a notewort
hy
w
ebs
i
te
add
r
ess
o
r
e
-m
a
il
add
r
ess.
O
nline Res
ou
rce
s
W
e
b
site a
dd
resses in t
h
is
d
ocument are
l
iste
d
wit
h
out
h
ttp:// in
f
r
o
n
t
of
t
h
e
add
r
ess
because
m
ost
cu
rr
e
n
t
w
eb
b
rowsers do not require it. If you use an older web browser,
y
ou ma
y
h
ave to a
dd
h
ttp:/
/
in front of the web address
.
Resource Website
L
in
k
s
y
s www.
l
in
k
s
y
s.co
m
L
in
k
s
y
s Internationa
l
www.
l
in
k
s
y
s.com/internationa
l
G
l
ossar
y
www.
l
in
k
s
y
s.com/g
l
ossar
y
N
etwor
k
Securit
y
www.
l
in
k
s
y
s.com/securit
y
Copyright and Trademarks
L
in
k
s
y
s, Cisco an
d
t
h
e Cisco Logo are
re
g
istered trademarks or trademarks
o
f Cisco Systems, Inc. and/or its
a
ff
iliates in the U.S. and certain other
c
ountries. Copyright © 2008 Cisco
Systems, Inc. All rights reserved.
Ot
h
er
b
ran
d
s an
d
pro
d
uct names are
trademarks or re
g
istered trademarks
o
f their res
p
ective holders
.
Table of Contents
ii
Chapter 1: Product Overview 3
LEDs ......................................................3
Chapter 2: Wireless Security Checklist 4
General Network Security Guidelines .................................4
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 3: Advanced Conguration 5
How to Access the Wireless Network Monitor............................5
How to Use the Wireless Network Monitor..............................5
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Proles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A: Troubleshooting 17
Appendix B: Wi-Fi Protected Setup 18
Appendix C: Specications 20
Appendix D: Warranty Information 21
Limited Warranty..............................................21
Appendix E: Regulatory Information 23
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Safety Notices................................................23
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) . .24
Wireless Equipment (Wireless-N/G/A/B Products) . . . . . . . . . . . . . . . . . . . . . . . . .25
CE Marking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
National Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Product Usage Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Technical Documents on www.linksys.com/international . . . . . . . . . . . . . . . . . . . .26
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) ..............................27
Appendix F: Software License Agreement 31
Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Chapter 1 Product Overview
3
Ch
apter 1:
P
ro
d
uct Overview
T
hank
y
ou
f
or choosing the Compact Wireless-G USB
A
dapter. The Adapter connects to your PC via a USB port,
leaving your PC’s slots available for other purposes. The
A
dapter also lets
y
ou connect with an
y
o
f
the growing
n
umber o
f
wireless hotspots in public places such as
coffee sho
p
s, air
p
orts, hotels and convention centers. With
t
h
is A
d
apter,
y
our wire
l
ess networ
k
ing experience can
b
e
faste
r
a
n
d
eas
i
e
r
t
h
a
n
e
v
e
r
.
LE
D
s
Link
(
Green) The LED flashes when there is
w
ire
l
ess networ
k
activit
y.
Chapter 2 Wireless Security Checklist
4
Ch
apter 2:
Wire
l
ess Securit
y
C
h
ec
kl
is
t
W
ire
l
ess networ
k
s are convenient an
d
eas
y
to insta
ll
, so
homes with hi
g
h-speed Internet access are adoptin
g
them
a
t a rapid pace. Because wireless networking operates by
sending in
f
ormation over radio waves, it can be more
v
u
ln
e
r
ab
l
e
to
in
t
r
ude
r
s
t
h
a
n
a
t
r
ad
i
t
i
o
n
a
l wir
ed
n
et
w
o
rk
.
Like signals from your cellular or cordless phones, signals
f
rom
y
our wireless network can also be intercepted. Since
you cannot physically prevent someone
f
rom connecting
to your wireless network, you need to take some additional
steps to
k
eep
y
our networ
k
secure.
1. Change the default wireless
network name or SSID
W
ireless devices have a default wireless network name
or Service Set Identi
f
ier (SSID) set b
y
the
f
actor
y
. This
i
s the name o
f
your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use
l
in
k
s
y
s as the de
f
ault wireless network name. You
should chan
g
e the wireless network name to somethin
g
u
nique to distinguish your wireless network from other
wire
l
ess networ
k
s t
h
at ma
y
exist aroun
d
y
ou,
b
ut
d
o not
u
se personal in
f
ormation (such as your Social Security
n
umber) because this information may be available for
a
n
y
one to see when browsing
f
or wireless networks.
2. Change the default password
For wire
l
ess pro
d
ucts suc
h
as access points, routers, an
d
gateways, you will be asked
f
or a password when you
want to change their settings. These devices have a default
p
assword set b
y
the
f
actor
y
. The Links
y
s de
f
ault password
is
ad
min. Hackers know these de
f
aults and may try to
u
se them to access your wireless device and change your
n
etwor
k
settings. To t
h
wart an
y
unaut
h
orize
d
c
h
anges,
customize the device’s password so it will be hard to
guess.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to
enable Media Access Control (MAC) address
f
iltering. The
MAC address is a unique series o
f
numbers and letters
a
ssigned to every networking device. With MAC address
f
iltering enabled, wireless network access is provided
solely
f
or wireless devices with speci
f
ic MAC addresses.
For example, you can specify the MAC address of each
computer in
y
our
h
ome so t
h
at on
ly
t
h
ose computers can
a
ccess your wireless network.
4. Enable encryption
Encr
y
ption protects
d
ata transmitte
d
over a wire
l
ess
n
etwork. Wi-Fi Protected Access
(
WPA/WPA2
)
and Wired
Equivalency Privacy (WEP) offer different levels of security
f
or wireless communication
.
A
network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
u
ses d
y
namic ke
y
encr
y
ption. To protect the in
f
ormation
a
s it passes over the airwaves, you should enable the
highest level of encryption supported by your networ
k
equ
i
pment.
W
EP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
Genera
l
Networ
k
Securit
y
Gui
d
e
l
ine
s
W
ireless network security is useless if the underlying
n
etwor
k
is not secure.
Password protect all computers on the network and
s
i
ndividually password protect sensitive files
.
C
h
ange passwor
d
s on a regu
l
ar
b
asis
.
s
Install anti-virus so
f
tware and personal
f
irewall
s
software.
Disable
f
ile sharing (peer-to-peer). Some applications
s
m
ay open
f
ile sharing without your consent and/or
knowledge.
Additional Security Tip
s
Keep wireless routers, access points, or gateways away
s
f
rom exterior walls and windows
.
T
urn wire
l
ess routers, access points, or gatewa
y
s
s
o
ff
when they are not being used (at night, during
vacations)
.
Use strong passp
h
rases t
h
at are at
l
east eig
h
t c
h
aracters
s
i
n len
g
th. Combine letters and numbers to avoid usin
g
standard words that can be found in the dictionary.
WEB: F
o
r m
o
r
e
in
fo
rm
at
i
o
n
o
n wir
e
l
ess
s
ecurity, visit www.linksys.com/security
Chapter 3 Advanced Configuration
5
Ch
apter 3:
A
dvanced Configuration
A
dvanced con
f
iguration is per
f
ormed through the Wireless
Network Monitor
(
the Monitor
)
. Use it to check the status
i
nformation, search for available wireless networks, or
create pro
f
iles that hold di
ff
erent con
f
iguration settings
.
Diagnostics is per
f
ormed through the Diagnostic utility.
Use it to detect the Ada
p
ter, test the driver and Monitor,
a
nd troubleshoot i
f
needed
.
H
o
w t
o
Access t
h
e Wire
l
ess Netw
o
r
k
M
on
i
to
r
Af
ter installing the Adapter, the Monitor icon appears in
the system tray o
f
your computer. I
f
the Monitor is enabled,
the icon is green. If the Monitor is disabled or the Adapter
i
s not inserte
d
, t
h
e icon is gra
y.
W
ire
l
ess Networ
k
Monitor Icon
Double-click the icon to o
p
en the Monitor
.
How to Use the Wireless Network Monitor
T
he opening screen o
f
the Monitor is the
S
tatus
s
c
reen
.
From this screen, you can
f
ind out how strong the current
w
ire
l
ess signa
l
is an
d
h
ow goo
d
t
h
e connection’s qua
l
ity
i
s.
C
li
c
kM
o
r
e
In
fo
rm
at
i
o
n
to
vi
e
w
add
i
t
i
o
n
a
l
status
i
nformation about the current connection. To search for
a
vai
l
a
bl
e wire
l
ess networ
k
s
,
c
l
ic
k
t
h
e
C
onnec
t
ta
b
. To
p
er
f
orm con
f
i
g
uration chan
g
es or create connection
p
rofiles, click the
P
rofiles ta
b.
S
tatus
T
h
e
Status
screen displays network mode, signal strength,
a
nd link quality information about the current connection.
C
l
ic
k
M
ore In
f
ormatio
n
f
or additional status in
f
ormation
.
Status
Signal Strength T
h
e Signa
l
Strengt
h
b
ar in
d
icates signa
l
stren
g
th.
Link Quality The Link Quality bar indicates the quality o
f
t
h
e wire
l
ess networ
k
connection
.
More Information
C
li
ck
M
o
r
e
In
fo
rm
at
i
o
n
to
vi
e
w
a
dditional information about the wireless networ
k
connection on t
h
e
W
ire
l
ess Networ
k
Statu
s
s
c
reen.
Wi-Fi Protected Setup
C
li
c
k
t
h
e
Wi-Fi Protected Setu
p
b
utton
t
o connect to a router that su
pp
orts Wi-Fi
Protecte
d
Setup. Procee
d
to Appen
d
ix B, “Wi-Fi Protecte
d
S
etu
p
”.
NOTE: The Wi-Fi Protected Setup feature is not
a
v
a
i
lable
o
n
all
W
US
B
5
4G
C
Wireless Netw
o
rk St
a
t
us
T
h
e
Wir
e
l
ess
N
et
w
o
rk
Status
screen
p
rovides information
on
y
our current networ
k
settings
.
Wir
e
l
ess
N
et
w
o
rk
Status
Wireless Network Name This is the unique name (SSID)
o
f
t
h
e
wir
e
l
ess
n
et
w
o
rk
.
V2 models.
Chapter 3 Advanced Configuration
6
Wireless Mode
T
his is the mode of the wireless networ
k
current
ly
in use
.
Standard Channel This is the channel used by your
wireless network
.
Security
T
his is the status o
f
the wireless securit
y
f
eature.
Authentication This is your wireless network’s
a
uthentication method
.
Network Type
Th
is is t
h
e wire
l
ess networ
k
t
y
pe
.
IP Address This is the IP Address o
f
the Adapter.
Subnet Mask This is the Ada
p
ter’s Subnet Mask
.
Default Gateway This is the De
f
ault Gatewa
y
address
.
DNS1 This is the DNS address o
f
the Ada
p
ter
.
MAC Address
T
his is the MAC address of the wireless
n
etwor
k
’s wire
l
ess router or access point
.
Signal Strength The Si
g
nal Stren
g
th bar indicates the
signal strength.
Link Quality The Link Qualit
y
bar indicates the qualit
y
o
f
t
h
e
wir
e
l
ess
n
et
w
o
rk
co
nn
ect
i
o
n
.
Statistics
C
lic
k
Statistic
s
to go to the Wireless Network
S
tatistics
s
c
reen
.
Back
C
li
c
k
Back
to return to the initial
k
Status
sc
r
ee
n
.
Save to Profile
C
lic
k
Save to Profile to save the currently
a
ctive connection settings to a pro
f
ile
.
Wire
l
ess Networ
k
Statistics
Th
e Wire
l
ess Networ
k
s Statistic
s
screen provi
d
es statistics
on your current network settings
.
W
ir
e
l
ess
N
et
w
o
rk
Stat
i
st
i
cs
Transmit Rate Thi
s
i
s
t
h
e
data
t
r
a
n
s
mi
ss
i
o
n r
ate
of
the current connection. (In Auto mode, the Ada
p
ter
d
y
namicall
y
shifts to the fastest data transmission rate at
a
n
y
given time.
)
Receive Rate
Th
is is t
h
e rate t
h
at t
h
e A
d
apter receives
data.
Packets Received
Th
is s
h
ows t
h
e
p
ac
k
ets t
h
at t
h
e
A
dapter receives, in real time, a
f
ter connectin
g
to the
wireless network or after clickin
g
Refresh
.
Packets Transmitted T
h
is s
h
ows t
h
e
p
ac
k
ets t
h
at t
h
e
A
dapter transmits, in real time, a
f
ter connectin
g
to the
wireless network or after clickin
g
Refresh
.
Bytes Received T
h
is s
h
ows t
h
e
by
tes t
h
at t
h
e A
d
apter
r
eceives, in real time, a
f
ter connectin
g
to the wireless
n
etwork or after clickin
g
Refresh
.
Bytes Transmitted T
h
is s
h
ows t
h
e
by
tes t
h
at t
h
e A
d
apter
transmits, in real time, a
f
ter connectin
g
to the wireless
n
etwork or after clickin
g
Refresh
.
Driver Version
Th
is s
h
ows t
h
e A
d
a
p
ter’s
d
river version
.
Signal Strength This is the intensit
y
o
f
the wireless signal
that the Ada
p
ter receives
.
Transmit Power
Th
is is t
h
e
p
ower out
p
ut at w
h
ic
h
t
h
e
Ad
apter transmits.
Signal Strength The Si
g
nal Stren
g
th bar indicates the
signa
l
strengt
h
.
Link Quality
T
he Link Qualit
y
bar indicates the qualit
y
o
f
t
h
e
wir
e
l
ess
n
et
w
o
rk
co
nn
ect
i
o
n
.
Back C
l
ic
k
Back
to return to the initial
k
Statu
s
s
creen.
Status
Cl
i
ck
Status
to
g
o to t
h
e Wir
eless
N
et
w
o
r
k
Status
sc
r
ee
n
.
Save to Profile C
l
ic
k
Save to Profil
e
to save t
h
e current
ly
a
ctive connection settin
g
s to a pro
f
ile.
Refresh
C
li
ck
Re
fr
esh
to u
p
date the statistics.
Chapter 3 Advanced Configuration
7
Connec
t
Th
e
C
onnec
t
screen displays a list of available networks
t
i
n
t
h
e
tab
l
e.
Th
e
tab
l
e
s
h
o
w
s
eac
h n
et
w
o
rk’
s
wir
e
l
ess
n
etwork name, radio band, signal strength, and security
m
et
h
o
d
. You ma
y
c
l
ic
k
t
h
e co
l
umn
h
ea
d
ing (Wire
l
ess
Network Name, GHz, Signal strength, or Security method)
to sort by that field
.
Co
nn
ect
Wireless Network Name T
h
is is t
h
e SSID or unique name
o
f
t
h
e
wir
e
l
ess
n
et
w
o
rk
.
GHz T
h
is is t
h
e ra
d
io
b
an
d
use
d
on t
h
e networ
k
. T
h
e
n
um
b
er 2.4 in
d
icates Wire
l
ess-B
,
-G
,
or -N (2.4 GHz).
(TBD - Is this
sti
ll
d
isp
l
a
y
e
d
? Not nee
d
e
d
since on
ly
b
an
d
is 2.4 GHz
)
Signal This is the percenta
g
e o
f
si
g
nal stren
g
th,
f
rom 0
to 100
%
.
Security
Th
is is t
h
e securit
y
met
h
o
d
use
d
by
t
h
e
net
w
o
r
k.
Wi-Fi Protected Setup
C
li
c
k
t
h
e
Wi-Fi Protected Setu
p
b
utton
t
o connect to a router t
h
at su
pp
orts Wi-Fi
Protecte
d
Setup. Procee
d
to Appen
d
ix B, “Wi-Fi Protecte
d
S
etu
p
”.
NOTE: The Wi-Fi Protected Setup
f
eature is not
a
v
a
il
ab
l
e
o
n
a
ll W
US
B
5
4G
C
Refresh
C
li
ck
Ref
r
es
h to
p
er
f
orm a new search
f
or
wire
l
ess
d
evices
.
Connect To connect to one o
f
the networks on the list
,
select the wireless network, and clic
k
Co
nn
ect
.
NOTE: The Wi-Fi Protected Setu
p
f
eature is not
avai
l
a
bl
e on a
ll
WUSB54GC
Procee
d
to t
h
e a
pp
ro
p
riate section,
“
Wire
l
ess Securit
y
Di
sable
d
”
or
“
W
i
r
eless
S
ecu
r
i
t
y
Ena
ble
d
”
.
Wireless Securit
y
Disable
d
If you connect to a network whose wireless security is
d
isa
bl
e
d
, t
h
en
y
ou wi
ll
view t
h
is screen
:
C
lick Connect Anyway
C
l
ic
k
1.
C
onnect An
y
wa
y
.
C
li
c
k
2.
Fini
sh
.
Congratulation
s
Congratu
l
ations! T
h
e A
d
apter is connecte
d
to t
h
e networ
k.
Wire
l
ess Security Ena
bl
e
d
I
f
y
ou connect to a network whose wireless securit
y
is
enabled, then you will view one of three screens
.
Proceed to the a
pp
ro
p
riate instructions below for the
1.
t
y
pe o
f
wireless securit
y
that the network is using:
WP
A2, W
P
A, or WE
P
.
V2 models.
V2 models.
Chapter 3 Advanced Configuration
8
W
PA2
(
Wi-Fi Protected Access 2
)
I
f
the network uses WPA2 Personal securit
y
, then the
WPA2-Personal Key Needed
f
or Connection
s
c
reen
appears
.
W
PA2-Personal Security
Passphrase
E
nter t
h
e networ
k
’s Passp
h
rase (a
l
so
called a pre-shared key) o
f
8-63 characters
.
T
o connect to t
h
e networ
k,
c
l
ic
k
C
onnect. To cance
l
t
h
e connection
,
c
l
ic
k
Cance
l
.
W
PA (Wi-Fi Protected Access
)
If the network uses WPA Personal security, then the
WPA-
P
ersonal Ke
y
Needed
f
or Connectio
n
s
c
reen
appears.
W
PA-Personal Securit
y
Passphrase
E
nter t
h
e networ
k
’s Passp
h
rase (a
l
so
called a pre-shared ke
y
) o
f
8-63 characters
.
T
o connect to the network, clic
k
Co
nn
ect
.
T
o
ca
n
ce
l
t
h
e connection
,
c
l
ic
k
Cance
l
.
W
EP (Wired Equivalent Privacy
)
I
f
the network uses WEP encr
y
ption, then the
W
EP Ke
y
o
r Pass
p
hrase Needed
f
or Connection
s
creen a
pp
ears.
WEP
S
ecurit
y
Passphrase
E
nter t
h
e Passp
h
rase or WEP
k
e
y.
T
he
p
ass
p
hrase is case-sensitive and must be 16 or
f
ewer al
p
hanumeric characters. It must match the
p
assphrase o
f
y
our other wireless network devices
a
nd is compatible with Linksys wireless products only.
(For non-Lin
k
sys wire
l
ess pro
d
ucts, enter t
h
e WEP
k
ey
m
anua
lly
.
)
I
f
you enter the network’s WEP key, enter the
app
ro
p
riate number of hexadecimal characters (“0” to
“
9” an
d
“A” to “F”). For 64-
b
it encr
y
ption, enter exact
ly
10
h
e
x
adec
im
a
l
c
h
a
r
acte
r
s.
F
o
r 12
8
-
b
it encryption,
enter exact
l
y 26
h
exa
d
ecima
l
c
h
aracters.
T
o connect to t
h
e networ
k,
c
l
ic
k
C
onnect. To cance
l
the connection, clic
k
Ca
n
cel
.
C
l
ic
k
2.
Finis
h
.
Con
g
ratulation
s
C
on
g
ratulations! The Adapter is connected to
t
h
e
n
et
w
o
rk
.
Chapter 3 Advanced Configuration
9
Pro
f
iles
Th
e
P
ro
f
iles screen lets
y
ou save di
ff
erent con
f
iguration
p
ro
f
iles
f
or di
ff
erent network setu
p
s. The table on the le
f
t
displays a list of available profiles with their profile names
a
n
d
wire
l
ess networ
k
names
.
P
ro
f
ile
s
Profile
T
his is the name of the
p
rofile
.
Wireless Network Name
Th
is is t
h
e SSID or uni
q
ue
na
m
e
of
t
h
e
wir
e
l
ess
n
et
w
o
rk
.
Pro
f
ile In
f
ormatio
n
For each pro
f
ile selected, the
f
ollowin
g
are listed
:
Wireless Mode Thi
s
i
s
t
h
e
m
ode
o
f
t
h
e
wir
e
l
ess
n
et
w
o
r
k
current
ly
in use
.
Standard Channel T
h
is is t
h
e c
h
anne
l
use
d
by
y
our
wir
e
l
ess
n
et
w
o
rk
.
Security
T
his is the status of the wireless securit
y.
Authentication This is the authentication settin
g
f
or the
net
w
o
rk
.
IP Address T
h
is is t
h
e met
h
o
d
use
d
by
t
h
e networ
k
to
a
ssi
g
n IP a
dd
resses.
Connect To connect to a wireless network usin
g
a
s
p
ecific
p
rofile, select the
p
rofile, and clic
k
C
onnect
.
New
Cl
i
ck
Ne
w to create a new pro
f
ile. See the next
section, “Create a New Profile,” for instructions
.
Edit
S
elect the profile
y
ou want to change and clic
k
E
d
i
t
.
Import
C
li
ck
Im
p
ort to im
p
ort a
p
rofile that is saved in
a
nother location. Select the a
pp
ro
p
riate file, and clic
k
O
pen
.
Export Select the profile you want to save in a different
l
ocation
,
an
d
c
l
ic
k
E
x
p
or
t
.
Direct Win
d
ows to t
h
e
a
ppropriate
f
older, and click
Sa
v
e
.
Delete Select the profile you want to delete and clic
k
De
l
ete
.
NOTE: If you want to export more than one
profile,
y
ou must export them one at a time
.
C
reate a New Pro
f
ile
Th
e next screen is t
h
eAvai
l
a
bl
e Wire
l
ess Networ
k
s
s
c
reen
.
A
vai
l
a
bl
e Wire
l
ess Networ
k
s
T
his screen provides two options for settin
g
up the
Ad
apter
.
Available Wireless Networks (For most users)
Use
th
i
s
option if you already have a network set up. The networks
a
vai
l
a
bl
e to t
h
is A
d
apter are
l
iste
d
on t
h
is screen. You
ca
n
c
h
oose
o
n
e
of
t
h
ese
n
et
w
o
rk
s
a
n
d
c
li
ck
Co
nn
ect
to
co
nn
ect
to
i
t.
C
li
ck
Re
fr
esh
to u
p
date the Available
W
ire
l
ess Networ
k
s
l
ist.
Advanced Setup
If
y
our network is not listed on this
screen, select Advanced Setu
p
to set u
p
the Ada
p
ter
m
anuall
y
. This method is for advanced users onl
y.
T
he setup
f
or each option is described, step b
y
step, under
the appropriate headin
g
on the followin
g
pa
g
es
.
Av
a
il
ab
le Wireless Netw
o
rks
T
h
e
a
v
a
il
ab
l
e
n
et
w
o
rk
s
a
r
e
li
sted
in
t
h
e
tab
l
e
o
n
t
h
e
ce
n
te
r
of the screen b
y
Wireless Network Name. Select the wireless
n
etwork
y
ou wish to connect to and clic
k
Co
nn
ect
. (I
f
y
ou
do not see your network listed, clic
k
Re
fr
esh
to brin
g
the
l
ist up again.)
Procee
d
to t
h
e appropriate section,
“
Wire
l
ess Securit
y
Disabled” or “Wireless Security Enabled”
.
Chapter 3 Advanced Configuration
10
Wireless Securit
y
Disable
d
If you connect to a network whose wireless security is
d
isa
bl
e
d
, t
h
en
y
ou wi
ll
view t
h
is screen
:
C
lick Connect Anyway
C
l
ic
k
1.
C
onnect An
y
wa
y
.
C
li
c
k
2.
Fini
sh
.
Congratulation
s
C
ongratu
l
ations! T
h
e A
d
apter is connecte
d
to
the
n
et
w
o
r
k.
Wireless Securit
y
Enable
d
If you connect to a network whose wireless security is
enabled, then
y
ou will view one of three screens
.
Proceed to the appropriate instructions below
f
or the
1.
type of wireless security that the network is using:
W
PA2
,
WPA
,
or WEP.
W
PA2 (Wi-Fi Protecte
d
Access 2)
I
f
the network uses WPA2 Personal security, then
th
e
W
PA2-Personal Ke
y
Needed for Connection screen
appears.
W
PA2-Persona
l
Securit
y
Passphrase
E
nter the network’s Pass
p
hrase (also
called a pre-shared ke
y
) of 8-63 characters
.
T
o connect to t
h
e networ
k,
c
l
ic
k
Co
nn
ect
.
T
o
ca
n
cel
the connection, clic
k
Ca
n
cel
.
W
PA
(
Wi-Fi Protecte
d
Access
)
I
f
the network uses WPA Personal securit
y
, then
t
h
e
W
PA-Personal Key Needed for Connectio
n
sc
r
ee
n
app
ears
.
W
PA-Persona
l
Securit
y
Passphrase
E
nter the network’s Pass
p
hrase (also
called a pre-shared ke
y
) of 8-63 characters
.
T
o connect to the network, clic
k
Co
nn
ect
.
T
o
ca
n
ce
l
the connection, clic
k
Ca
n
cel
.
Chapter 3 Advanced Configuration
11
W
EP (Wired Equivalent Privacy
)
I
f
the network uses WEP encr
y
ption, then the
W
EP Ke
y
o
r Passphrase Needed
f
or Connection
s
creen appears.
WEP
S
ecurit
y
Passphrase
E
nter t
h
e Passp
h
rase or WEP
k
e
y.
T
he
p
ass
p
hrase is case-sensitive and must be 16 or
f
ewer al
p
hanumeric characters. It must match the
p
assphrase o
f
y
our other wireless network devices
a
nd is compatible with Linksys wireless products only.
(For non-Lin
k
s
y
s wire
l
ess pro
d
ucts, enter t
h
e WEP
k
e
y
m
anua
lly
.
)
If you enter the network’s WEP key, enter the
app
ro
p
riate number of hexadecimal characters (“0” to
“
9” an
d
“A” to “F”). For 64-
b
it encr
y
ption, enter exact
ly
10
h
e
x
adec
im
a
l
c
h
a
r
acte
r
s.
F
o
r 12
8
-
b
it encryption,
enter exact
ly
26
h
exa
d
ecima
l
c
h
aracters.
T
o connect to t
h
e networ
k,
c
l
ic
k
Co
nn
ect
.
T
o
ca
n
cel
the connection, clic
k
Ca
n
cel
.
C
l
ic
k
2
.
Finis
h
.
Con
g
ratulation
s
C
on
g
ratulations! The Adapter is connected to
t
h
e
n
et
w
o
rk
.
Advanced Setu
p
I
f
your network is not listed with the available networks,
u
se Advanced Setu
p
.
A
v
a
il
ab
l
e
Wir
e
l
ess
N
et
w
o
rk
s
Cl
i
ck
1.
A
d
vance
d
Setu
p
o
n
the
Av
a
i
lable
Wir
eless
N
et
w
o
rk
s
screen to set up the Adapter manually
.
Th
e 2
.
N
etwor
k
Setting
s
screen a
pp
ears.
W
ir
e
l
ess
N
et
w
o
rk
I
f
y
our network has a router or other DHCP server, select
O
btain network settings automatically (DHCP
)
.
If
y
our network does not have a DHCP server or router,
se
l
ect
Speci
fy
network setting
s
. Enter an IP Address,
S
ubnet Mask, Default Gateway, and DNS addresses
a
ppropriate for
y
our network. You must specif
y
the
IP Address and Subnet Mask on this screen. I
f
y
ou are
u
nsure about the Default Gateway and DNS addresses,
leave these fields blank.
IP Address
–
This IP Address must be unique to
y
our network
.
Subnet Mask
–
T
h
e A
d
apter’s Su
b
net Mas
k
must
b
e
the same as
y
our wired network’s Subnet Mask
.
Chapter 3 Advanced Configuration
12
Default Gateway
–
Enter the IP address of your
networ
k
’s Gatewa
y
.
DNS 1 and DNS 2
–
Enter the DNS address o
f
your
wired Ethernet network
.
C
l
ic
k
N
ext to continue
,
or c
l
ic
k
Back
to return to the
k
prev
i
ous screen.
The
3.
Wireless Mode screen shows a choice of two
wire
l
ess mo
d
es
.
W
ire
l
ess Mo
d
e
Infrastructure Mode
–
Select this mode if you want
to connect to a wire
l
ess router or access
p
oint
.
Ad-Hoc Mode
–
Select this mode i
f
y
ou want to
c
onnect to another wireless device directly without
using a wire
l
ess router or access point
.
Wireless Network Name
–
E
n
te
r
a
wir
eless
n
et
w
o
r
k
n
ame (SSID) that must be used for all devices in
y
our wire
l
ess networ
k
. It is case-sensitive an
d
s
h
ou
ld
b
e a unique name to
h
e
l
p prevent ot
h
ers
f
rom entering your network
.
C
l
ic
k
N
ex
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
rev
i
ous screen
.
If you chose Infrastructure Mode, go to step 5 now.
4.
I
f
y
ou chose Ad-Hoc Mode, th
e
A
d
-Hoc Mo
d
e Settings
screen appears
.
NOTE:The Adapter only supports Ad-Hoc Mode
for 2.4 GHz networks: Wireless-B
,
Wireless-G
,
an
d
Wire
l
ess-N (usin
g
2.4 GHz)
.
A
d
-Hoc Mo
d
e Settings
Standard Channel
–
S
elect the correct channel
f
or
y
our wireless network. I
f
y
ou are unsure about
w
hich channel to use, kee
p
the de
f
ault, A
uto
.
C
lick Nex
t
to continue
,
or clic
k
Back
to return to the
k
p
rev
i
ous screen
.
I
f
your wireless network does not have wireless security,
5.
select
D
isable and then clic
k
Nex
t
to continue. Proceed
t
o step 6
.
Wire
l
ess Securit
y
If your wireless network has wireless security, select
the method of securit
y
used: WEP, WPA Personal,
W
PA2 Persona
l
, WPA Enterprise, WPA2 Enterprise, or
RADIUS. WEP stands for Wired Equivalent Privacy, and
W
PA stands for Wi-Fi Protected Access. WPA2 stands
Chapter 3 Advanced Configuration
13
f
or Wi-Fi Protected Access 2. WPA is a stronger security
m
et
h
o
d
t
h
an WEP. WPA2 is a stronger securit
y
met
h
o
d
t
h
a
n WPA
.
RADI
US
sta
n
ds
fo
r R
e
m
ote
A
ut
h
e
n
t
i
cat
i
o
n
Dial-In User Service. Clic
k
N
ex
t
to continue, or clic
k
Bac
k
to return to the previous screen.
k
Proceed to the section
f
or your security method
.
WEP
Make sure the settings you configure match the settings
o
f
y
our wireless network.
WEP
WEP
Se
l
ect
6
4-
b
i
t
o
r12
8
-
b
i
t
encryption
.
Passphrase
E
nter t
h
e networ
k
’s Pass
ph
rase, so a WEP
k
e
y
is automatica
lly
generate
d
. It is case-sensitive an
d
should not be lon
g
er than 16 alphanumeric characters.
T
his passphrase must match the passphrase of
y
our other
wire
l
ess networ
k
d
evices an
d
is compati
bl
e wit
h
Lin
k
s
y
s
wireless products only. (If you have any non-Linksys
wire
l
ess pro
d
ucts, enter t
h
e WEP
k
e
y
manua
lly
on t
h
ose
p
ro
d
ucts.
)
WEP Key
I
f you do not have the Passphrase, enter the
W
EP ke
y
of
y
our wireless network. For 64-bit encr
y
ption,
enter exact
ly
10
h
exa
d
ecima
l
c
h
aracters. For 128-
b
it
encryption, enter exactly 26 hexadecimal characters. Valid
h
exa
d
ecima
l
c
h
aracters are “0” to “9” an
d
“A” to “F”
.
Advanced User
s
TX Key The default is
1
. If your network’s wireless router
or access point uses transmit
k
e
y
num
b
er 2, 3, or 4, se
l
ect
the a
pp
ro
p
riate number
.
Authentication The default is Open Syste
m
.
For O
p
en
Sy
stem aut
h
entication, t
h
e sen
d
er an
d
t
h
e recipient
d
o
n
ot share a WEP key for authentication. For Shared Key
aut
h
entication,
b
ot
h
t
h
e sen
d
er an
d
t
h
e reci
p
ient s
h
are a
W
EP ke
y
f
or authentication
.
C
li
c
kN
e
x
t
to continue, or click
Back
to return to the
k
p
revious screen
.
WPA Personal
W
PA Personal offers two encryption methods, TKIP and
A
ES, wit
h
dy
namic encr
y
ption
k
e
y
s.
W
PA P
e
r
so
n
a
l
Encryption
Select
T
KIP
or
A
E
S
.
Passphrase
E
nter the network’s Pass
p
hrase (also called a
p
re-shared ke
y
) of 8-63 characters
.
Cl
i
ck
Ne
x
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
revious screen
.
WPA2 Personal
W
PA2 Persona
l
uses t
h
e encr
y
ption met
h
o
d
, AES, wit
h
dy
namic encr
y
ption
k
e
y
s
.
W
PA2 P
e
r
so
n
a
l
Passphrase
E
nter the network’s Passphrase (also called a
p
re-shared key) of 8-63 characters
.
C
l
ic
k
N
ex
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
rev
i
ous screen
.
Chapter 3 Advanced Configuration
14
WPA Enterprise
W
PA Enterprise features WPA security used in coordination
wit
h
a RADIUS server. (T
h
is s
h
ou
ld
on
ly
b
e use
d
w
h
en a
RADIUS server is connected to the router.) WPA Enter
p
rise
offers two authentication methods
,
EAP-TLS and PEAP
,
a
s we
ll
as two encr
y
ption met
h
o
d
s, TKIP an
d
AES, wit
h
dynamic encryption keys
.
Authentication Select the authentication method your
n
etwor
k
is using,
E
AP-TL
S
or
PEAP
.
EAP-TL
S
WPA Enter
p
rise - EAP-TL
S
I
f
y
ou selected EAP-TLS, con
f
igure the
f
ollowing
:
Login Name
E
nter the login name of your wireless
n
etwor
k.
Server Name En
te
r
t
h
e
n
a
m
e
of
t
h
e
aut
h
e
n
t
i
cat
i
o
n
se
rv
e
r
(this is o
p
tional)
.
Certificate Select the certificate
y
ou installed to
a
ut
h
enticate
y
ou on
y
our wire
l
ess networ
k
.
Encryption Select the type of encryption,
TKIP
o
r
A
E
S
.
C
l
ic
k
N
ex
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
rev
i
ous screen
.
PEA
P
WPA Enterprise - PEAP
If you selected PEAP, configure the following
:
Login Name
E
nter the login name of
y
our wireless
net
w
o
r
k.
Password Enter the password of your wireless network
.
Server Name Enter the name of the authentication server
(t
h
is is optiona
l
)
.
Certificate Select the certificate you installed to
a
uthenticate
y
ou on
y
our wireless network. If
y
ou want to
u
se an
y
certi
f
icate, keep the de
f
ault,
T
rust
A
n
y
.
Inner Authen.
Se
l
ect
t
h
e
aut
h
e
n
t
i
cat
i
o
n m
et
h
od
used
i
nsi
d
e t
h
e PEAP tunne
l.
Encryption Select the t
y
pe o
f
encr
y
ption,
T
KIP
or
A
E
S
.
C
li
c
kN
e
x
t
to continue, or clic
k
Back
to return to the
k
p
revious screen
.
W
P
A2 Enter
p
rise
W
PA2 Enterprise
f
eatures WPA2 securit
y
used in
coordination with a RADIUS server. (This should only be
u
se
d
w
h
en a RADIUS server is connecte
d
to t
h
e router.)
W
PA2 Enterprise o
ff
ers two authentication methods,
EAP
-
TLS and PEAP.
-
Authentication Se
l
ect t
h
e aut
h
entication met
h
o
d
y
our
n
etwor
k
is usin
g
,
E
AP-TL
S
or
PEAP
.
Chapter 3 Advanced Configuration
15
EAP-TL
S
WPA2 Enterprise - EAP-TL
S
If you selected EAP-TLS, configure the following
:
Login Name
E
nter the login name of
y
our wireless
net
w
o
r
k.
Server Name En
te
r
t
h
e
n
a
m
e
o
f
t
h
e
aut
h
e
n
t
i
cat
i
o
n
se
rv
e
r
(t
h
is is o
p
tiona
l
)
.
Certificate Select the certi
f
icate
y
ou installed to
a
uthenticate you on your wireless network.
C
l
ic
k
N
ex
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
rev
i
ous screen
.
PEAP
W
P
A2 Enter
p
rise -
P
EA
P
If
y
ou selected PEAP, configure the following
:
Login Name
E
nter the login name o
f
y
our wireless
net
w
o
rk
.
Password Enter the password of
y
our wireless network
.
Server Name En
te
r
t
h
e
n
a
m
e
of
t
h
e
aut
h
e
n
t
i
cat
i
o
n
se
rv
e
r
(this is o
p
tional)
.
Certificate Select the certificate you installed to
a
uthenticate
y
ou on
y
our wireless network. I
f
y
ou want to
u
se any certi
f
icate, keep the de
f
ault, Trust Any
.
Inner Authen. Select the authentication method used
i
nsi
d
e t
h
e PEAP tunne
l.
C
li
c
kN
e
x
t
to continue, or clic
k
Back
to return to the
k
p
revious screen
.
R
ADIU
S
RADIUS
f
eatures use o
f
a RADIUS server. (This should onl
y
b
e used when a RADIUS server is connected to the router.
)
RADIUS offers two authentication types: EAP-TLS and
PEAP
.
Authentication Select the authentication method your
n
etwork is using,
E
AP-TL
S
or
PEAP
.
EAP-TL
S
R
ADIUS - EAP-TL
S
If
y
ou selected EAP-TLS, configure the following
:
Login Name
E
nter the login name o
f
y
our wireless
net
w
o
rk
.
Server Name Enter the name of the authentication server
(t
h
is is optiona
l
)
.
Certificate Select the certificate you installed to
a
ut
h
enticate
y
ou on
y
our wire
l
ess networ
k
.
Cl
i
ck
Ne
x
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
revious screen
.
Chapter 3 Advanced Configuration
16
PEA
P
R
ADIU
S
- PEA
P
If you selected PEAP, configure the following
:
Login Name
E
nter the login name of
y
our wireless
net
w
o
r
k.
Password Enter the password of your wireless network
.
Server Name Enter the name of the authentication server
(t
h
is is optiona
l
)
.
Certificate Select the certificate you installed to
a
uthenticate
y
ou on
y
our wireless network. If
y
ou want to
u
se an
y
certi
f
icate, keep the de
f
ault,
T
rust
A
n
y
.
Inner Authen.
Se
l
ect
t
h
e
aut
h
e
n
t
i
cat
i
o
n m
et
h
od
used
i
nsi
d
e t
h
e PEAP tunne
l.
Cl
i
ck
Ne
x
t
to continue
,
or c
l
ic
k
Back
to return to the
k
p
revious screen
.
Th
e
6.
C
onfirm New Setting
s
screen a
pp
ears.
Con
f
irm New Settin
g
s
T
o save the new settin
g
s, clic
k
Sa
v
e
.
T
o
ed
i
t
t
h
e
n
e
w
settin
g
s, clic
k
Bac
k
.
To exit Advanced Setup throu
g
h
t
h
e Monitor
,
c
l
ic
k
Ex
it
.
T
he 7
.
C
ongratulation
s
screen a
pp
ears. Clic
k
C
onnect to
Networ
k
to implement the new settings immediately
k
a
n
d
r
etu
rn
to
t
h
e
Status
sc
r
ee
n
.
C
li
ck
R
etu
rn
to
Pr
of
il
es
screen
to keep the current settings active and return
to t
h
e
P
ro
f
iles
s
c
reen
.
Congratu
l
ation
s
Con
g
ratulations! The profile is
successfull
y
configured
.
Appendix A Troubleshooting
17
A
ppen
d
ix A:
Trou
bl
es
h
ootin
g
Y
our computer
d
oes not recognize t
h
e A
d
apter
.
Make sure that the Adapter is properly inserted into the
USB slot
.
T
h
e A
d
apter
d
oes not wor
k
proper
l
y
.
Remove the Ada
p
ter, and then reinsert it into the
com
p
uter’s USB slot.
Y
our computer cannot communicate wit
h
t
h
e ot
h
e
r
computers linked via Ethernet in the In
f
rastructure
conguration.
Ma
k
e sure t
h
at t
h
e computers are powere
d
on
.
1.
Make sure that the Adapter is con
f
i
g
ured with the
2.
same Wireless Network Name (SSID) and wireless
securit
y
settings as t
h
e ot
h
er wire
l
ess computers in
the In
f
rastructure con
f
i
g
uration.
WEB: If your questions are not addressed here,
r
efer to the Links
y
s website, www.
l
in
k
s
y
s.co
m
Appendix B Wi-Fi Protected Setup
18
A
ppen
d
ix B:
Wi-Fi Protecte
d
Setu
p
NOTE: Ma
k
e sure t
h
e router supports Wi-Fi
P
rotected Setu
p
.
Before you begin, make sure the router and the computer
wit
h
t
h
e A
d
apter are in t
h
e same room. T
h
en se
l
ect t
h
e
m
ethod that is most convenient
f
or
y
ou
.
Se
l
ect
a
M
et
h
od
Push Button (Recommended) Se
l
ect t
h
is option to use
the
p
ush button method
.
Use Adapter’s PIN number Se
l
ect t
h
is option to enter
t
h
e A
d
apter’s PIN num
b
er on t
h
e router
.
C
li
c
kN
e
x
t
to continue, or clic
k
Back
to return to the
k
p
rev
i
ous screen
.
Proceed to the instructions
f
or the method
y
ou selected
.
U
se the Push Button
U
se t
h
e Pus
h
Button
Press the
1.
Wi-Fi Protected Setu
p
button on the
r
outer.
W
ithin two minutes, click the
2.
Wi
-
Fi Protected Setu
p
b
utton on this screen.
Th
e A
d
apter connects to t
h
e networ
k.
3
.
Connecting to t
h
e Networ
k
C
li
c
k
4.
P
rin
t
to print out your wireless network settings.
Then click
Finish
k
to return to t
h
e
S
tatu
s
screen
,
or c
l
ic
k
Ex
it
to
e
xi
t
the
M
o
ni
to
r
.
Congratu
l
ation
s
C
on
g
ratulations! The Adapter is connected to
th
e networ
k
.
Appendix B Wi-Fi Protected Setup
19
E
nter the Adapter’s PIN Number
E
nter the PIN Number
A
ccess the web-based utilit
y
of the router. (Refer to the
5.
r
outer’s documentation
f
or instructions.
)
O
n
t
h
e
r
oute
r’
s
6.
Wi-Fi Protected Setu
p
screen, enter
t
h
e A
d
a
p
ter’s PIN num
b
er in t
he
PIN
field. Then click
N
Re
gi
ste
r
.
On the Ada
p
ter’s PIN number screen, clic
k
7.
Ne
x
t
.
E
n
te
r
t
h
e
PIN N
u
m
be
r
T
he Ada
p
ter connects to the network
.
8.
Connectin
g
to the Network
Cl
i
ck
9.
P
r
i
n
t
to print out
y
our wire
l
ess networ
k
settings.
Then click
Finish
k
to
r
etu
rn
to
t
h
e
Status
screen, or clic
k
Exi
t
to exit t
h
e Monitor
.
Con
g
ratulation
s
C
on
g
ratulations! The Adapter is connected to the
n
et
w
o
rk
.
Appendix C Specifications
20
A
ppen
d
ix C:
Sp
ecifications
Mo
d
e
l
Sta
n
da
r
ds
IEEE 802.11b, IEEE 802.11
g
, US
B
1
.
1
,
US
B
2
.
0
C
h
anne
ls
802.11
b
/ 802.11g
1
1 Channels (most o
f
North
,
Central, and South America)
1
3 Channels (most o
f
Europ
e
a
nd Asia
)
LE
D
s
Link
Protoco
l
s 802.11
b
: CCK
(
11 M
b
ps), DQPS
K
(
2
M
bps), DBPSK (
1
Mbps
)
802.11g: OFD
M
Receive Sensitivit
y
11
Mb
p
s @ -8
0
dBm (Typical)
5
4M
b
ps @ -6
5
d
Bm (T
y
pica
l)
S
ecurity Feature
s
W
E
P
Encryption, W
P
A, W
P
A
2
W
E
P
Key
B
its
6
4, 128-bit
Environmental
Dim
e
n
s
i
o
n
s
9
1 x 11 x 2
8
m
m
3.86
” x
0.
4
3
” x 1
.
1
0
”
W
eig
h
t 23 g (0.5 oz
)
Ce
r
t
i
cat
i
o
n
s
F
CC
, Wi-Fi,
CE
Operatin
g
Temp
.
0
to
4
5
º
C
S
torage Temp. -20 to 60º
C
Operating Humi
d
it
y
1
0 to 85%, Noncon
d
ensin
g
S
torage Humidit
y
5
to 90%, Noncondensin
g
WUSB54GC V2
Transmitted Power 802.11b:17.05 dBm for FCC
802.11g;18.38 dBm for FCC
802.11b;19.36 dBm for CE
802.11g;19.41 dBm for CE
Appendix D Warranty Information
21
A
ppen
d
ix D:
Warrant
y
Informatio
n
Limited Warrant
y
Linksys warrants that this Linksys hardware product will be
substantially free of defects in materials and workmanship
a
rising un
d
er norma
l
use
d
uring t
h
e Warrant
y
Perio
d
,
which begins on the date o
f
purchase by the original end
-
u
ser
p
urchaser and lasts for the
p
eriod s
p
ecified below
:
T
wo (2)
y
ears
f
or new produc
t
s
Ninety (90) days
f
or re
f
urbished produc
t
s
T
his limited warranty is non-transferable and extends only
to t
h
e origina
l
en
d
-user purc
h
aser. Your exc
l
usive reme
dy
a
nd Linksys’ entire liability under this limited warranty
will be for Linksys, at its option, to (a) repair the product
with new or re
f
urbished parts, (b) replace the product
with a reasonably available equivalent new or re
f
urbished
Linksys product, or (c) refund the purchase price of the
p
ro
d
uct
l
ess an
y
re
b
ates. An
y
repaire
d
or rep
l
acement
p
roducts will be warranted
f
or the remainder o
f
the
original Warranty Period or thirty (30) days, whichever is
l
onger. A
ll
pro
d
ucts an
d
/or parts t
h
at are rep
l
ace
d
b
ecome
the property o
f
Linksys
.
T
his limited warranty shall apply in addition to any
statutor
y
or ot
h
er rig
h
ts w
h
ic
h
y
ou ma
y
h
ave un
d
er a
co
n
t
r
act
of
sa
l
e.
Excl
u
si
o
ns
a
n
d
Limit
a
ti
o
ns
T
his limited warranty does not apply i
f
: (a) the product
a
ssembly seal has been removed or damaged, (b) the
p
roduct has been altered or modi
f
ied, except b
y
Links
y
s,
(c) the product damage was caused by use with non
-
Linksys products, (d) the product has not been installed,
operate
d
, repaire
d
, or maintaine
d
in accor
d
ance wit
h
i
nstructions supplied by Linksys, (e) the product has
b
een subjected to abnormal physical or electrical stress,
m
isuse, negligence, or accident, (
f
) the serial number on
the Product has been altered, de
f
aced, or removed, or (
g
)
the
p
roduct is su
pp
lied or licensed for beta, evaluation,
testing or demonstration purposes
f
or which Links
y
s does
n
ot char
g
e a purchase price or license
f
ee
.
A
LL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT,
W
HETHER FA
C
T
O
RY L
O
ADED
O
N THE PR
O
DU
C
T
O
R
CO
NTAINED
O
N MEDIA A
CCO
MPANYING THE PR
O
DU
C
T,
IS PROVIDED “AS IS” WITHOUT ANY WARRANTY OF ANY
KIND. Without limiting the
f
oregoing, Links
y
s does not
warrant that the operation o
f
the product or so
f
tware will
b
e uninterru
p
ted or error free. Also, due to the continual
development o
f
new techniques
f
or intruding upon and
a
ttacking networks, Linksys does not warrant that the
p
roduct, service, software or any equipment, system or
n
etwork on which the
p
roduct or software is used will be
f
ree o
f
vulnerabilit
y
to intrusion or attack. The product
m
ay include or be bundled with third party so
f
tware or
service offerings. This limited warranty shall not apply to
such third part
y
so
f
tware or service o
ff
erings. This limited
warranty does not guarantee any continued availability
of a third party’s service for which this product’s use or
operat
i
on ma
y
requ
i
re.
TO
THE EXTENT N
O
T PR
O
HIBITED BY LAW, ALL IMPLIED
W
ARRANTIES AND CONDITIONS OF MERCHANTABILITY,
S
ATI
S
FA
C
T
O
RY
Q
UALITY
O
R FITNE
SS
F
O
R A PARTI
C
ULAR
P
U
RP
OS
E ARE LIMITED T
O
THE D
U
RATI
O
N
O
F THE
W
ARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED
CO
NDITI
O
N
S,
REPRE
S
ENTATI
O
N
S
AND WARRANTIE
S,
IN
C
LUDING, BUT N
O
T LIMITED T
O
, ANY IMPLIED
W
ARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.
S
ome
j
uris
d
ictions
d
o not a
ll
ow
l
imitations on
h
ow
l
ong
a
n implied warranty lasts, so the above limitation may not
a
pply to you. This limited warranty gives you specific legal
r
ig
h
ts, an
d
y
ou ma
y
a
l
so
h
ave ot
h
er rig
h
ts w
h
ic
h
var
y
by
j
urisdiction
.
T
O THE EXTENT NOT PROHIBITED BY LAW, IN NO EVEN
T
W
ILL LINK
S
Y
S
BE LIABLE F
O
R ANY L
OS
T DATA
,
REVENUE
O
R PR
O
FIT,
O
R F
O
R
S
PE
C
IAL, INDIRE
C
T,
CO
N
S
E
Q
UENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
T
HEORY OF LIABILITY
(
INCLUDING NEGLIGENCE
),
ARISING
OU
T
O
F
O
R RELATED T
O
THE
US
E
O
F
O
R INABILITY T
O
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
IF LINK
S
Y
S
HA
S
BEEN ADVI
S
ED
O
F THE P
OSS
IBILITY
O
F
SUC
H DAMAGE
S.
IN N
O
EVENT WILL LINK
S
Y
S
’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
T
he
f
oregoing limitations will appl
y
even i
f
an
y
warrant
y
or remedy provided under this limited warranty
f
ails o
f
i
ts essential purpose. Some jurisdictions do not allow
the exclusion or limitation o
f
incidental or consequential
damages, so the above limitation or exclusion may not
a
pply to you
.
Ob
taining Warrant
y
Servic
e
If you have a question about your product or experience a
p
ro
bl
em wit
h
it, p
l
ease go to
www.linksys.com/suppor
ypp
t
where you will
f
ind a variety o
f
online support tools and
i
nformation to assist you with your product. If the product
p
roves de
f
ective during the Warrant
y
Period, contact
Linksys Technical Support
f
or instructions on how to
obtain warranty service. The telephone number for Linksys
T
echnical Support in
y
our area can be
f
ound in the product
Use
r G
u
i
de
a
n
d
at
www.linksys.com
y
. Have your product
serial number and proof of purchase on hand when calling.
A
DATED PR
OO
F
O
F
O
RIGINAL PUR
C
HA
S
E I
S
RE
Q
UIRED
T
O PROCESS WARRANTY CLAIMS. I
f
you are requested to
r
eturn your product, you will be given a Return Materials
A
uthorization (RMA) number. You are responsible
f
or
p
roperly packaging and shipping your product to Linksys
a
t your cost and risk. You must include the RMA number
Appendix D Warranty Information
22
a
nd a copy of your dated proof of original purchase when
r
eturning
y
our pro
d
uct. Pro
d
ucts receive
d
wit
h
out a RMA
n
umber and dated proo
f
o
f
ori
g
inal purchase will be
r
ejected. Do not include any other items with the product
y
ou are returning to Links
y
s. De
f
ective product covered
b
y this limited warranty will be repaired or replaced and
r
eturned to you without charge. Customers outside o
f
the United States o
f
America and Canada are responsible
f
or all shippin
g
and handlin
g
char
g
es, custom duties,
VAT and other associated taxes and charges. Repairs or
r
ep
l
acements not covere
d
un
d
er t
h
is
l
imite
d
warrant
y
wi
ll
b
e subject to charge at Linksys’ then-current rates
.
T
echnical Su
pp
or
t
T
his limited warranty is neither a service nor a
support contract. Information about Linksys’ current
technical support o
ff
erings and policies (including
a
ny
f
ees
f
or support services) can be
f
ound at
www.linksys.com/suppor
ypp
t
G
ener
al
T
his limited warranty is governed by the laws of the
juris
d
iction in w
h
ic
h
t
h
e Pro
d
uct was purc
h
ase
d
by
y
ou
.
I
f
any portion o
f
this limited warranty is
f
ound to be void
or unenforceable, its remaining provisions shall remain in
f
ull
f
orce and e
ff
ect
.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623
.
For more in
f
ormation, please contact u
s
www.linksys.com
y
S
elect your country, and then select SUPPORT
/
T
E
C
HNI
C
AL
For product returns
:
S
elect your Country and then select CUSTOMER SUPPOR
T
Appendix E Regulatory Information
23
A
ppen
d
ix E:
R
egulator
y
Information
F
CC
S
tatemen
t
T
his product has been tested and complies with the
specifications for a Class B digital device, pursuant to Part
1
5 o
f
the FCC Rules. These limits are designed to provide
r
easonable protection a
g
ainst harm
f
ul inter
f
erence in
a
residential installation. This equipment generates,
u
ses, and can radiate radio
f
requenc
y
energ
y
and, i
f
not
i
nstalled and used according to the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that inter
f
erence will not
occur in a particular installation. I
f
this equipment does
cause harmful interference to radio or television rece
p
tion,
which is
f
ound b
y
turning the equipment o
ff
and on, the
u
ser is encouraged to try to correct the inter
f
erence by
one or more of the following measures
:
Reorient or re
l
ocate t
h
e receiving antenn
a
s
Increase the separation between the equipment or
s
device
s
Connect t
h
e equipment to an out
l
et ot
h
er t
h
an t
h
e
s
rece
iv
e
r’
s
Consult a dealer or an ex
p
erienced radio/TV technician
s
f
or assistanc
e
FCC Ra
d
iation Exposure Statemen
t
Th
is equipment comp
l
ies wit
h
FCC ra
d
iation exposure
limi
ts
set
fo
r
t
h
fo
r
a
n
u
n
co
n
t
r
o
ll
ed
e
nvir
o
nm
e
n
t.
S
a
f
ety Notice
s
Caution: To reduce the risk o
f
f
ire, use onl
y
No.26 AWG
s
or lar
g
er telecommunication line cord
.
Do not use this
p
roduct near water, for exam
p
le, in a
s
wet
b
asement or near a swimming poo
l.
A
void usin
g
this product durin
g
an electrical storm.
s
T
here may be a remote risk of electric shock from
l
ig
h
tning
.
Wireless Disclaime
r
T
he maximum per
f
ormance
f
or wireless is derived
f
rom
IEEE Standard 802.11 s
p
eci
f
ications. Actual
p
er
f
ormance
can vary, including lower wireless network capacity,
data throughput rate, range and coverage. Per
f
ormance
depends on many
f
actors, conditions and variables,
i
ncluding distance from the access point, volume o
f
n
etwork tra
ff
ic, building materials and construction,
operating system used, mix o
f
wireless products used,
i
nterference and other adverse conditions
.
Appendix E Regulatory Information
24
Declaration o
f
Con
f
ormit
y
with Regard to
EU Directive 1999/5/EC (R&TTE Directive)
C
o
mp
l
ian
c
e
I
n
f
o
ff
r
m
a
tio
n
f
or
ff
2,4
-
G
H
z
W
i
r
eless
P
r
odu
c
ts
R
e
l
e
v
a
n
t
t
o
t
h
e
E
U
a
n
d
O
t
h
e
r
C
ou
n
t
r
i
es
F
o
l
l
o
w
in
g
t
h
e EU Directive 1999/5/EC (R&TTE Directive
)
Б
ългарски
[
Bu
l
garian]
Т
ова о
б
орудване отговаря на съществените
и
зискв
а
ния и п
р
ил
о
жими кл
а
узи н
а
Д
иректива 1999
/
5
/
Е
С
.
Č
esky
[
Czec
h
]:
T
oto zařízení je v sou
l
a
d
u se zá
kl
a
d
ními
p
oža
d
av
k
y a ostatními o
d
poví
d
ajícími
u
stanoven
í
mi Sm
ě
rnice 1999/5/EC.
D
ans
k
[
Danis
h
]:
D
ette u
d
styr er i overensstemme
l
se me
d
d
e væsent
l
ige
k
rav og an
d
re re
l
evante
b
estemme
l
ser i Dire
k
tiv 1999/5/EF.
D
eutsc
h
[
German
]
:
D
ieses Gerät entspric
h
t
d
en grun
dl
egen
d
en
A
n
f
orderungen und den weiteren
e
ntsprec
h
en
d
en Vorga
b
en
d
er Ric
h
t
l
inie
1
999
/
5
/
EU.
Eest
i
[
Estonian
]
:
S
ee seade vastab direktiivi 1999/5/E
Ü
olulistele
n
õuete
l
e ja teiste
l
e asja
k
o
h
aste
l
e sätete
l
e.
E
ng
l
is
h
:
Th
is equipment is in comp
l
iance wit
h
t
h
e
e
ssentia
l
requirements an
d
ot
h
er re
l
evant
p
rovisions o
f
Directive 1999/5/EC.
E
spaño
l
[
Spanis
h
]:
E
ste equipo cump
l
e con
l
os requisitos
e
sencia
l
es asi como con otras
d
isposiciones
d
e
l
a Directiva 1999/5/CE.
Ελλ
ηνική
[
Gree
k
]:
Α
υτός ο ε
ξ
οπλισµός είναι σε συµµόρφωση µε
τ
ις ουσιώ
δ
εις απαιτήσεις και άλλες σχετικές
δ
ιατά
ξ
εις της Ο
δ
ηγίας 1999/5/EC.
F
rança
i
s
[
Frenc
h
]:
C
et appareil est con
f
orme aux exigences
e
ssentie
ll
es et aux autres
d
ispositions
p
ertinentes
d
e
l
a Directive 1999/5/EC.
Í
slenska
[
Ice
l
an
d
ic]:
Þ
etta tæki er samkvæmt grunnkrö
f
um og
öð
rum vi
ð
eigandi ákvæ
ð
um Tilskipunar
1
999
/
5
/
E
C
.
I
ta
l
iano
[
Ita
l
ian]:
Q
uesto apparato é con
f
orme ai requisiti
e
ssenzia
l
i e
d
ag
l
i a
l
tri principi sanciti
d
a
ll
a
D
irettiva 1999
/
5
/C
E.
L
atvis
k
i
[
Latvian
]
:
Š
ī iekārta atbilst Direktīvas 1999/5/EK
b
ūtis
k
ajām prasī
b
ām un citiem ar to
s
aistītajiem notei
k
umiem.
Li
etuv
i
ų
[
Lit
h
uanian]:
Š
is įrenginys tenkina 1999/5/EB Direktyvos
e
sminius rei
k
a
l
avimus ir
k
itas šios
d
ire
k
tyvos
n
uos
t
a
t
as.
N
e
d
er
l
an
d
s
[
Dutc
h
]:
D
it apparaat vo
ld
oet aan
d
e essentie
l
e eisen
e
n an
d
ere van toepassing zijn
d
e
b
epa
l
ingen
v
an
d
e Ric
h
t
l
ijn 1999/5/EC.
M
a
l
ti
[
Ma
l
tese]:
D
an l-apparat huwa kon
f
ormi mal-ħtiġiet
e
ssenzja
l
i u
l
-prove
d
imenti
l
-o
ħ
ra ri
l
evanti
t
a
d
-Direttiva 1999/5/EC.
M
agyar
[
Hungarian
]
:
E
z a
k
észü
l
é
k
te
l
jesíti az a
l
apvető
k
övete
l
ménye
k
et és más 1999/5/EK
i
ránye
l
v
b
en meg
h
atározott vonat
k
ozó
r
en
d
e
lk
ezése
k
et.
N
ors
k
[
Norwegian
]
:
D
ette utstyret er i samsvar me
d
d
e
g
runn
l
eggen
d
e
k
rav og an
d
re re
l
evante
b
estemme
l
ser i EU-
d
ire
k
tiv 1999/5/EF.
P
o
l
s
k
i
[
Po
l
is
h
]:
U
rzą
d
zenie jest zgo
d
ne z ogó
l
nymi
w
ymaganiami oraz szczegó
l
nymi warun
k
ami
ok
reś
l
onymi Dyre
k
tywą UE: 1999/5/EC.
P
ortugu
ê
s
[
Portuguese
]
:
E
ste equipamento está em con
f
ormidade com
o
s requ
i
s
i
tos essenc
i
a
i
s e outras prov
i
s
õ
es
r
e
l
evantes
d
a Directiva 1999/5/EC.
R
om
â
nă
[
Romanian
]
A
cest echipament este in con
f
ormitate
c
u cerinte
l
e esentia
l
e si cu a
l
te preve
d
eri
r
e
l
evante a
l
e Directivei 1999/5/EC.
Sl
ovens
k
o
[
S
l
ovenian]:
T
a naprava je s
kl
a
d
na z
b
istvenimi za
h
tevami
i
n osta
l
imi re
l
evantnimi pogoji Dire
k
tive
1
999
/
5
/
E
C
.
Sl
ovens
k
y
[
S
l
ova
k
]:
T
oto zaria
d
enie je v z
h
o
d
e so zá
kl
a
d
nými
p
ožia
d
av
k
ami a inými prís
l
ušnými naria
d
eniami
d
ire
k
tív: 1999/5/EC.
S
uomi
[
Finnis
h
]:
T
ämä
l
aite täyttää
d
ire
k
tiivin 1999/5/EY
ol
ennaiset vaatimu
k
set ja on siinä asetettujen
m
ui
d
en
l
aitetta
k
os
k
evien määräysten
m
u
k
ainen.
S
vens
k
a
[
Swe
d
is
h
]:
D
enna utrustning är i överensstämme
l
se me
d
d
e väsent
l
iga
k
raven oc
h
an
d
ra re
l
evanta
b
estämme
l
ser i Dire
k
tiv 1999/5/EC.
For all products, the Declaration of Conformity (DofC) is
a
vailable through one or more o
f
these options:
A
p
d
f
f
ile is included on the
p
roduct’s CD
.
s
A
print copy is inc
l
u
d
e
d
wit
h
t
h
e pro
d
uct
.
s
A
pd
f
f
ile is available on the product’s webpage.
s
Vi
s
i
t
w
ww.linksys.com/internationa
l
and select your
country or region. T
h
en se
l
ect your pro
d
uct
.
I
f
y
ou need an
y
other technical documentation, see the
“
Technical Documents on www.linksys.com/international
”
section, as s
h
own
l
ater in t
h
is a
pp
en
d
ix
.
Appendix E Regulatory Information
25
Wireless Equipment
(
Wireless-N/G/A/B Products
)
T
he
f
ollowin
g
standards were applied durin
g
the
a
ssessment of the product against the requirements o
f
t
h
e Directive 1999
/
5
/
EC
:
Radio: EN 300 328 and
s
EMC: EN 301 489-1, EN 301 489-17
s
S
a
f
et
y
: EN 60950 and either EN 50385 or EN 5037
1
s
DFS: The e
q
ui
p
ment meets the DFS re
q
uirements as
defined in ETSI EN 301 893. This feature is required by
the regulations to avoid inter
f
erence with Radio Location
S
ervices
(
radars
).
CE Markin
g
For t
h
e Lin
k
s
y
s Wire
l
ess-N, -G, -B, an
d
/or -A pro
d
ucts,
the
f
ollowing CE mark, noti
f
ied body number (where
app
licable), and class 2 identifier are added to the
equ
i
pment.
Check the CE label on the
p
roduct to
f
ind out which
n
otified body was involved during the assessment
.
National Restrictions
Th
is pro
d
uct ma
y
b
e use
d
in a
ll
EU countries (an
d
ot
h
er
countries
f
ollowin
g
the EU directive 1999/5/EC) without
a
ny limitation except for the countries mentioned below
:
Ce pro
d
uit peut être uti
l
isé
d
ans tous
l
es pa
y
s
d
e
l
’UE (et
d
ans
tous les pays ayant transposés la directive 1999/5/CE) sans
aucune limitation, excepté pour les pays mentionnés ci
-
d
essous
:
Questo
p
rodotto è utilizzabile in tutte i
p
aesi EU (ed in tutt
i
gli altri paesi che seguono le direttive EU 1999/5/EC) senza
nessuna
l
imitazione, eccetto per i paesi menzionati
di
se
g
uito
:
D
as Produkt kann in allen EU Staaten ohne Einschränkungen
e
ingesetzt wer
d
en (sowie in an
d
eren Staaten
d
ie
d
er E
U
D
irektive 1999/5/CE
f
ol
g
en) mit Au
ß
nahme der
f
ol
g
enden
aufgeführten Staaten:
In the majorit
y
o
f
the EU and other European countries,
the 2,4
-
G
H
z
ba
n
ds
h
a
v
e
bee
n m
ade
a
v
a
il
ab
l
e
f
or the use of wireless local area networks (LANs). The
ta
ble
l
a
b
e
l
e
d
“
O
v
e
r
v
iew o
f
R
egu
l
a
t
o
r
y
R
e
qu
i
r
eme
n
t
s
f
or
f
f
W
ireless LANs” provides an overview o
f
the regulatory
r
e
q
ui
r
eme
n
ts a
pp
licable
f
or the 2,4
f
f
-
G
H
z
ban
d
s
.
Later in this document
y
ou will
f
ind an overview o
f
c
ou
n
t
r
ies
in whi
c
h
add
i
t
i
o
n
a
l
r
est
r
i
c
t
i
o
n
s
o
r
r
e
q
ui
r
e
m
e
n
ts
or both are a
pp
licable
.
T
he requirements
f
or an
y
countr
y
ma
y
evolve. Links
y
s
r
ecommends that you check with the local authorities
f
or
the latest status of their national regulations for both the
2
,
4-G
H
z
w
i
r
el
ess LAN
s
.
O
verview o
f
Regulatory Requirements
f
or Wireless LANs
Frequency
Band (MHz)
Max Power Level
(EIRP) (mW)
Indoor
ONLY
Indoor &
Outdoor
2
4
00
-
2
4
83
.5
100
X
T
he following countries have restrictions and/or
r
equirements in addition to those
g
iven in the table
labeled “Overview of Regulatory Requirements for
W
ire
l
ess LANs”:
Appendix E Regulatory Information
26
Fr
a
nce
For 2,4 GHz, the
p
roduct should not be used outdoors
i
n the band 2454 - 2483
,
5 MHz. There are no restrictions
when used in other parts o
f
the 2,4 GHz band when used
i
ndoors. Check htt
p
://www.arce
p
.
f
r/
f
or more details
.
Pour la bande 2,4 GHz, l’ é
q
ui
p
ement ne doit
p
as être utilisé
e
n extérieur
d
ans
l
a
b
an
d
e 2454 - 2483,5 MHz. I
l
n’
y
a pas
d
e
restrictions pour des utilisations en intérieur dans d’autres
p
arties de la bande 2,4GHz. Consultez htt
p
://www.arce
p
.fr
/
pour
d
e p
l
us amp
l
es
d
étai
l
s
.
A
pp
l
ica
bl
e Power Leve
l
s in France
Location Frequency
Range (MHz) Power (EIRP)
In
d
oor
(
No restrictions
)
2
4
00
-
2
4
83
.
5
100 mW (20
d
Bm
)
Out
d
oo
r
2
4
00
-
2
45
4
2
454-
2
4
83
.
5
100 mW (20
d
Bm)
10 mW (10
d
Bm
)
Ita
ly
T
his product meets the National Radio Inter
f
ace and
t
he requirements speci
f
ied in the National Frequency
A
llocation Table for Italy. Unless this 2,4-GHz wireless LAN
p
roduct is operating within the boundaries o
f
the owner’s
p
roperty, its use requires a “general authorization”. Please
check htt
p
://www.comunicazioni.it/it/ for more details
.
Questo prodotto è con
f
orme alla speci
f
iche di Inter
f
accia
Radio Nazionali e ris
p
etta il Piano Nazionale di ri
p
artizione
d
elle fre
q
uenze in Italia. Se non viene installato all’interno
d
el proprio
f
ondo, l’utilizzo di prodotti Wireless LAN a
2
,4 GHz richiede una “Autorizzazione Generale”. Consultare
http://www.comunicazioni.it/it/ per maggiori dettagli
.
L
a
tv
ia
T
he outdoor usage of the 2,4 GHz band requires an
a
uthorization
f
rom the Electronic Communications O
ff
ice.
Please check htt
p
://www.esd.lv
f
or more details
.
2
,4 GHz frekveču joslas izmantošanai ārpus telpām
nepieciešama at
ļ
auja no E
l
e
k
tronis
k
o sa
k
aru
d
ire
k
cijas.
Vairāk in
f
ormāci
j
as: http://www.esd.lv
.
Notes:
Al
t
h
oug
h
Norwa
y
, Switzer
l
an
d
an
d
Liec
h
tenstein are
1.
n
ot EU member states, the EU Directive 1999/5/EC has
a
lso been im
p
lemented in those countries
.
T
he regulator
y
limits
f
or maximum output power are
2.
s
p
eci
f
ied in EIRP. The EIRP level o
f
a device can be
calculated by adding the gain of the antenna used
(speci
f
ied in dBi) to the output power available at the
connector (s
p
eci
f
ied in dBm)
.
Product Usage Restrictions
T
his product is designed
f
or indoor usage onl
y
. Outdoor
u
sa
g
e is not recommended, unless otherwise noted
.
2
,
4 GHz Restriction
s
T
his product is desi
g
ned
f
or use with the standard, inte
g
ral
or dedicated (external) antenna(s) that is/are shi
pp
ed
toget
h
er wit
h
t
h
e equipment. However, some app
l
ications
m
ay require the antenna(s), i
f
removable, to be separated
f
rom the product and installed remotely from the device
by
using extension ca
bl
es. For t
h
ese app
l
ications, Lin
k
s
y
s
offe
r
s
a
n
R
-
SMA extension cable
(
AC9SMA
)
and an R-TNC
extension cable (AC9TNC). Both of these cables are 9
m
eters long and have a cable loss (attenuation) o
f
5 dB. To
compensate
f
or the attenuation, Linksys also o
ff
ers higher
gain antennas, the HGA7S (with R-SMA connector) and
HGA7T
(
wit
h
R-TNC connector
)
. T
h
ese antennas
h
ave a
gain o
f
7 dBi and may only be used with either the R-SMA
or R-TNC extension cable.
Combinations o
f
extension cables and antennas resulting
i
n a radiated power level exceedin
g
100 mW EIRP are
i
llegal.
T
hird-Part
y
Software or Firmware
T
he use of software or firmware not su
pp
orted/
p
rovided
by
Lin
k
s
y
s ma
y
resu
l
t t
h
at t
h
e equipment is no
l
onger
compliant with the regulatory requirements
.
Technical Documents on
w
ww.linksys.com/international
Follow these ste
p
s to access technical documents
:
Enter http://www.linksys.com/international in your
1.
w
e
b
b
rowser
.
S
elect the country or region in which you live
.
2.
C
lick the
3.
Products tab
.
S
e
l
ect t
h
e appropriate pro
d
uct categor
y.
4.
S
elect the product sub-category, i
f
necessary
.
5.
S
elect the
p
roduct
.
6.
S
elect the t
y
pe o
f
documentation
y
ou want
f
rom the7
.
More In
f
ormation section. The document will o
p
en
i
n PDF format if you have Adobe Acrobat installed on
y
our computer.
NOTE: I
f
y
ou have questions regarding
the compliance of this product or you
cannot find the information
y
ou need,
p
lease contact
y
our local sales o
ff
ice or visit
www.linksys.com/internationa
l
Appendix E Regulatory Information
27
User In
f
ormation
f
or Consumer Products
Covered by EU Directive 2002/96/EC on
Waste E
l
ectric an
d
E
l
ectronic E
q
ui
p
ment
(
WEEE
)
T
his document contains important in
f
ormation
f
or users
with regards to the proper disposal and recycling o
f
Linksys products. Consumers are required to comply with
this notice
f
or all electronic products bearing the
f
ollowing
symbol
:
En
g
lish - Environmental In
f
ormation
f
or Customers in
th
e Euro
p
ean Unio
n
Euro
p
ean Directive 2002/96/EC re
q
uires that the e
q
ui
p
ment
bearing this s
y
mbol on the product and/or its packa
g
in
g
must
n
ot be disposed of with unsorted municipal waste. The s
y
mbol
i
ndicates that this product should be disposed of separatel
y
f
rom regular household waste streams. It is
y
our responsibilit
y
to
d
is
p
ose of this and other electric and electronic e
q
ui
p
ment via
d
esignated collection facilities appointed b
y
the government or
l
ocal authorities. Correct disposal and rec
y
cling will help prevent
p
otential ne
g
ative consequences to the environment and
h
uman health. For more detailed information about the dis
p
osal
o
f
y
our old equipment, please contact
y
our local authorities,
w
aste disposal service, or the shop where
y
ou purchased the
p
roduct.
Български (Bu
lg
arian) - Информация относно
о
пазването на околната с
р
еда за пот
р
ебители в
Ев
р
опе
й
ския съюз
Европейска директива 2002/96/EC изисква
у
редите, носещи
т
о
зи
с
имв
о
л върх
у
изделието и/или опаковката м
у
, да не
се изхвъ
р
ля т с несо
р
ти
р
ани битови отпадъци. Символът
обозначава, че изделието т
р
ябва да се изхвъ
р
ля отделно от
сметосъби
р
ането на обикновените битови отпадъци. Ваша
е отговорността този и др
у
гите електрически и електронни
у
реди да се изхвърлят в предварително определени от
държавните или общински органи специализирани п
у
нктове
за съби
р
ане. П
р
авилното изхвъ
р
ляне и
р
ецикли
р
ане
ще спомогнат да се предотвратят евент
у
ални вредни за
околната с
р
еда и зд
р
авето на населението последствия. За
по-под
р
обна ин
ф
о
р
мация относно изхвъ
р
лянето на вашите
стари
у
реди се обърнете към местните власти, сл
у
жбите за
сметосъбиране или магазина, от който сте зак
у
пили
у
реда.
C
eština
(
Czech
)
-
Informace o ochraně životního
prostře
d
í pro zá
k
azní
ky
v zemíc
h
Evrops
k
é uni
e
Evrops
k
á směrnice 2002/96/ES za
k
azuje, a
b
y zařízení označené
tímto sym
b
o
l
em na pro
d
u
k
tu ane
b
o na o
b
a
l
u
b
y
l
o
l
i
k
vi
d
ováno
s
netří
d
ěným
k
omuná
l
ním o
d
pa
d
em. Tento sym
b
o
l
u
d
ává,
ž
e
d
aný pro
d
u
k
t musí
b
ýt
l
i
k
vi
d
ován o
dd
ě
l
eně o
d
b
ěžné
h
o
k
omuná
l
ní
h
o o
d
pa
d
u. O
d
poví
d
áte za
l
i
k
vi
d
aci to
h
oto pro
d
u
k
tu
a
d
a
l
šíc
h
e
l
e
k
tric
k
ýc
h
a e
l
e
k
tronic
k
ýc
h
zařízení prostře
d
nictvím
u
rčenýc
h
s
b
ěrnýc
h
míst stanovenýc
h
v
l
á
d
ou ne
b
o místními
ú
řa
d
y. Správná
l
i
k
vi
d
ace a recy
kl
ace pomá
h
á pře
d
c
h
ázet
p
otenciálním negativním dopad
ů
m na životní prostředí a lidské
z
draví. Podrobnější in
f
ormace o likvidaci starého vybavení si
l
askavě vyžádejte od místních úřad
ů
, podniku zabývajícího se
l
ikvidací komunálních odpad
ů
nebo obchodu, kde jste produkt
z
a
k
oupi
l
i.
Dansk (Danish) - Miljøin
f
ormation
f
or kunder i E
U
EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol
p
å
produktet og/eller emballagen ikke m
å
bortskaffes som
usorteret kommunalt a
ff
ald. Symbolet betyder, at dette produkt
skal bortska
ff
es adskilt
f
ra det almindelige husholdningsa
ff
ald.
Det er dit ansvar at bortska
ff
e dette og andet elektrisk og
e
l
e
k
tronis
k
u
d
styr via
b
estemte in
d
sam
l
ingsste
d
er u
d
peget
a
f
staten eller de lokale myndigheder. Korrekt bortska
ff
else
og genvinding vil hjælpe med til at undg
å
mulige skader for
mi
l
jøet og mennes
k
ers sun
dh
e
d
. Konta
k
t ven
l
igst
d
e
l
o
k
a
l
e
myn
d
ig
h
e
d
er, renovationstjenesten e
ll
er
d
en
b
uti
k
,
h
vor
d
u
har købt produktet, ang
å
ende mere detaljeret information om
bortska
ff
else a
f
dit gamle udstyr.
Deutsch
(
German
)
- Umweltinformation für Kunden
inner
h
a
lb
d
er Europäisc
h
en Unio
n
Die Europäisc
h
e Ric
h
t
l
inie 2002/96/EC ver
l
angt,
d
ass tec
h
nisc
h
e
Ausrüstung,
d
ie
d
ire
k
t am Gerät un
d
/o
d
er an
d
er Verpac
k
ung mit
d
iesem Sym
b
o
l
verse
h
en ist
,
nic
h
t zusammen mit unsortiertem
G
emeindeab
f
all entsorgt werden dar
f
. Das Symbol weist darau
f
h
in,
d
ass
d
as Pro
d
u
k
t von regu
l
ärem Haus
h
a
l
tmü
ll
getrennt
e
ntsorgt wer
d
en so
ll
te. Es
l
iegt in I
h
rer Verantwortung,
d
ieses
G
erät un
d
an
d
ere e
l
e
k
trisc
h
e un
d
e
l
e
k
tronisc
h
e Geräte ü
b
er
d
ie da
f
ür zuständigen und von der Regierung oder örtlichen
B
e
h
ör
d
en
d
azu
b
estimmten Samme
l
ste
ll
en zu entsorgen.
O
rdnungsgemä
ß
es Entsorgen und Recyceln trägt dazu bei,
p
otentielle negative Folgen
f
ür Umwelt und die menschliche
G
esundheit zu vermeiden. Wenn Sie weitere In
f
ormationen zur
E
ntsorgung I
h
rer A
l
tgeräte
b
enötigen, wen
d
en Sie sic
h
b
itte an
d
ie ört
l
ic
h
en Be
h
ör
d
en o
d
er stä
d
tisc
h
en Entsorgungs
d
ienste
od
er an
d
en Hän
dl
er,
b
ei
d
em Sie
d
as Pro
d
u
k
t erwor
b
en
h
a
b
en.
Appendix E Regulatory Information
28
Eesti
(
Estonian
)
- Keskkonnaalane informatsioon
Euroopa Lii
d
us asuvate
l
e
kl
ienti
d
e
le
Euroopa Liidu direktiivi 2002/96/E
Ü
nõuete kohaselt on
sea
d
mei
d
, mi
ll
e
l
on toote
l
või pa
k
en
d
i
l
k
äeso
l
ev süm
b
o
l
,
k
ee
l
atu
d
k
õrva
ld
a
d
a
k
oos sorteerimata o
l
mejäätmetega. See
süm
b
o
l
näita
b
, et too
d
e tu
l
e
k
s
k
õrva
ld
a
d
a era
ld
i tava
l
istest
o
l
mejäätmevoogu
d
est. O
l
ete
k
o
h
ustatu
d
k
õrva
ld
ama
k
äeso
l
eva
ja
k
a muu
d
e
l
e
k
tri- ja e
l
e
k
trooni
k
asea
d
me
d
riigi või
k
o
h
a
l
i
k
e
ametiasutuste poo
l
t ette nä
h
tu
d
k
ogumispun
k
ti
d
e
k
au
d
u.
Sea
d
mete
k
orre
k
tne
k
õrva
ld
amine ja ring
l
ussevõtt aita
b
vä
l
ti
d
a
võima
l
i
kk
e negatiivsei
d
tagajärgi
k
es
kk
onna
l
e ning inimeste
tervise
l
e. Vana
d
e sea
d
mete
k
õrva
ld
amise
k
o
h
ta täpsema
in
f
ormatsiooni saamiseks võtke palun ühendust kohalike
ametiasutustega, jäätmekäitlus
f
irmaga või kauplusega, kust te
toote osts
i
te.
Español (Spanish) - In
f
ormación medioambiental para
c
lientes de la Unión Euro
p
ea
La Directiva 2002/96/CE de la UE exi
g
e que los equipos que
ll
e
v
e
n
este
s
ím
bo
l
o
en el propio aparato
y
/o en su embalaje
no deben eliminarse
j
unto con otros residuos urbanos no
seleccionados. El símbolo indica
q
ue el
p
roducto en cuestión
debe se
p
ararse de los residuos domésticos convencionales con
vistas a su eliminación. Es responsabilidad su
y
a desechar este
y
cualesquiera otros aparatos eléctricos
y
electrónicos a través de
los puntos de recogida que ponen a su disposición el gobierno
y
las autoridades locales. Al desechar
y
reciclar correctamente estos
aparatos estará contribu
y
endo a evitar posibles consecuencias
negativas para el medio ambiente
y
la salud de las personas. Si
desea
obte
n
e
r inf
o
rm
ac
i
ó
n m
ás
deta
ll
ada
sob
r
e
l
a
e
limin
ac
i
ó
n
se
g
ura de su aparato usado, consulte a las autoridades locales,
al servicio de recogida
y
eliminación de residuos de su zona o
pre
g
unte en la tienda donde adquirió el producto.
ξ
λληνικά (Greek) - Στοιχεία περι
β
αλλοντικής
προστασίας για πελάτες εντός της Ευρωπαϊκής
Ένωσ
η
ς
Η Κοινοτικ
ή
Οδ
ηγ
ία 2002/96/EC απαιτεί ότι ο εξοπλισ
μ
ός ο οποίος
φ
έ
ρ
ει αυτό το σύ
μβ
ολο στο π
ρ
οϊόν και/
ή
στ
η
συσκευασία
του δεν π
ρ
έπει να απο
ρρ
ίπτεται
μ
αζί
μ
ε τα
μ
ικτά κοινοτικά
απο
ρρ
ί
μμ
ατα. Το σύ
μβ
ολο υποδεικνύει ότι αυτό το π
ρ
οϊόν θα
πρέπει να απορρίπτεται ξε
χ
ωριστά από τα συνήθη οικιακά
απο
ρρ
ί
μμ
ατα. Είστε υπεύθυνος
γ
ια τ
η
ν από
ρρ
ι
ψη
του πα
ρ
όντος
και άλλου
η
λεκτ
ρ
ικού και
η
λεκτ
ρ
ονικού εξοπλισ
μ
ού
μ
έσω των
καθο
ρ
ισ
μ
ένων ε
γ
καταστάσεων συ
γ
κέντ
ρ
ωσ
η
ς απο
ρρ
ι
μμ
άτων οι
οποίες παρέ
χ
ονται από το κράτος ή τις αρμόδιες τοπικές αρ
χ
ές.
Η σωστ
ή
από
ρρ
ι
ψη
και ανακύκλωσ
η
συ
μβ
άλλει στ
η
ν π
ρ
όλ
ηψη
πιθανών α
ρ
ν
η
τικών συνεπειών
γ
ια το πε
ρ
ι
β
άλλον και τ
η
ν υ
γ
εία.
Για περισσότερες πληροφορίες σ
χ
ετικά με την απόρριψη του
παλιού σας εξοπλισ
μ
ού, πα
ρ
ακαλώ επικοινων
ή
στε
μ
ε τις τοπικές
αρ
χ
ές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο
α
γ
ο
ρ
άσατε το π
ρ
οϊόν.
Français (French) - Informations environnementales
pour
l
es c
l
ients
d
e
l
’Union européenn
e
La
d
irective européenne 2002/96/CE exige que
l
’équipement
sur
l
eque
l
est apposé ce sym
b
o
l
e sur
l
e pro
d
uit et/ou son
em
b
a
ll
age ne soit pas jeté avec
l
es autres or
d
ures ménagères. Ce
sym
b
o
l
e in
d
ique que
l
e pro
d
uit
d
oit être é
l
iminé
d
ans un circuit
d
istinct
d
e ce
l
ui pour
l
es
d
éc
h
ets
d
es ménages. I
l
est
d
e votre
responsa
b
i
l
ité
d
e jeter ce matérie
l
ainsi que tout autre matérie
l
é
l
ectrique ou é
l
ectronique par
l
es moyens
d
e co
ll
ecte in
d
iqués
par
l
e gouvernement et
l
es pouvoirs pu
bl
ics
d
es co
ll
ectivités
territoriales. L’élimination et le recyclage en bonne et due
f
orme
ont pour but de lutter contre l’impact né
f
aste potentiel de ce
type
d
e pro
d
uits sur
l
’environnement et
l
a santé pu
bl
ique. Pour
plus d’in
f
ormations sur le mode d’élimination de votre ancien
équipement, veui
ll
ez pren
d
re contact avec
l
es pouvoirs pu
bl
ics
l
ocaux,
l
e service
d
e traitement
d
es
d
éc
h
ets, ou
l
’en
d
roit où vous
avez ac
h
eté
l
e pro
d
uit
.
Italiano (Italian) - In
f
ormazioni relative all’ambiente
p
er i clienti residenti nell’Unione Euro
p
e
a
La direttiva euro
p
ea 2002/96/EC richiede che le a
pp
arecchiature
contrasse
g
nate con questo simbolo sul
p
rodotto e/o
s
ull’imballa
gg
io non siano smaltite insieme ai rifiuti urbani
n
on differenziati. Il simbolo indica che
q
uesto
p
rodotto non
de
v
e
esse
r
e
s
m
a
l
t
i
to
in
s
i
e
m
e
a
i n
o
rm
a
li rifi
ut
i
do
m
est
i
c
i
.
È
r
es
p
onsabilità del
p
ro
p
rietario smaltire sia
q
uesti
p
rodotti sia
l
e altre a
pp
arecchiature elettriche ed elettroniche mediante
l
e specifiche strutture di raccolta indicate dal
g
overno o da
g
li
e
nti pubblici locali. Il corretto smaltimento ed il ricicla
gg
io
a
iuteranno a prevenire conse
g
uenze potenzialmente ne
g
ative
p
er l’ambiente e
p
er la salute dell’essere umano. Per ricevere
i
nformazioni più detta
g
liate circa lo smaltimento delle vecchie
a
pparecchiature in Vostro possesso, Vi invitiamo a contattare
g
li
e
nti
p
ubblici di com
p
etenza, il servizio di smaltimento rifiuti o il
n
e
g
ozio nel quale avete acquistato il prodotto.
Latviešu valoda (Latvian) - Ekoloģiska informācija
k
lientiem Eiropas Savienības jurisdikcij
ā
Dire
k
tīvā 2002/96/EK ir prasī
b
a,
k
a aprī
k
ojumu,
k
am pievienota
z
ī
me uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst
i
zmest neš
ķ
irotā veidā kopā ar komunālajiem atkritumiem
(
tiem, ko rada vietēji iedzīvotāji un uz
ņ
ēmumi). Šī zīme nozīmē
t
o, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar
p
arastiem mā
j
saimniecības atkritumiem. Jūsu pienākums ir šo
u
n citas elektriskas un elektroniskas ierīces izmest atkritumos
,
i
zmantojot īpašus atkritumu savākšanas veidus un līdzek
ļ
us, ko
n
odrošina valsts un
p
ašvaldību iestādes. Ja izmešana atkritumos
u
n pārstrāde tiek veikta pareizi, tad mazinās iespē
j
amais
k
aitējums dabai un cilvēku veselībai. Sīkākas zi
ņ
as par
n
ovecojuša aprīkojuma izmešanu atkritumos jūs varat sa
ņ
emt
v
ietē
j
ā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,
k
ur iegādā
j
āties šo izstrādā
j
umu.
Appendix E Regulatory Information
29
Lietuvškai (Lithuanian) - Aplinkosaugos informaci
j
a,
sk
irta Europos Sąjungos vartotojam
s
Europos
d
ire
k
tyva 2002/96/EC numato,
k
a
d
įrangos,
k
uri ir
k
urios pa
k
uotė yra pažymėta šiuo sim
b
o
l
iu (įves
k
ite sim
b
o
l
į),
nega
l
ima ša
l
inti
k
artu su nerūšiuotomis
k
omuna
l
inėmis
atliekomis.
Š
is simbolis rodo, kad gaminį reikia šalinti atskirai
nuo
b
en
d
ro
b
uitinių at
l
ie
k
ų srauto. Jūs priva
l
ote užti
k
rinti,
k
a
d
ši ir
k
ita e
l
e
k
tros ar e
l
e
k
troninė įranga
b
ūtų ša
l
inama per tam
ti
k
ras naciona
l
inės ar vietinės va
ld
žios nustatytas at
l
ie
k
ų rin
k
imo
sistemas. Tin
k
amai ša
l
inant ir per
d
ir
b
ant at
l
ie
k
as,
b
us išvengta
galimos žalos aplinkai ir žmonių sveikatai. Daugiau in
f
ormacijos
apie jūsų senos įrangos ša
l
inimą ga
l
i patei
k
ti vietinės va
ld
žios
institucijos, at
l
ie
k
ų ša
l
inimo tarny
b
os ar
b
a par
d
uotuvės,
k
uriose
į
sigijote tą gamin
į
.
M
alti (Maltese) - In
f
ormazzjoni Ambjentali għal Klijenti
f
l-Un
j
oni Ewropea
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li
j
kun fih is-
s
im
bo
l
u
fuq il-prodott u/
j
ew fuq l-ippakk
j
ar ma
j
istax
j
intrema
m
a’ skart muniċipali li ma ġiex isseparat. Is-simbolu
j
indika
l
i dan il-prodott għandu
j
intrema separatament minn ma’ l-
i
skart domestiku regolari. Hi
j
a responsabbiltà tiegħek li tarmi
d
an it-ta
g
ħmir u kull ta
g
ħmir ieħor ta’ l-elettriku u elettroniku
p
ermezz ta’ faċilita
j
iet ta’ ġbir appuntati apposta mill-gvern
j
ew
m
ill-awtorita
j
iet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ
j
għin
j
ipprev
j
eni konsegwenzi negattivi potenz
j
ali għall-amb
j
ent u
g
ħas-saħħa tal-bniedem. Għal aktar informazz
j
oni dettal
j
ata
d
war ir-rimi tat-tagħmir antik tiegħek,
j
ekk
j
ogħġbok ikkuntatt
j
a
l
ill-awtorita
j
iet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart,
j
ew
i
l-ħanut minn fe
j
n xtra
j
t il-prodott.
M
ag
y
ar (Hungarian) - Körn
y
ezetvédelmi in
f
ormáció az
e
urópai uniós vásárlók számár
a
A 2002/96/EC számú európai uniós iránye
l
v meg
k
ívánja,
h
ogy
azo
k
at a termé
k
e
k
et, ame
l
ye
k
en, és/vagy ame
l
ye
k
csomago
l
ásán
az a
l
á
bb
i cím
k
e meg
j
elenik, tilos a többi szelektálatlan lakossági
h
u
ll
a
d
é
kk
a
l
együtt
k
i
d
o
b
ni. A cím
k
e azt je
l
ö
l
i,
h
ogy az a
d
ott
termék kidobásakor a szokván
y
os háztartási hulladékelszállítási
rendszerektõl elkülönített eljárást kell alkalmazni. Az
Ö
n
f
elelõssége, hogy ezt, és más elektromos és elektronikus
b
eren
d
ezéseit a
k
ormányzati vagy a
h
e
l
yi
h
atóságo
k
á
l
ta
l
kijelölt gyűjtõredszereken keresztül számolja
f
el. A meg
f
elelõ
hulladék
f
eldolgozás segít a környezetre és az emberi egészségre
potenciá
l
isan árta
l
mas negatív
h
atáso
k
mege
l
õzésé
b
en. Ha
elavult berendezéseinek
f
elszámolásához további részletes
in
f
ormációra van szüksége, kérjük, lépjen kapcsolatba a helyi
hatóságokkal, a hulladék
f
eldolgozási szolgálattal, vagy azzal
üz
l
ette
l
, a
h
o
l
a termé
k
et vásáro
l
ta.
Nederlands
(
Dutch
)
- Milieu-informatie voor klanten
in
d
e Europese Uni
e
De Europese Richtlijn 2002/96/EC schrij
f
t voor dat apparatuur die
is voorzien van
d
it sym
b
oo
l
op het product o
f
de verpakking,
niet mag wor
d
en ingezame
ld
met niet-gesc
h
ei
d
en
h
uis
h
ou
d
e
l
ij
k
a
f
val. Dit symbool gee
f
t aan dat het product apart moet worden
ingezameld. U bent zel
f
verantwoordelijk voor de vernietiging
van
d
eze en an
d
ere e
l
e
k
trisc
h
e en e
l
e
k
tronisc
h
e apparatuur via
d
e
daarvoor door de landelijke o
f
plaatselijke overheid aangewezen
inzame
l
ings
k
ana
l
en. De juiste vernietiging en recyc
l
ing van
d
eze apparatuur voor
k
omt moge
l
ij
k
e negatieve gevo
l
gen voor
het milieu en de gezondheid. Voor meer in
f
ormatie over het
vernietigen van uw ou
d
e apparatuur neemt u contact op met
de plaatselijke autoriteiten o
f
a
f
valverwerkingsdienst, o
f
met de
winkel waar u het product hebt aangescha
f
t.
Norsk (Norwegian) - Miljøin
f
ormasjon
f
or kunder i E
U
EU-direktiv 2002/96/EF krever at utstyr med følgende symbol
avbildet p
å
produktet og/eller pakningen, ikke m
å
kastes
sammen med usortert av
f
all. Symbolet indikerer at dette
produktet skal h
å
ndteres atskilt fra ordinær avfallsinnsamling
for husholdningsavfall. Det er ditt ansvar
å
kvitte deg med
d
ette produktet og annet elektrisk og elektronisk av
f
all via egne
innsam
l
ingsor
d
ninger s
l
i
k
myn
d
ig
h
etene e
ll
er
k
ommunene
bestemmer. Korrekt avfallsh
å
ndtering og gjenvinning vil
være med p
å
å
forhindre mulige negative konsekvenser for
miljø og helse. For nærmere informasjon om h
å
ndtering av
d
et
k
asserte utstyret
d
itt,
k
an
d
u ta
k
onta
k
t me
d
k
ommunen,
en innsamlingsstasjon
f
or av
f
all eller butikken der du kjøpte
pro
d
u
k
tet.
Polski (Polish) - Informac
j
a dla klientów w Unii
Europejs
k
iej o przepisac
h
d
ot
y
cząc
y
c
h
oc
h
ron
y
ś
r
odo
wi
s
k
a
D
y
rekt
y
wa Europejska 2002/96/EC w
y
maga, ab
y
sprzęt
oznaczon
y
s
y
mbolem znajdując
y
m się na produkcie i/lub jego
o
pa
k
owaniu nie
b
y
ł
wyrzucany razem z innymi niesortowanymi
o
dpadami komunaln
y
mi. S
y
mbol ten wskazuje, że produkt
nie powinien
b
yć usuwany razem ze zwy
kł
ymi o
d
pa
d
ami z
g
ospo
d
arstw
d
omowyc
h
. Na Państwu spoczywa o
b
owiąze
k
w
yrzucania tego i innyc
h
urzą
d
zeń e
l
e
k
trycznyc
h
oraz
el
e
k
tronicznyc
h
w pun
k
tac
h
o
db
ioru wyznaczonyc
h
przez w
ł
a
d
ze
k
rajowe
l
u
b
l
o
k
a
l
ne. Poz
b
ywanie się sprzętu we w
ł
aściwy sposó
b
i
jego recy
kl
ing pomogą zapo
b
iec potencja
l
nie negatywnym
k
onse
k
wencjom
dl
a śro
d
owis
k
a i z
d
rowia
l
u
d
z
k
iego. W ce
l
u
u
zyskania szczegółowych in
f
ormacji o usuwaniu starego sprzętu,
prosimy zwrócić się
d
o
l
o
k
a
l
nyc
h
w
ł
a
d
z, s
ł
uż
b
oczyszczania
miasta
l
u
b
s
kl
epu, w
k
tórym pro
d
u
k
t zosta
ł
na
b
yty.
Appendix E Regulatory Information
30
Português (Portuguese) - Informação ambiental para
cl
ientes
d
a União Europei
a
A Directiva Europeia 2002
/
96
/C
E exige que o equipamento
que exi
b
e este sím
b
o
l
o no pro
d
uto e/ou na sua em
b
a
l
agem
n
ão seja e
l
imina
d
o junto com os resí
d
uos municipais não
s
epara
d
os. O sím
b
o
l
o in
d
ica que este pro
d
uto
d
eve ser
el
imina
d
o separa
d
amente
d
os resí
d
uos
d
omésticos regu
l
ares.
É
da sua responsabilidade eliminar este e qualquer outro
e
quipamento e
l
éctrico e e
l
ectrónico através
d
as insta
l
ações
d
e reco
lh
a
d
esigna
d
as pe
l
as autori
d
a
d
es governamentais ou
l
ocais. A e
l
iminação e recic
l
agem correctas aju
d
arão a prevenir
a
s consequências negativas para o am
b
iente e para a saú
d
e
h
umana. Para obter in
f
ormações mais detalhadas sobre a
f
orma de eliminar o seu equipamento antigo, contacte as
a
utori
d
a
d
es
l
ocais, os serviços
d
e e
l
iminação
d
e resí
d
uos ou o
e
sta
b
e
l
ecimento comercia
l
on
d
e a
d
quiriu o pro
d
uto.
Română (Romanian) - In
f
orma
ţ
ii de mediu pentru
c
lien
ţ
ii din Uniunea European
ă
Directiva euro
p
eană 2002/96/CE im
p
une ca echi
p
amentele care
p
rezintă acest simbol pe produs şi/sau pe ambala
j
ul acestuia să
nu fie casate împreună cu gunoiul mena
j
er municipal. Simbolul
indică fa
p
tul că acest
p
rodus trebuie să fie casat se
p
arat de
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casa
ţ
i
acest produs
ş
i alte echipamente electrice
ş
i electronice prin
intermediul unită
ţ
ilor de colectare special desemnate de guvern
sau de autorită
ţ
ile locale. Casarea şi reciclarea corecte vor ajuta
la prevenirea poten
ţ
ialelor consecin
ţ
e negative asupra sănătă
ţ
ii
mediului şi a oamenilor. Pentru mai multe informa
ţ
ii detaliate
cu privire la casarea acestui echipament vechi, contacta
ţ
i
autorită
ţ
ile locale, serviciul de salubrizare sau magazinul de la
care a
ţ
i achizi
ţ
ionat produsul.
Slovenčina (Slovak) - In
f
ormácie o ochrane životného
prostredia pre zákazníkov v Európskej úni
i
Podľa európskej smernice 2002/96/ES zariadenie s t
ý
mto
sym
b
o
l
om na produkte a/alebo jeho balení nesmie by
ť
l
ikvidované spolu s netrieden
ý
m komunáln
y
m odpadom.
S
ymbol znamená, že produkt by sa mal likvidova
ť
oddelene
o
d bežného odpadu z domácností. Je vašou povinnos
ť
ou
l
ikvidova
ť
toto i ostatné elektrické a elektronické zariadenia
p
rostre
d
níctvom špecia
l
izovanýc
h
z
b
ernýc
h
zaria
d
ení určenýc
h
vl
á
d
ou a
l
e
b
o miestnymi orgánmi. Správna
l
i
k
vi
d
ácia a recy
kl
ácia
p
omôže zabráni
ť
prípadným negatívnym dopadom na životné
p
rostredie a zdravie
ľ
udí. Ak máte záujem o podrobnejšie
i
nformácie o likvidácii starého zariadenia, obrá
ť
te sa, prosím, na
m
iestne orgány, organizácie zao
b
erajúce sa
l
i
k
vi
d
áciou o
d
pa
d
ov
al
e
b
o o
b
c
h
o
d
, v
k
torom ste si pro
d
u
k
t za
k
úpi
l
i.
Slovenčina (Slovene) - Okol
j
ske informaci
j
e za stranke
v Evrops
k
i unij
i
Evrops
k
a
d
ire
k
tiva 2002/96/EC prepove
d
uje o
dl
aganje opreme,
označene s tem sim
b
o
l
om – na iz
d
e
lk
u in/a
l
i na em
b
a
l
aži – me
d
o
b
ičajne, nerazvrščene o
d
pa
dk
e. Ta sim
b
o
l
opozarja,
d
a je tre
b
a
iz
d
e
l
e
k
o
d
vreči
l
očeno o
d
preosta
l
i
h
gospo
d
injs
k
i
h
o
d
pa
dk
ov.
Vaša o
d
govornost je,
d
a to in preosta
l
o e
l
e
k
trično in e
l
e
k
trons
k
o
opremo o
d
nesete na pose
b
na z
b
ira
l
išča,
k
i ji
h
d
o
l
očijo
d
ržavne ustanove a
l
i
l
o
k
a
l
na uprava. S pravi
l
nim o
dl
aganjem
in reci
kl
iranjem
b
oste prepreči
l
i more
b
itne š
k
o
dl
jive vp
l
ive na
okolje in zdravje ljudi.
Č
e želite izvedeti več o odlaganju stare
opreme, se o
b
rnite na
l
o
k
a
l
no upravo, o
d
pa
d
a
l
i trgovino,
k
jer
ste iz
d
e
l
e
k
k
upi
l
i
.
Suomi (Finnish) - Ympäristöä koskevia tietoja EU
-
alueen asiakkaille
EU-direktiivi 2002/96/EY edell
y
ttää, että jos laitteistossa on tämä
s
y
mboli itse tuotteessa
j
a/tai sen pakkauksessa, laitteistoa
ei saa hävittää lajittelemattoman
y
hd
y
skuntajätteen mukana.
S
y
mboli merkitsee sitä, että tämä tuote on hävitettävä erillään
tavallisesta kotitalous
j
ätteestä. Sinun vastuullasi on hävittää
tämä elektroniikkatuote
j
a muut vastaavat elektroniikkatuotteet
vi
e
m
ä
ll
ä
tuote
ta
i
tuotteet
vir
a
n
o
m
a
i
ste
n m
ää
r
ää
m
ää
n
kerä
y
spisteeseen. Laitteiston oikea hävittäminen estää
mahdolliset kielteiset vaikutukset
y
mpäristöön ja ihmisten
terve
y
teen. Lisätietoja vanhan laitteiston oikeasta hävit
y
stavasta
saa paikallisilta viranomaisilta, jätteenhävit
y
spalvelusta tai siitä
m
yy
mälästä, josta ostit tuotteen.
Svenska (Swedish) - Miljöin
f
ormation
f
ör kunder i
Europeiska unione
n
Det europeis
k
a
d
ire
k
tivet 2002/96/EC
k
räver att utrustning me
d
d
enna symbol p
å
produkten och/eller förpackningen inte f
å
r
k
astas med osorterat kommunalt av
f
all. Symbolen visar att denna
produkt bör kastas efter att den avskiljts fr
å
n vanligt hush
å
llsavfall.
Det faller p
å
ditt ansvar att kasta denna och annan elektrisk och
e
lektronisk utrustning p
å
fastställda insamlingsplatser utsedda
av regeringen e
ll
er
l
o
k
a
l
a myn
d
ig
h
eter. Korre
k
t
k
assering oc
h
å
tervinning skyddar mot eventuella negativa konsekvenser
f
ör miljön och personhälsa. För mer detaljerad in
f
ormation om
k
assering av
d
in gam
l
a utrustning
k
onta
k
tar
d
u
d
ina
l
o
k
a
l
a
myndigheter, av
f
allshanteringen eller butiken där du köpte
pro
d
u
k
ten
.
WEB: For additional information,
p
lease visit
www.
l
in
k
s
y
s.com/internationa
l
31
Appendix F Software License Agreement
A
ppendix F: Software
L
icense Agreemen
t
S
oftware in Linksys Product
s
T
his product
f
rom Cisco-Linksys LLC or
f
rom one o
f
its
a
ffiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco
-
Links
y
s K.K. (“Links
y
s”) contains so
f
tware (including
f
irmware) originating
f
rom Linksys and its suppliers
a
nd may also contain software from the open source
communit
y
. An
y
so
f
tware originating
f
rom Links
y
s and its
suppliers is licensed under the Linksys So
f
tware License
A
greement contained at Schedule 1 below. You may also
b
e prompted to review and accept that Links
y
s So
f
tware
License A
g
reement upon installation o
f
the so
f
twar
e
A
ny software from the open source community is licensed
u
nder the speci
f
ic license terms applicable to that so
f
tware
m
ade available by Linksys at
www.linksys.com/gpl
ygp
or
as
p
rovided for in Schedules 2, 3 and 4 below
.
W
here such speci
f
ic license terms entitle
y
ou to the source
code o
f
such so
f
tware, that source code is upon request
a
vailable at cost from Linksys for at least three years
f
rom the purchase date o
f
this product and ma
y
also be
a
v
a
il
ab
l
e
fo
r
do
wnl
oad
f
r
o
m
www.linksys.com/gpl
ygp
.
F
o
r
detailed license terms and additional information on
open source so
f
tware in Links
y
s products please look at
the Linksys public web site at:
www.linksys.com/gpl/
ygp
or
S
chedules 2, 3 or 4 below as a
pp
licable
.
BY D
O
WNL
O
ADING
O
R IN
S
TALLING THE
SO
FTWARE
,
O
R U
S
ING THE PR
O
DU
C
T
CO
NTAINING THE
SO
FTWARE,
YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE
LI
C
EN
S
E AGREEMENT
S
BEL
O
W. IF Y
O
U D
O
N
O
T AGREE T
O
A
LL
O
F THE
S
E TERM
S
, THEN Y
O
U MAY N
O
T D
O
WNL
O
AD,
INSTALL OR USE THE SOFTWARE. YOU MAY RETURN
UNUSED SOFTWARE
(
OR
,
IF THE SOFTWARE IS SUPPLIED
A
S PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT
)
FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL
PUR
C
HA
S
E
,
S
UBJE
C
T T
O
THE RETURN PR
OC
E
SS
AND
P
O
LI
C
IE
S
O
F THE PARTY FR
O
M WHI
C
H Y
OU
P
U
R
C
HA
S
ED
S
UCH PRODUCT OR SOFTWARE
.
S
oftware Licenses
T
he so
f
tware Licenses applicable to so
f
tware
f
rom Linksys
a
re made available at the Linksys public web site at:
www.linksys.com
y
. For
y
our convenience o
f
re
f
erence, a
copy o
f
the Linksys So
f
tware License Agreement and the
m
ain open source code licenses used by Linksys in its
p
ro
d
ucts are containe
d
in t
h
e Sc
h
e
d
u
l
es
b
e
l
ow
.
Schedule 1 - Links
y
s So
f
tware License Agreemen
t
T
HI
S
LI
C
EN
S
E AGREEMENT I
S
BETWEEN Y
OU
AND
CISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO
S
YSTEMS-LINKSYS
(
ASIA
)
PTE LTD. OR CISCO-LINKSYS
K.K.
(
“LINKSYS”
)
LICENSING THE SOFTWARE INSTEAD OF
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING
T
HE
SO
FTWARE
,
O
R U
S
ING THE PR
O
DU
C
T
CO
NTAINING
T
HE
SO
FTWARE, Y
O
U ARE
CO
N
S
ENTING T
O
BE B
O
UND BY
T
HIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESE
T
ERM
S,
THEN Y
O
U MAY N
O
T D
O
WNL
O
AD
,
IN
S
TALL
O
R U
S
E
T
HE
SO
FTWARE
.
Y
OU
MAY RET
U
RN
U
N
US
ED
SO
FTWARE
(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER
PRODUCT
,
THE UNUSED PRODUCT
)
FOR A FULL REFUND
UP T
O
30 DAY
S
AFTER
O
RIGINAL PUR
C
HA
S
E,
S
UBJE
C
T T
O
T
HE RETURN PROCESS AND POLICIES OF THE PARTY FROM
W
HI
C
H Y
O
U PUR
C
HA
S
ED
S
U
C
H PR
O
DU
C
T
O
R
SO
FTWARE
.
L
ice
n
se
.Sub
j
ect to the terms and conditions o
f
this
A
greement, Linksys grants the original end user purchaser
o
f
the Links
y
s product containing the So
f
tware (“You”)
a
nonexclusive license to use the So
f
tware solely as
embedded in or (where authorized in the a
pp
licable
documentation)
f
or communication with such product.
T
his license may not be sublicensed, and is not trans
f
erable
except to a person or entity to which you transfer
ownership o
f
the complete Links
y
s product containing
the So
f
tware, provided you permanently trans
f
er all rights
u
nder this Agreement and do not retain any full or partial
copies o
f
the So
f
tware, and the recipient agrees to the
terms o
f
this A
g
reement
.
“
Software” includes, and this Agreement will apply to
(
a
)
the so
f
tware o
f
Links
y
s or its suppliers provided in or
with the applicable Linksys product, excluding technology
f
rom the open source community, and (b) any upgrades,
u
pdates, bug
f
ixes or modi
f
ied versions (“Upgrades”) or
b
ackup copies o
f
the So
f
tware supplied to You by Linksys
or an authorized reseller, provided you already hold a
valid license to the original so
f
tware and have paid an
y
a
pplicable
f
ee
f
or the Up
g
rade.
Protection of Information
.
The Software and
d
ocumentation contain tra
d
e secrets an
d
/or cop
y
rig
h
te
d
m
aterials o
f
Linksys or its suppliers. You will not copy
or modify the Software or decompile, decrypt, reverse
engineer or disassemble the So
f
tware (except to the
extent expressly permitted by law notwithstanding this
p
rovision), and You will not disclose or make available
such trade secrets or cop
y
righted material in an
y
f
orm
to any third party. Title to and ownership o
f
the So
f
tware
a
nd documentation and any portion thereof, will remain
so
l
e
ly
wit
h
Lin
k
s
y
s or its supp
l
iers
.
Collection and Processin
g
o
f
In
f
ormation
.
You a
g
ree that
Linksys and/or its affiliates may, from time to time, collect
a
nd process in
f
ormation about
y
our Links
y
s product and
/
or the So
f
tware and/or your use o
f
either in order (i) to
enable Linksys to offer you Upgrades; (ii) to ensure that
32
Appendix F Software License Agreement
your Linksys product and/or the Software is being used in
a
ccordance with the terms o
f
this Agreement; (iii) to provide
i
mprovements to the way Linksys delivers technology to
you and to other Linksys customers; (iv) to enable Linksys
to compl
y
with the terms o
f
an
y
agreements it has with
a
ny third parties regarding your Linksys product and/or
S
oftware and/or (v) to enable Linksys to comply with all
a
pp
l
ica
bl
e
l
aws an
d
/or regu
l
ations, or t
h
e requirements
o
f
any regulatory authority or government agency.
Linksys and/ or its affiliates may collect and process
this in
f
ormation provided that it does not identi
fy
y
ou
p
ersonally. Your use o
f
your Linksys product and/or the
S
oftware constitutes this consent by you to Linksys and
/
or its a
ff
iliates’ collection and use o
f
such in
f
ormation and
,
f
or EEA customers, to the trans
f
er o
f
such in
f
ormation to a
location outside the EEA
.
So
f
tware Upgrades etc
.
I
f
the So
f
tware enables
y
ou to
r
eceive Upgrades, you may elect at any time to receive
these Upgrades either automatically or manually. If you
e
l
ect to receive Upgra
d
es manua
lly
or
y
ou ot
h
erwise
elect not to receive or be noti
f
ied o
f
any Upgrades, you
m
ay expose your Linksys product and/or the Software
to serious securit
y
threats and/or some
f
eatures within
your Linksys product and/or So
f
tware may become
i
naccessible. There may be circumstances where we
a
pp
ly
an Upgra
d
e automatica
lly
in or
d
er to comp
ly
wit
h
changes in legislation, legal or regulatory requirements
or as a result of requirements to comply with the terms
o
f
an
y
agreements Links
y
s has with an
y
third parties
r
egarding your Linksys product and/or the So
f
tware. You
will always be notified of any Upgrades being delivered
to
y
ou. The terms o
f
this license will appl
y
to an
y
such
Up
g
rade unless the Up
g
rade in question is accompanied
b
y a separate license, in which event the terms of that
l
icense wi
ll
app
ly.
O
p
en Source So
f
tware
.
The GPL or other o
p
en source
code incor
p
orated into the Software and the o
p
en source
license
f
or such source code are available
f
or
f
ree download
at
http://www.linksys.com/gpl
pygp
. I
f
You would like a copy
of the GPL or other o
p
en source code in this Software on a
CD, Links
y
s will mail to You a CD with such code for $9.99
p
lus the cost o
f
shippin
g
, upon request
.
Term and Termination. You may terminate this License
a
t an
y
time b
y
destro
y
ing all copies o
f
the So
f
tware
a
nd documentation. Your ri
g
hts under this License will
terminate immediately without notice from Linksys if You
f
ail to compl
y
with an
y
provision o
f
this Agreement
.
Limited Warranty
.
The warranty terms and period
specified in the applicable Linksys Product User Guide
shall also appl
y
to the So
f
tware
.
Di
sc
l
a
im
e
r
of
Li
ab
ili
t
i
es
. IN N
O
EVENT WILL LINK
S
Y
S
O
R
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA
,
REVENUE
O
R PR
O
FIT
,
O
R F
O
R
S
PE
C
IAL
,
INDIRE
C
T
,
CO
N
S
E
Q
UENTIAL
,
IN
C
IDENTAL
O
R PUNITIVE DAMAGE
S
, REGARDLE
SS
O
F
CAUSE (INCLUDING NEGLIGENCE)
,
ARISING OUT OF
OR RELATED TO THE USE OF OR INABILITY TO USE THE
SO
FTWARE
,
EVEN IF LINK
S
Y
S
HA
S
BEEN ADVI
S
ED
O
F
T
HE P
OSS
IBILITY
O
F
SUC
H DAMAGE
S.
IN N
O
EVENT WILL
LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU
FOR THE PRODUCT. The
f
oregoing limitations will appl
y
even i
f
any warranty or remedy under this Agreement
f
ails
of its essential purpose. Some jurisdictions do not allow
the exclusion or limitation o
f
incidental or consequential
damages, so the above limitation or exclusion may not
a
pply to You.
E
xport. So
f
tware, including technical data, ma
y
be subject
to U.S. export control laws and re
g
ulations and/or export
or import regulations in other countries. You agree to
comp
ly
strict
ly
wit
h
a
ll
suc
h
l
aws an
d
regu
l
ations
.
U
.
S
. G
o
v
e
rnm
e
n
t
Use
r
s.
Th
e
Soft
w
a
r
e
a
n
d
docu
m
e
n
tat
i
o
n
qualify as “commercial items” as defined at 48 C.F.R. 2.101
a
n
d
48 C.F.R. 12.212. A
ll
Government users acquire t
h
e
S
o
f
tware and documentation with only those rights
herein that apply to non-governmental customers
.
Genera
l
Terms
.
T
h
is Agreement wi
ll
b
e governe
d
by
an
d
co
n
st
r
ued
in
acco
r
da
n
ce
wi
t
h
t
h
e
l
a
w
s
of
t
h
e
State
of
California, without reference to conflict of laws
p
rinci
p
les.
T
he United Nations Convention on Contracts
f
or the
International Sale o
f
Goods will not apply. I
f
any portion
of this Agreement is found to be void or unenforceable,
the remaining provisions will remain in
f
ull
f
orce and
e
ff
ect. This A
g
reement constitutes the entire a
g
reement
b
etween the
p
arties with res
p
ect to the Software and
supersedes an
y
con
f
licting or additional terms contained
i
n any purchase order or elsewhere
.
END OF SCHEDULE 1
Sc
h
e
dul
e
2
If this Linksys product contains open source software
licensed under Version 2 o
f
the “GNU General Public
Li
ce
n
se
”
t
h
e
n
t
h
e
li
ce
n
se
te
rm
s
be
l
o
w in
t
hi
s
Sc
h
edu
l
e
2
will apply to that open source software. The license terms
b
elow in this Schedule 2 are
f
rom the public web site at
http://www.gnu.org/copyleft/gpl.html
pggpygp
GNU GENERAL PUBLIC LICENS
E
Version 2
,
June 1991
Cop
y
right © 1989, 1991 Free So
f
tware Foundation, Inc.
5
1 Franklin Street, Fi
f
th Floor, Boston, MA 02110-1301,
US
A
Ever
y
one is permitte
d
to cop
y
an
d
d
istri
b
ute ver
b
atim
copies o
f
this license document, but chan
g
in
g
it is not
a
llowed
.
P
re
a
m
bl
e
T
he licenses
f
or most so
f
tware are designed to take awa
y
your
f
reedom to share and change it. By contrast, the
33
Appendix F Software License Agreement
GNU General Public License is intended to guarantee your
f
reedom to share and change
f
ree so
f
tware–to make sure
t
h
e
soft
w
a
r
e
i
s
f
r
ee
fo
r
a
ll i
ts
use
r
s.
Thi
s
G
e
n
e
r
a
l P
ub
li
c
License a
pp
lies to most of the Free Software Foundation’s
so
f
tware and to an
y
other program whose authors
commit to usin
g
it. (Some other Free So
f
tware Foundation
software is covered by the GNU Lesser General Public
License instea
d
.) You can app
ly
it to
y
our programs, too.
W
hen we speak o
f
f
ree so
f
tware, we are re
f
errin
g
to
f
reedom, not
p
rice. Our General Public Licenses are
designed to make sure that
y
ou have the
f
reedom to
distribute copies o
f
f
ree so
f
tware (and char
g
e
f
or this
service if you wish), that you receive source code or can
get it i
f
y
ou want it, that
y
ou can change the so
f
tware or
u
se pieces o
f
it in new
f
ree programs; and that you know
you can do these things.
T
o protect
y
our rig
h
ts, we nee
d
to ma
k
e restrictions t
h
at
f
orbid anyone to deny you these rights or to ask you to
surrender the rights. These restrictions translate to certain
r
esponsibilities
f
or
y
ou i
f
y
ou distribute copies o
f
the
so
f
tware, or i
f
you modi
f
y it.
For example, if you distribute copies of such a program,
whether gratis or
f
or a
f
ee,
y
ou must give the recipients
a
ll the rights that you have. You must make sure that they,
too, receive or can get the source code. And you must
s
h
ow t
h
em t
h
ese terms so t
h
e
y
k
now t
h
eir rig
h
ts.
W
e protect your rights with two steps: (1) copyright the
software, and (2) offer you this license which gives you
legal permission to cop
y
, distribute and/or modi
fy
the
soft
w
a
r
e.
A
lso, for each author’s
p
rotection and ours, we want to
m
a
k
e certain t
h
at ever
y
one un
d
erstan
d
s t
h
at t
h
ere is no
warranty
f
or this
f
ree so
f
tware. I
f
the so
f
tware is modi
f
ied
b
y someone else and passed on, we want its recipients
to
k
now t
h
at w
h
at t
h
e
y
h
ave is not t
h
e origina
l
, so t
h
at
a
ny problems introduced by others will not re
f
lect on the
original authors’ reputations.
Finall
y
, an
y
f
ree program is threatened constantl
y
b
y
so
f
tware patents. We wish to avoid the dan
g
er that
r
edistributors of a free program will individually obtain
p
atent licenses, in e
ff
ect making the program proprietar
y
.
T
o prevent this, we have made it clear that any patent must
b
e licensed for everyone’s free use or not licensed at all.
T
he precise terms and conditions
f
or cop
y
ing, distribution
a
n
d
m
od
i
f
i
cat
i
o
n
fo
ll
o
w
.
TERMS AND C
O
NDITI
O
NS F
O
R C
O
PYING, DISTRIBUTI
O
N AND
MO
DIFICATI
ON
T
his License applies to any program or other wor
k
0.
w
h
ic
h
contains a notice p
l
ace
d
by
t
h
e cop
y
rig
h
t
holder saying it may be distributed under the terms
of this General Public License. The “Program”, below,
r
e
f
ers to an
y
such program or work, and a “wor
k
b
ased on the Pro
g
ram” means either the Pro
g
ram
or any derivative work under copyright law: that is
to sa
y
, a wor
k
containing t
h
e Program or a portion
o
f
it, either verbatim or with modi
f
ications and
/
or translated into another language. (Hereinafter,
trans
l
ation is inc
l
u
d
e
d
wit
h
out
l
imitation in t
h
e term
“
modi
f
ication”.) Each licensee is addressed as “you”.
A
ctivities ot
h
er t
h
an cop
y
ing,
d
istri
b
ution an
d
m
odi
f
ication are not covered by this License; they
a
re outside its scope. The act of running the Program
i
s not restricted, and the output
f
rom the Program is
covered only i
f
its contents constitute a work based on
the Program (independent of having been made by
r
unning t
h
e Program). W
h
et
h
er t
h
at is true
d
epen
d
s
on what the Pro
g
ram does.
You may copy and distribute verbatim copies of the
1.
Program’s source co
d
e as
y
ou receive it, in an
y
me
d
ium,
p
rovided that you conspicuously and appropriately
p
ublish on each copy an appropriate copyright
n
otice and disclaimer o
f
warrant
y
; keep intact all the
not
i
ces
t
h
at
r
efe
r
to
t
hi
s
Li
ce
n
se
a
n
d
to
t
h
e
abse
n
ce
of any warranty; and give any other recipients of the
Program a cop
y
o
f
this License along with the Program.
You may charge a fee for the physical act of transferring
a
cop
y
, and
y
ou ma
y
at
y
our option o
ff
er warrant
y
p
rotection in exchan
g
e
f
or a
f
ee.
You may modify your copy or copies of the Program
2.
or an
y
portion o
f
it, thus
f
orming a work based on the
Program, and copy and distribute such modi
f
ications
or work under the terms of Section 1 above,
p
rovided
that
y
ou also meet all o
f
these conditions:
You must cause the modi
f
ied
f
iles to carry
a.
p
rominent notices stating that you changed the
f
iles and the date o
f
an
y
change.
You must cause any work that you distribute or
b.
p
ublish, that in whole or in
p
art contains or is
derived
f
rom the Program or an
y
part thereo
f
, to be
licensed as a whole at no char
g
e to all third parties
u
nder the terms of this License.
34
Appendix F Software License Agreement
If the modified program normally reads commandsc.
i
nteractive
ly
w
h
en run,
y
ou must cause it, w
h
en
started runnin
g
f
or such interactive use in the most
ordinary way, to print or display an announcement
i
nc
l
u
d
ing an appropriate cop
y
rig
h
t notice an
d
a
notice that there is no warranty (or else, saying
that you provide a warranty) and that users may
r
e
d
istri
b
ute t
h
e program un
d
er t
h
ese con
d
itions,
a
nd telling the user how to view a copy o
f
this License. (Exception: if the Program itself is
i
nteractive
b
ut
d
oes not norma
lly
print suc
h
an
a
nnouncement, your work based on the Program
i
s not re
q
uired to
p
rint an announcement.)
T
hese requirements appl
y
to the modi
f
ied work as
a
wh
o
l
e.
I
f
i
de
n
t
i
f
i
ab
l
e
sect
i
o
n
s
of
t
h
at
w
o
rk
a
r
e
n
ot
derived from the Program, and can be reasonably
consi
d
ere
d
in
d
epen
d
ent an
d
separate wor
k
s in
themselves, then this License, and its terms, do not
a
pply to those sections when you distribute them as
separate wor
k
s. But w
h
en
y
ou
d
istri
b
ute t
h
e same
sections as part o
f
a whole which is a work based on
the Program, the distribution of the whole must be on
the terms o
f
this License, whose permissions
f
or other
licensees extend to the entire whole, and thus to each
a
nd every part regardless of who wrote it.
T
hus, it is not the intent o
f
this section to claim rights
or contest your rights to work written entirely by you;
r
ather, the intent is to exercise the right to control the
distribution o
f
derivative or collective works based on
the Pro
g
ram.
In addition, mere aggregation of another work not
b
ase
d
on t
h
e Program wit
h
t
h
e Program (or wit
h
a
work based on the Pro
g
ram) on a volume o
f
a stora
g
e
or distribution medium does not bring the other wor
k
u
nder the scope o
f
this License.
You may copy and distribute the Program (or a
3.
work based on it, under Section 2) in object code or
executable
f
orm under the terms o
f
Sections 1 and 2
a
bove provided that you also do one o
f
the
f
ollowing:
A
ccompany it with the complete corresponding
a
.
m
ac
h
ine-rea
d
a
bl
e source co
d
e
,
w
h
ic
h
must
b
e
d
i
st
ri
buted
u
n
de
r
t
h
e
te
rm
s
of
Sect
i
o
n
s
1
a
n
d
2
a
bove on a medium customarily used for software
i
nterc
h
ange; or,
A
ccompany it with a written o
ff
er, valid
f
or at least
b.
three years, to give any third party, for a charge
n
o more than
y
our cost o
f
ph
y
sicall
y
per
f
orming
source distribution, a complete machine-readable
copy of the corresponding source code, to be
distributed under the terms o
f
Sections 1 and 2
a
bove on a medium customarily used
f
or so
f
tware
i
nterchange; or,
A
ccompany it with the information you received asc.
to the o
ff
er to distribute corresponding source code.
(This alternative is allowed only
f
or noncommercial
distribution and only if you received the program
i
n ob
j
ect code or executable
f
orm with such an
o
ff
er, in accord with Subsection b above.)
T
he source code for a work means the
p
referred form
o
f
the work
f
or making modi
f
ications to it. For an
executable work, com
p
lete source code means all
the source code for all modules it contains, plus any
a
ssociated inter
f
ace de
f
inition
f
iles, plus the scripts
u
sed to control com
p
ilation and installation o
f
the
executable. However, as a s
p
ecial exce
p
tion, the source
co
d
e
d
istri
b
ute
d
nee
d
not inc
l
u
d
e an
y
t
h
ing t
h
at is
n
ormally distributed (in either source or binary
f
orm)
with the major components (compiler, kernel, and so
on) o
f
the operating s
y
stem on which the executable
r
uns, unless that com
p
onent itsel
f
accom
p
anies the
executable.
I
f
distribution o
f
executable or ob
j
ect code is made
b
y o
ff
ering access to copy
f
rom a designated place,
then offering equivalent access to copy the source
code
f
rom the same place counts as distribution o
f
the source code, even thou
g
h third parties are not
compelled to copy the source along with the object
co
d
e.
You may not copy, modi
f
y, sublicense, or distribute
4.
the Program except as expressly provided under
this License. An
y
attempt otherwise to cop
y
, modi
fy
,
sublicense or distribute the Pro
g
ram is void, and will
a
utomatically terminate your rights under this License.
However, parties w
h
o
h
ave receive
d
copies, or rig
h
ts,
f
rom you under this License will not have their licenses
terminated so long as such parties remain in full
comp
l
iance.
You are not required to accept this License, since you
5.
have not signed it. However, nothing else grants you
p
ermission to modi
fy
or distribute the Program or its
derivative works. These actions are prohibited by law i
f
you do not accept this License. Therefore, by modifying
or
d
istri
b
uting t
h
e Program (or an
y
wor
k
b
ase
d
on t
h
e
Program), you indicate your acceptance o
f
this License
to do so, and all its terms and conditions for copying,
distributing or modi
fy
ing the Program or works based
o
n i
t.
Each time you redistribute the Program (or any wor
k
6.
b
ase
d
on t
h
e Program), t
h
e recipient automatica
lly
r
eceives a license
f
rom the original licensor to copy,
distribute or modify the Program subject to these
terms and conditions. You ma
y
not impose an
y
f
urther
r
estrictions on the recipients’ exercise o
f
the ri
g
hts
granted herein. You are not responsible for enforcing
comp
l
iance
by
t
h
ir
d
parties to t
h
is License.
35
Appendix F Software License Agreement
If, as a consequence of a court judgment or allegation7
.
o
f
patent in
f
ringement or
f
or an
y
other reason (not
limited to patent issues), conditions are imposed on
you (whether by court order, agreement or otherwise)
that contradict the conditions o
f
this License, the
y
do
n
ot excuse you
f
rom the conditions o
f
this License. I
f
you cannot distribute so as to satisfy simultaneously
y
our o
bl
igations un
d
er t
h
is License an
d
an
y
ot
h
er
p
ertinent obligations, then as a consequence you
m
ay not distribute the Program at all. For example,
if
a patent license would not permit ro
y
alt
y
-
f
ree
r
edistribution o
f
the Program by all those who receive
copies directly or indirectly through you, then the only
wa
y
y
ou could satis
fy
both it and this License would be
to re
f
rain entirely
f
rom distribution o
f
the Program.
If any portion of this section is held invalid or
u
nen
f
orceable under an
y
particular circumstance,
the balance o
f
the section is intended to apply and
the section as a whole is intended to apply in other
c
i
rcumstances.
It is not the purpose o
f
this section to induce you to
i
nfringe any patents or other property right claims or
to contest validit
y
o
f
an
y
such claims; this section has
the sole purpose o
f
protecting the integrity o
f
the
f
ree
software distribution system, which is implemented
by
pu
bl
ic
l
icense practices. Man
y
peop
l
e
h
ave
m
ade
g
enerous contributions to the wide ran
g
e o
f
software distributed through that system in reliance
on consistent application o
f
that s
y
stem; it is up to
the author/donor to decide i
f
he or she is willin
g
to
distribute software through any other system and a
l
icensee cannot impose t
h
at c
h
oice.
T
his section is intended to make thoroughly clear
what is believed to be a conse
q
uence of the rest of this
L
i
cense.
I
f
the distribution and/or use o
f
the Pro
g
ram is
8.
r
estricted in certain countries either by patents or by
cop
y
righted inter
f
aces, the original cop
y
right holder
who places the Program under this License may add an
explicit geographical distribution limitation excluding
t
h
ose countries, so t
h
at
d
istri
b
ution is permitte
d
on
ly
i
n or amon
g
countries not thus excluded. In such case,
this License incor
p
orates the limitation as if written in
the bod
y
o
f
this License.
T
he Free So
f
tware Foundation may publish revised
9.
a
nd/or new versions of the General Public License
f
rom time to time. Such new versions will be similar in
spirit to the present version, but may di
ff
er in detail to
a
ddress new
p
roblems or concerns.
Eac
h
version is given a
d
istinguis
h
ing version num
b
er.
I
f
the Pro
g
ram speci
f
ies a version number o
f
this
License which applies to it and “any later version”, you
have the option o
f
f
ollowing the terms and conditions
either o
f
that version or o
f
any later version published
b
y the Free Software Foundation. If the Program does
n
ot specify a version number of this License, you
m
a
y
c
h
oose an
y
version ever pu
bl
is
h
e
d
by
t
h
e Free
Soft
w
a
r
e
F
ou
n
dat
i
o
n
.
If you wish to incorporate parts of the Program into
10.
other
f
ree programs whose distribution conditions are
di
ff
erent, write to the author to ask
f
or permission. For
software which is copyrighted by the Free Software
Foundation
,
write to the Free So
f
tware Foundation
;
we
sometimes make exce
p
tions
f
or this. Our decision will
b
e guided by the two goals of preserving the free status
o
f
all derivatives o
f
our
f
ree so
f
tware and o
f
promoting
the sharing and reuse o
f
so
f
tware generally.
NO
WARRANTY
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
1
1
.
T
HERE I
S
N
O
WARRANTY F
O
R THE PR
O
GRAM
,
T
O
THE
EXTENT PERMITTED BY APPLI
C
ABLE LAW
.
EX
C
EP
T
W
HEN OTHERWISE STATED IN WRITING THE COPYRIGH
T
H
O
LDER
S
AND
/O
R
O
THER PARTIE
S
PR
O
VIDE THE
PR
O
GRAM “A
S
I
S
” WITH
OU
T WARRANTY
O
F ANY
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT N
O
T LIMITED T
O,
THE IMPLIED WARRANTIE
S
O
F
MER
C
HANTABILITY AND FITNE
SS
F
O
R A PARTI
CU
LAR
PURPOSE. THE ENTIRE RISK AS TO THE
Q
UALITY AND
PERF
O
RMAN
C
E
O
F THE PR
O
GRAM I
S
WITH Y
O
U.
S
H
O
ULD THE PR
O
GRAM PR
O
VE DEFE
C
TIVE, Y
O
U
A
SSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR
O
R
CO
RRE
C
TI
O
N.
IN N
O
EVENT UNLE
SS
RE
Q
UIRED BY APPLI
C
ABLE LAW
O
R
12.
A
GREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,
O
R ANY
O
THER PARTY WH
O
MAY M
O
DIFY AND
/O
R
REDI
S
TRIBUTE THE PR
O
GRAM A
S
PERMITTED AB
O
VE,
BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL
,
S
PE
C
IAL
,
IN
C
IDENTAL
O
R
CO
N
S
E
Q
UENTIAL
DAMAGE
S
ARI
S
ING
OU
T
O
F THE
US
E
O
R INABILITY T
O
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO
L
OSS
O
F DATA
O
R DATA BEING RENDERED INA
CC
URATE
O
R L
OSS
E
S
SUS
TAINED BY Y
OU
O
R THIRD PARTIE
S
O
R
A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY
OTHER PROGRAMS
),
EVEN IF SUCH HOLDER OR OTHER
PARTY HA
S
BEEN ADVI
S
ED
O
F THE P
OSS
IBILITY
O
F
S
UCH DAMAGES.
END
O
F TERM
S
AND
CO
NDITI
O
N
S
END
O
F
SC
HED
U
LE
2
Sche
du
le
3
I
f
this Linksys product contains open source so
f
tware
licensed under Version 2.1 of the “GNU Lesser General Public
License” t
h
en t
h
e
l
icense terms
b
e
l
ow in t
h
is Sc
h
e
d
u
l
e 3
will apply to that open source so
f
tware. The license terms
b
elow in this Schedule 3 are from the
p
ublic web site at
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
pgg gp
.
36
Appendix F Software License Agreement
GNU LESSER GENERAL PUBLIC LICENS
E
Version 2.1, February 199
9
Cop
y
right (C) 1991, 1999 Free So
f
tware Foundation, Inc.
5
1 Franklin Street, Fi
f
th Floor, Boston, MA 02110-1301,
US
A
Ever
y
one is permitte
d
to cop
y
an
d
d
istri
b
ute ver
b
atim
copies o
f
this license document, but chan
g
in
g
it is not
a
llowed
.
[
This is the
f
irst released version o
f
the Lesser GPL. It also
counts as the successor o
f
the GNU Library Public License,
version 2
,
hence the version number 2.1.
]
P
ream
bl
e
T
he licenses
f
or most so
f
tware are designed to take awa
y
your
f
reedom to share and change it. By contrast, the GNU
General Public Licenses are intended to guarantee your
f
reedom to share and change
f
ree so
f
tware—to make
su
r
e
t
h
e
soft
w
a
r
e
i
s
f
r
ee
fo
r
a
ll i
ts
use
r
s.
T
his license, the Lesser General Public License, a
pp
lies to
some speciall
y
designated so
f
tware packages—t
y
picall
y
li
b
r
a
ri
es
—
of
t
h
e
Fr
ee
Soft
w
a
r
e
F
ou
n
dat
i
o
n
a
n
d
ot
h
e
r
a
uthors who decide to use it. You can use it too, but we
suggest
y
ou
f
irst think care
f
ull
y
about whether this license
or the ordinary General Public License is the better strategy
to use in any particular case, based on the explanations
b
e
l
ow.
W
hen we speak o
f
f
ree so
f
tware, we are re
f
errin
g
to
f
reedom of use, not
p
rice. Our General Public Licenses
a
re designed to make sure that
y
ou have the
f
reedom
to distribute copies o
f
f
ree so
f
tware (and char
g
e
f
or this
service if you wish); that you receive source code or can
get it i
f
y
ou want it; that
y
ou can change the so
f
tware and
u
se pieces o
f
it in new
f
ree programs; and that you are
i
nformed that you can do these things
.
T
o protect
y
our rig
h
ts, we nee
d
to ma
k
e restrictions t
h
at
f
orbid distributors to deny you these rights or to ask you
to surrender these rights. These restrictions translate to
certain responsibilities
f
or
y
ou i
f
y
ou distribute copies o
f
the library or i
f
you modi
f
y it
.
For example, if you distribute copies of the library,
whether gratis or
f
or a
f
ee,
y
ou must give the recipients
a
ll the rights that we gave you. You must make sure that
they, too, receive or can get the source code. If you lin
k
ot
h
er co
d
e wit
h
t
h
e
l
i
b
rar
y
,
y
ou must provi
d
e comp
l
ete
object
f
iles to the recipients, so that they can relink them
with the library after making changes to the library and
r
ecompi
l
ing it. An
d
y
ou must s
h
ow t
h
em t
h
ese terms so
they know their rights
.
W
e protect your rights with a two-step method: (1) we
cop
y
right the librar
y
, and (2) we o
ff
er
y
ou this license,
which gives you legal permission to copy, distribute and
/
or modify the library
.
T
o protect each distributor, we want to make it very clear
that there is no warrant
y
f
or the
f
ree librar
y
. Also, i
f
the
library is modi
f
ied by someone else and passed on, the
r
ecipients should know that what they have is not the
origina
l
version, so t
h
at t
h
e origina
l
aut
h
or’s reputation
will not be a
ff
ected by problems that might be introduced
b
y others.
Finall
y
, so
f
tware patents pose a constant threat to the
existence o
f
any
f
ree program. We wish to make sure
that a company cannot effectively restrict the users o
f
a
f
ree program b
y
obtaining a restrictive license
f
rom a
p
atent holder. There
f
ore, we insist that any patent license
obtained for a version of the library must be consistent
with the
f
ull
f
reedom o
f
use speci
f
ied in this license
.
Most GNU so
f
tware, includin
g
some libraries, is covered
b
y the ordinary GNU General Public License. This license,
t
h
e GNU Lesser Genera
l
Pu
bl
ic License, app
l
ies to certain
desi
g
nated libraries, and is quite di
ff
erent
f
rom the
ordinary General Public License. We use this license for
certain
l
i
b
raries in or
d
er to permit
l
in
k
ing t
h
ose
l
i
b
raries
i
nto non-
f
ree pro
g
rams.
W
hen a program is linked with a library, whether
staticall
y
or using a shared librar
y
, the combination o
f
the two is legally speaking a combined work, a derivative
of the original library. The ordinary General Public
License there
f
ore permits such linking onl
y
i
f
the entire
co
m
b
in
at
i
o
n
f
i
ts
i
ts
c
ri
te
ri
a
of
f
r
eedo
m
.
Th
e
L
esse
r G
e
n
e
r
a
l
Public License permits more lax criteria for linking other
co
d
e wit
h
t
h
e
l
i
b
rar
y.
We
ca
ll
t
hi
s
li
ce
n
se
t
h
e
“L
esse
r” G
e
n
e
r
a
l P
ub
li
c
Li
ce
n
se
b
ecause it does Less to
p
rotect the user’s freedom than
t
h
e or
d
inar
y
Genera
l
Pu
bl
ic License. It a
l
so provi
d
es
other
f
ree so
f
tware developers Less o
f
an advanta
g
e over
competing non-free programs. These disadvantages are
t
h
e reason we use t
h
e or
d
inar
y
Genera
l
Pu
bl
ic License
f
or many libraries. However, the Lesser license provides
a
dvantages in certain special circumstances
.
For examp
l
e, on rare occasions, t
h
ere ma
y
b
e a specia
l
n
eed to encoura
g
e the widest possible use o
f
a certain
library, so that it becomes a de-facto standard. To achieve
this, non-
f
ree programs must be allowed to use the librar
y
.
A
more
f
requent case is that a
f
ree library does the same
job as widely used non-free libraries. In this case, there is
little to gain b
y
limiting the
f
ree librar
y
to
f
ree so
f
tware
only, so we use the Lesser General Public License
.
In other cases, permission to use a particular library in non
-
f
ree programs enables a greater number o
f
people to use
a
large body o
f
f
ree so
f
tware. For example, permission to
u
se the GNU C Library in non-free programs enables many
m
ore peop
l
e to use t
h
e w
h
o
l
e GNU operating s
y
stem, as
well as its variant, the GNU/Linux operating system
.
A
lthough the Lesser General Public License is Less
p
rotective o
f
the users’
f
reedom, it does ensure that the
u
ser o
f
a program that is linked with the Library has the
37
Appendix F Software License Agreement
f
reedom and the wherewithal to run that program using a
m
odi
f
ied version o
f
the Librar
y.
T
he precise terms and conditions
f
or copying, distribution
a
nd modification follow. Pay close attention to the
di
ff
erence between a “work based on the librar
y
” and a
“
work that uses the library”. The
f
ormer contains code
derived from the library, whereas the latter must be
com
b
ine
d
wit
h
t
h
e
l
i
b
rar
y
in or
d
er to run
.
G
N
U
LE
SS
ER
G
ENERAL P
U
BLI
C
LI
C
EN
SE
TERMS AND CONDITIONS FOR COPYING
,
DISTRIBUTION AND
MO
DIFICATI
ON
T
his License Agreement applies to any so
f
tware library
0.
or other program which contains a notice placed by
t
h
e cop
y
rig
h
t
h
o
ld
er or ot
h
er aut
h
orize
d
part
y
sa
y
ing
i
t may be distributed under the terms o
f
this Lesser
General Public License (also called “this License”). Each
l
icensee is a
dd
resse
d
as “
y
ou”.
A
“library” means a collection o
f
so
f
tware
f
unctions
a
nd/or data prepared so as to be conveniently linked
with application programs (which use some o
f
those
f
unctions and data
)
to
f
orm executables
.
T
he “Library”, below, refers to any such software library
or wor
k
w
h
ic
h
h
as
b
een
d
istri
b
ute
d
un
d
er t
h
ese terms.
A
“work based on the Library” means either the Library
or any derivative work under copyright law: that is to
sa
y
, a work containing the Librar
y
or a portion o
f
it,
either verbatim or with modi
f
ications and
/
or translated
straightforwardly into another language. (Hereinafter,
trans
l
ation is inc
l
u
d
e
d
wit
h
out
l
imitation in t
h
e term
“
modi
f
ication”.
)
“
Source code” for a work means the
p
referred form o
f
the work
f
or making modi
f
ications to it. For a librar
y
,
com
p
lete source code means all the source code
f
or
a
ll modules it contains, plus any associated interface
de
f
inition
f
iles, plus the scripts used to control
compilation and installation o
f
the library
.
A
ctivities other than copying, distribution and
m
odi
f
ication are not covered b
y
this License; the
y
are
outside its scope. The act o
f
runnin
g
a pro
g
ram usin
g
the Library is not restricted, and output from such a
p
rogram is covered onl
y
i
f
its contents constitute a
work based on the Library (independent o
f
the use
of the Library in a tool for writing it). Whether that is
true
d
epen
d
s on w
h
at t
h
e Li
b
rar
y
d
oes an
d
w
h
at t
h
e
p
rogram that uses the Library does
.
You may copy and distribute verbatim copies of the
1.
Li
b
rar
y
’s comp
l
ete source co
d
e as
y
ou receive it, in
a
ny medium, provided that you conspicuously and
a
ppropriately publish on each copy an appropriate
cop
y
right notice and disclaimer o
f
warrant
y
; keep
i
n
tact
a
ll
t
h
e
n
ot
i
ces
t
h
at
r
efe
r
to
t
hi
s
Li
ce
n
se
a
n
d
to
the absence of any warranty; and distribute a copy o
f
t
h
is License a
l
ong wit
h
t
h
e Li
b
rar
y.
You may charge a
f
ee
f
or the physical act o
f
trans
f
erring
a
copy, and you may at your option offer warranty
p
rotection in exchange
f
or a
f
ee
.
You may modi
f
y your copy or copies o
f
the Library or
2.
a
ny portion of it, thus forming a work based on the
Librar
y
, and cop
y
and distribute such modi
f
ications
or work under the terms o
f
Section 1 above,
p
rovided
that you also meet all of these conditions
:
T
he modi
f
ied work must itsel
f
be a so
f
tware
a)
library.
You must cause the files modified to carry
b)
p
rominent notices stating t
h
at
y
ou c
h
ange
d
t
h
e
f
iles and the date o
f
any change
.
You must cause the whole of the work to bec
)
l
icense
d
at no c
h
arge to a
ll
t
h
ir
d
parties un
d
er t
h
e
te
rm
s
of
t
hi
s
Li
ce
n
se.
If a facility in the modified Library refers to a functiond
)
or a table o
f
data to be supplied b
y
an application
p
rogram that uses the
f
acility, other than as an
a
rgument passed when the facility is invoked, then
y
ou must make a good
f
aith e
ff
ort to ensure that,
i
n the event an application does not supply such
f
unction or table, the facility still operates, and
p
er
f
orms whatever part o
f
its purpose remains
m
eanin
gf
ul.
(For example, a function in a library to compute
square roots
h
as a purpose t
h
at is entire
ly
we
ll-
de
f
ined inde
p
endent o
f
the a
pp
lication. There
f
ore,
S
ubsection 2d requires that any application
-
supplied
f
unction or table used b
y
this
f
unction
m
ust be optional: i
f
the application does not supply
i
t, the s
q
uare root function must still com
p
ute
square roots.
)
T
hese requirements apply to the modi
f
ied work as
a
whole. If identifiable sections of that work are not
derived
f
rom the Librar
y
, and can be reasonabl
y
considered inde
p
endent and se
p
arate works in
themselves
,
then this License
,
and its terms
,
do
n
ot app
ly
to t
h
ose sections w
h
en
y
ou
d
istri
b
ute
them as separate works. But when you distribute
the same sections as
p
art of a whole which is a
work based on the Librar
y
, the distribution o
f
the
whole must be on the terms o
f
this License, whose
p
ermissions for other licensees extend to the entire
w
h
o
l
e, an
d
t
h
us to eac
h
an
d
ever
y
part regar
dl
ess
of
wh
o
wr
ote
i
t.
38
Appendix F Software License Agreement
T
hus, it is not the intent of this section to claim
r
ig
h
ts or contest
y
our rig
h
ts to wor
k
written entire
ly
b
y you; rather, the intent is to exercise the right to
control the distribution of derivative or collective
wor
k
s
b
ase
d
on t
h
e Li
b
rar
y.
In addition, mere a
gg
re
g
ation o
f
another wor
k
n
ot based on the Library with the Library (or with
a
work based on the Librar
y
) on a volume o
f
a
stora
g
e or distribution medium does not brin
g
the
other work under the sco
p
e of this License
.
You ma
y
opt to appl
y
the terms o
f
the ordinar
y
GNU
3.
G
e
n
e
r
a
l P
ub
li
c
Li
ce
n
se
in
stead
of
t
hi
s
Li
ce
n
se
to
a
given copy of the Library. To do this, you must alter all
the notices that re
f
er to this License, so that the
y
re
f
er
to the ordinary GNU General Public License, version
2, instead of to this License. (If a newer version than
version 2 o
f
the ordinar
y
GNU General Public License
has appeared, then you can speci
f
y that version
i
nstead if you wish.) Do not make any other change in
t
h
ese notices
.
Once this change is made in a given copy, it is
i
rreversible for that copy, so the ordinary GNU General
Pu
bl
ic License app
l
ies to a
ll
su
b
sequent copies an
d
derivative works made
f
rom that copy
.
T
his option is useful when you wish to copy part of the
code o
f
the Librar
y
into a program that is not a librar
y.
You may copy and distribute the Library (or a portion
4.
or derivative of it, under Section 2) in object code or
executable
f
orm under the terms o
f
Sections 1 and
2 above provided that you accompany it with the
complete corresponding machine-readable source
code
,
which must be distributed under the terms o
f
S
ections 1 and 2 above on a medium customarily used
f
or software interchange
.
I
f
distribution o
f
object code is made b
y
o
ff
ering
a
ccess to copy
f
rom a designated place, then o
ff
ering
equivalent access to copy the source code from the
same place satis
f
ies the requirement to distribute
the source code, even thou
g
h third parties are not
compelled to copy the source along with the object
co
d
e
.
A
program that contains no derivative o
f
any portion
5.
of the Library, but is designed to work with the Library
by
b
eing compi
l
e
d
or
l
in
k
e
d
wit
h
it, is ca
ll
e
d
a “wor
k
that uses the Library”. Such a work, in isolation, is not
a
derivative work of the Library, and therefore falls
outside the scope o
f
this License
.
However, linking a “work that uses the Library” with
the Library creates an executable that is a derivative
o
f
the Librar
y
(because it contains portions o
f
the
Library), rather than a “work that uses the library”. The
executable is therefore covered by this License. Section
6
states terms
f
or distribution o
f
such executables
.
W
hen a “work that uses the Library” uses material from
a
header
f
ile that is part o
f
the Librar
y
, the object code
f
or the work may be a derivative work o
f
the Library
even though the source code is not. Whether this is
true is especiall
y
signi
f
icant i
f
the work can be linked
without the Library, or i
f
the work is itsel
f
a library. The
threshold for this to be true is not precisely defined by
l
aw
.
I
f
such an object
f
ile uses only numerical parameters,
data structure layouts and accessors, and small macros
a
nd small inline
f
unctions (ten lines or less in length),
then the use o
f
the ob
j
ect
f
ile is unrestricted, regardless
of whether it is legally a derivative work. (Executables
containing this object code plus portions o
f
the Librar
y
will still
f
all under Section 6.
)
Otherwise, if the work is a derivative of the Library, you
m
a
y
distribute the object code
f
or the work under the
terms o
f
Section 6. Any executables containing that
work also fall under Section 6, whether or not they are
linked directl
y
with the Librar
y
itsel
f.
A
s an exception to the Sections above, you may also
6.
combine or link a “work that uses the Library” with the
Librar
y
to produce a work containing portions o
f
the
Library, and distribute that work under terms o
f
your
choice,
p
rovided that the terms
p
ermit modification
o
f
the work
f
or the customer’s own use and reverse
en
g
ineerin
g
f
or debu
gg
in
g
such modi
f
ications
.
You must give prominent notice with each copy o
f
t
h
e wor
k
t
h
at t
h
e Li
b
rar
y
is use
d
in it an
d
t
h
at t
h
e
Library and its use are covered by this License. You
m
ust supply a copy of this License. If the work during
execution
d
isp
l
a
y
s cop
y
rig
h
t notices,
y
ou must inc
l
u
d
e
the copyright notice
f
or the Library among them, as
well as a reference directing the user to the copy of this
License. Also,
y
ou must do one o
f
these things
:
A
ccompany the work with the complete
a)
corresponding machine-readable source code
f
or the Librar
y
including whatever changes were
u
sed in the work
(
which must be distributed
u
nder Sections 1 and 2 above)
;
and
,
if the wor
k
i
s an executa
bl
e
l
in
k
e
d
wit
h
t
h
e Li
b
rar
y
, wit
h
t
h
e
com
p
lete machine-readable “work that uses the
Library”, as object code and/or source code, so that
the user can modi
fy
the Librar
y
and then relin
k
to produce a modi
f
ied executable containin
g
the
m
odified Library. (It is understood that the user
who changes the contents o
f
de
f
initions
f
iles in the
Library will not necessarily be able to recompile the
app
lication to use the modified definitions.
)
39
Appendix F Software License Agreement
Use a suitable shared library mechanism for linking
b)
wit
h
t
h
e Li
b
rar
y
. A suita
bl
e mec
h
anism is one t
h
at
(1) uses at run time a copy o
f
the library already
p
resent on the user’s computer system, rather than
cop
y
ing librar
y
f
unctions into the executable, and
(2) will operate properly with a modi
f
ied version o
f
the library, if the user installs one, as long as the
m
odi
f
ied version is inter
f
ace-compatible with the
v
e
r
s
i
o
n
t
h
at
t
h
e
w
o
rk w
as
m
ade
wi
t
h
.
A
ccompany the work with a written offer, validc
)
f
or at least three
y
ears, to give the same user the
m
aterials s
p
eci
f
ied in Subsection 6a, above,
f
or a
charge no more than the cost of performing this
d
istri
b
ution
.
I
f
distribution o
f
the work is made by o
ff
ering accessd
)
to copy from a designated place, offer equivalent
a
ccess to cop
y
the above speci
f
ied materials
f
rom
the same place.
Verify that the user has already received a copy o
f
e
)
t
h
ese materia
l
s or t
h
at
y
ou
h
ave a
l
rea
dy
sent t
h
is
u
ser a copy
.
For an executable, the re
q
uired form of the “work that
u
ses t
h
e Li
b
rar
y
” must inc
l
u
d
e an
y
d
ata an
d
uti
l
it
y
p
ro
g
rams needed
f
or reproducin
g
the executable
f
rom
i
t. However, as a s
p
ecial exce
p
tion, the materials to be
d
istri
b
ute
d
nee
d
not inc
l
u
d
e an
y
t
h
ing t
h
at is norma
lly
distributed (in either source or binary
f
orm) with the
m
ajor components (compiler, kernel, and so on) of the
operating s
y
stem on w
h
ic
h
t
h
e executa
bl
e runs, un
l
ess
that com
p
onent itsel
f
accom
p
anies the executable
.
It may happen that this requirement contradicts the
license restrictions o
f
other proprietar
y
libraries that
do not normally accompany the operating system.
S
uch a contradiction means you cannot use both
t
h
em an
d
t
h
e Li
b
rar
y
toget
h
er in an executa
bl
e t
h
at
you distribute
.
You may place library facilities that are a work based7
.
on t
h
e Li
b
rar
y
si
d
e-
by
-si
d
e in a sing
l
e
l
i
b
rar
y
toget
h
er
with other library
f
acilities not covered by this License,
a
nd distribute such a combined library, provided that
the separate distribution o
f
the work based on the
Library and o
f
the other library
f
acilities is otherwise
p
ermitted, and provided that you do these two
t
h
ings
:
A
ccompany the combined library with a copy o
f
the
a)
same work based on the Library, uncombined with
a
n
y
other librar
y
f
acilities. This must be distributed
u
n
de
r
t
h
e
te
rm
s
of
t
h
e
Sect
i
o
n
s
abo
v
e.
Give prominent notice with the combined library o
f
b)
the
f
act that part o
f
it is a work based on the Librar
y
,
a
nd explaining where to
f
ind the accompanying
u
ncombined form of the same work
.
You may not copy, modify, sublicense, link with, or
8.
d
istri
b
ute t
h
e Li
b
rar
y
except as express
ly
provi
d
e
d
u
nder this License. Any attempt otherwise to copy,
m
odify, sublicense, link with, or distribute the Library
i
s voi
d
, an
d
wi
ll
automatica
lly
terminate
y
our rig
h
ts
u
nder this License. However, parties who have received
copies, or rights, from you under this License will not
h
ave t
h
eir
l
icenses terminate
d
so
l
ong as suc
h
parties
r
emain in
f
ull compliance
.
You are not required to accept this License, since you
9.
h
ave not signe
d
it. However, not
h
ing e
l
se grants
y
ou
p
ermission to modi
f
y or distribute the Library or its
derivative works. These actions are prohibited by law i
f
y
ou do not accept this License. There
f
ore, b
y
modi
fy
ing
or distributing the Library (or any work based on the
Library), you indicate your acceptance of this License
to do so, and all its terms and conditions
f
or cop
y
ing,
distributing or modi
f
ying the Library or works based
on it.
Eac
h
time
y
ou re
d
istri
b
ute t
h
e Li
b
rar
y
(or an
y
wor
k
1
0
.
b
ased on the Library), the recipient automatically
r
eceives a license from the original licensor to copy,
distribute, link with or modi
fy
the Librar
y
subject
to these terms and conditions. You may not impose
a
ny further restrictions on the recipients’ exercise o
f
t
h
e rig
h
ts grante
d
h
erein. You are not responsi
bl
e
f
or en
f
orcing compliance by third parties with this
License
.
I
f
, as a consequence o
f
a court
j
udgment or allegation
1
1
.
o
f
patent in
f
ringement or
f
or any other reason (not
limited to
p
atent issues), conditions are im
p
osed on
y
ou (w
h
et
h
er
by
court or
d
er, agreement or ot
h
erwise)
that contradict the conditions o
f
this License, they do
n
ot excuse you from the conditions of this License. I
f
y
ou cannot distribute so as to satis
fy
simultaneousl
y
your obligations under this License and any other
p
ertinent obligations, then as a consequence you may
n
ot distribute the Librar
y
at all. For example, i
f
a patent
license would not permit royalty-
f
ree redistribution o
f
the Library by all those who receive copies directly or
i
n
d
irect
ly
t
h
roug
h
y
ou, t
h
en t
h
e on
ly
wa
y
y
ou cou
ld
satis
f
y both it and this License would be to re
f
rain
entirely from distribution of the Library
.
I
f
an
y
portion o
f
this section is held invalid or
u
nen
f
orceable under any particular circumstance,
the balance of the section is intended to apply, and
t
h
e section as a w
h
o
l
e is inten
d
e
d
to app
ly
in ot
h
er
c
ir
cu
m
sta
n
ces.
It is not the purpose of this section to induce you to
i
n
f
ringe an
y
patents or other propert
y
right claims or
to contest validity o
f
any such claims; this section has
the sole purpose of protecting the integrity of the free
so
f
tware distribution s
y
stem which is implemented
b
y public license practices. Many people have
m
ade generous contributions to the wide range o
f
40
Appendix F Software License Agreement
software distributed through that system in reliance
on consistent application o
f
that s
y
stem; it is up to
the author/donor to decide i
f
he or she is willin
g
to
distribute software through any other system and a
l
icensee cannot impose t
h
at c
h
oice
.
T
his section is intended to make thoroughly clear
what is believed to be a conse
q
uence of the rest of this
L
i
cense
.
I
f
the distribution and/or use o
f
the Library is restricted
12.
i
n certain countries either by patents or by copyrighted
i
nter
f
aces, the original cop
y
right holder who places
the Library under this License may add an explicit
geographical distribution limitation excluding those
countries, so t
h
at
d
istri
b
ution is permitte
d
on
ly
in or
a
mon
g
countries not thus excluded. In such case, this
License incor
p
orates the limitation as if written in the
b
od
y
o
f
this License
.
T
he Free So
f
tware Foundation may publish revised
13.
a
nd/or new versions of the Lesser General Public
License
f
rom time to time. Such new versions will be
similar in spirit to the present version, but may di
ff
er in
detail to address new
p
roblems or concerns.
Eac
h
version is given a
d
istinguis
h
ing version num
b
er.
I
f
the Library speci
f
ies a version number o
f
this License
which applies to it and “any later version”, you have the
option o
f
f
ollowing the terms and conditions either o
f
that version or o
f
any later version published by the Free
S
oftware Foundation. If the Library does not specify a
l
icense version num
b
er,
y
ou ma
y
c
h
oose an
y
version
ever published by the Free So
f
tware Foundation
.
If you wish to incorporate parts of the Library into
1
4
.
other
f
ree programs whose distribution conditions are
i
ncom
p
atible with these, write to the author to ask
f
or
p
ermission. For software which is copyrighted by the
Free So
f
tware Foundation
,
write to the Free So
f
tware
Foundation; we sometimes make exce
p
tions
f
or
this. Our decision will be guided by the two goals o
f
p
reserving the
f
ree status o
f
all derivatives o
f
our
f
ree
so
f
tware and o
f
promotin
g
the sharin
g
and reuse o
f
software generally.
N
O
WARRANT
Y
BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE,
1
5
.
T
HERE I
S
N
O
WARRANTY F
O
R THE LIBRARY
,
T
O
THE
EXTENT PERMITTED BY APPLI
C
ABLE LAW
.
EX
C
EP
T
W
HEN OTHERWISE STATED IN WRITING THE COPYRIGH
T
H
O
LDER
S
AND
/O
R
O
THER PARTIE
S
PR
O
VIDE THE
LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,
EITHER EXPRESSED OR IMPLIED, INCLUDING, BU
T
N
O
T LIMITED T
O,
THE IMPLIED WARRANTIE
S
O
F
MER
C
HANTABILITY AND FITNE
SS
F
O
R A PARTI
CU
LAR
PURPOSE. THE ENTIRE RISK AS TO THE
Q
UALITY AND
PERF
O
RMAN
C
E
O
F THE LIBRARY I
S
WITH Y
O
U.
S
H
O
ULD
T
HE LIBRARY PR
O
VE DEFE
C
TIVE, Y
O
U A
SS
UME THE
COST OF ALL NECESSARY SERVICING, REPAIR OR
CO
RRE
C
TI
O
N
.
IN N
O
EVENT UNLE
SS
RE
Q
UIRED BY APPLI
C
ABLE LAW
16.
OR AGREED TO IN WRITING WILL ANY COPYRIGH
T
H
O
LDER
,
O
R ANY
O
THER PARTY WH
O
MAY M
O
DIFY
A
ND
/O
R REDI
S
TRIBUTE THE LIBRARY A
S
PERMITTED
A
BOVE, BE LIABLE TO YOU FOR DAMAGES,
IN
C
LUDING ANY GENERAL
,
S
PE
C
IAL
,
IN
C
IDENTAL
O
R
CO
N
S
E
Q
UENTIAL DAMAGE
S
ARI
S
ING
O
UT
O
F THE
USE OR INABILITY TO USE THE LIBRARY (INCLUDING
BUT N
O
T LIMITED T
O
L
OSS
O
F DATA
O
R DATA BEING
RENDERED INA
CCU
RATE
O
R L
OSS
E
S
SUS
TAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY
T
O OPERATE WITH ANY OTHER SOFTWARE
),
EVEN IF
SUC
H H
O
LDER
O
R
O
THER PARTY HA
S
BEEN ADVI
S
ED
OF THE POSSIBILITY OF SUCH DAMAGES
.
END
O
F TERM
S
AND
CO
NDITI
O
N
S
END
O
F
SC
HED
U
LE
3
Sche
du
le 4
I
f
this Linksys product contains open source so
f
tware
licensed under the O
p
enSSL license
:
T
his product includes so
f
tware developed b
y
the
OpenSSL Pro
j
ect
f
or use in the OpenSSL Toolkit.
(
http://www.openssl.org/
ppg
).
T
his product includes cr
y
ptographic so
f
tware written b
y
Eric Young (eay@cryptso
f
t.com)
.
T
his product includes software written by Tim Hudson
(tjh@cr
y
ptso
f
t.com)
.
In addition, i
f
this Linksys product contains open
source software licensed under the O
p
enSSL license
t
h
en t
h
e
l
icense terms
b
e
l
ow in t
h
is Sc
h
e
d
u
l
e 3 wi
ll
a
pply to that open source so
f
tware. The license terms
b
elow in this Schedule 3 are from the
p
ublic web site at
http://www.openssl.org/source/license.html
ppg
.
T
he OpenSSL toolkit stays under a dual license, i.e. both
the conditions of the OpenSSL License and the original
S
SLea
y
license appl
y
to the toolkit. See below
f
or the
a
ctual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related
to OpenSSL p
l
ease contact openss
l
-core@openss
l
.org
.
41
Appendix F Software License Agreement
Op
enSSL License
Copyright © 1998-2007 The OpenSSL Project. All rights
r
eserved
.
Redistribution and use in source and binar
y
f
orms, with
or without modi
f
ication, are
p
ermitted
p
rovided that the
f
ollowing conditions are met
:
Redistributions o
f
source code must retain the above
1.
copyright notice, this list o
f
conditions and the
f
ollowing disclaimer
.
Redistributions in binar
y
f
orm must reproduce the2
.
a
bove copyright notice, this list o
f
conditions and the
f
ollowing disclaimer in the documentation and/or
ot
h
er materia
l
s provi
d
e
d
wit
h
t
h
e
d
istri
b
ution
.
A
ll advertisin
g
materials mentionin
g
f
eatures or
3.
u
se of this software must display the following
a
cknowledgment: “This product includes so
f
tware
developed by the OpenSSL Project
f
or use in the
O
p
enSSL Toolkit.
(
http://www.openssl.org/
ppg
)
”
Th
e names “OpenSSL Too
lk
it” an
d
“OpenSSL Pro
j
ect
”
4.
m
ust not be used to endorse or
p
romote
p
roducts
derived from this software without
p
rior written
p
ermission. For written permission, p
l
ease contact
openssl-core@openssl.or
g.
Products derived from this software may not be called
5.
“
OpenSSL” nor ma
y
“OpenSSL” appear in t
h
eir names
without
p
rior written
p
ermission o
f
the O
p
enSSL
P
roject.
Redistributions o
f
an
y
f
orm whatsoever must retain
6.
the
f
ollowin
g
acknowled
g
ment: “This product includes
software developed by the OpenSSL Project for use in
t
h
e OpenSSL Too
lk
it
(
http://www.openssl.org/
ppg
)
”
T
HI
S
SO
FTWARE I
S
PR
O
VIDED BY THE
Op
en
SS
L PR
O
JE
CT
“
AS IS” AND ANY EXPRESSED OR IMPLIED WARRANTIES
,
IN
C
LUDING
,
BUT N
O
T LIMITED T
O,
THE IMPLIED
W
ARRANTIE
S
O
F MER
C
HANTABILITY AND FITNE
SS
F
O
R
A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVEN
T
S
HALL THE
O
pen
SS
L PR
O
JE
C
T
O
R IT
S
CO
NTRIBUT
O
R
S
BE
LIABLE F
O
R ANY DIRE
C
T, INDIRE
C
T, IN
C
IDENTAL,
S
PE
C
IAL,
EXEMPLARY
,
OR CONSEQUENTIAL DAMAGES (INCLUDING
,
BUT N
O
T LIMITED T
O,
PR
OC
UREMENT
O
F
S
UB
S
TITUTE
G
OO
D
S
O
R
S
ERVI
C
E
S
; L
OSS
O
F U
S
E, DATA,
O
R PR
O
FIT
S
;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
O
N ANY THE
O
RY
O
F LIABILITY
,
WHETHER IN
CO
NTRA
C
T
,
S
TRICT LIABILITY, OR TORT
(
INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
T
HI
S
SO
FTWARE
,
EVEN IF ADVI
S
ED
O
F THE P
OSS
IBILITY
O
F
SUC
H DAMAGE
.
T
his product includes cryptographic software written by
Eric Young (ea
y
@cr
y
ptso
f
t.com). This product includes
so
f
tware written by Tim Hudson (tjh@cryptso
f
t.com)
.
O
riginal SSLea
y
License
Copyright © 1995-1998 Eric Young (eay@cryptso
f
t.com)All
r
ights reserved.
Th
is pac
k
age is an SSL imp
l
ementation written
by
Eric
Young (eay@cryptso
f
t.com)
.
T
he im
p
lementation was written so as to conform with
Netscape
’
s SSL.
T
his library is
f
ree
f
or commercial and non-commercial
u
se as long as the following conditions are adhered to.
T
he
f
ollowing conditions appl
y
to all code
f
ound in this
distribution, be it the RC4, RSA, lhash, DES, etc., code; not
just the SSL code. The SSL documentation included with
t
h
is
d
istri
b
ution is covere
d
by
t
h
e same cop
y
rig
h
t terms
except that the holder is Tim Hudson (tjh@cryptso
f
t
.
com)
.
Cop
y
rig
h
t remains Eric Young’s, an
d
as suc
h
an
y
Cop
y
rig
h
t
not
i
ces
in
t
h
e
code
a
r
e
n
ot
to
be
r
e
m
o
v
ed.
If this package is used in a product, Eric Young should be
given attribution as the author o
f
the parts o
f
the librar
y
u
sed. This can be in the
f
orm o
f
a textual messa
g
e at
p
rogram startup or in documentation (online or textual)
p
rovi
d
e
d
wit
h
t
h
e pac
k
age
.
Redistribution and use in source and binary
f
orms, with
or without modification, are
p
ermitted
p
rovided that the
f
ollowing conditions are met
:
R
ed
i
st
ri
but
i
o
n
s
of
sou
r
ce
code
m
ust
r
eta
in
t
h
e
1.
copyright notice, this list of conditions and the
f
ollowing disclaimer
.
Redistributions in binary
f
orm must reproduce the
2.
a
bove copyright notice, this list of conditions and the
f
ollowing disclaimer in the documentation and/or
other materials
p
rovided with the distribution
.
A
ll advertising materials mentioning features or
3.
u
se o
f
this so
f
tware must displa
y
the
f
ollowing
a
cknowled
g
ement:
“
This product includes cryptographic software written
by
Eric Young (ea
y
@cr
y
ptso
f
t.com)
”
T
he word ‘cryptographic’ can be le
f
t out i
f
the routines
f
rom the library being used are not cryptographic
r
e
l
ate
d
.
I
f
you include any Windows speci
f
ic code (or a derivative
4.
thereof) from the apps directory (application code)
y
ou must inc
l
u
d
e an ac
k
now
l
e
d
gement: “T
h
is pro
d
uct
i
ncludes so
f
tware written by Tim Hudson (tjh
@
cryptsoft.com)
”
T
HIS SOFTWARE IS PROVIDED BY ERIC YOUNG
“
AS IS
”
AND
A
NY EXPRE
SS
O
R IMPLIED WARRANTIE
S
, IN
C
LUDING,
BUT NOT LIMITED TO
,
THE IMPLIED WARRANTIES OF
MER
C
HANTABILITY AND FITNE
SS
F
O
R A PARTI
C
ULAR
P
U
RP
OS
E ARE DI
SC
LAIMED
.
IN N
O
EVENT
S
HALL THE
A
UTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
42
Appendix F Software License Agreement
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available
version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another
distribution license [including the GNU Public License.]
END OF SCHEDULE 4
You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your
authority to operate the equipment.
FCC RF Radiation Exposure Statement:
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
REMARK
˜˘˘˘ʳˋ˃˅ˁ˄˄˵ʳ̂̅ʳˋ˃˅ˁ˄˄˺ʳ̂̃˸̅˴̇˼̂́ʳ̂˹ʳ̇˻˼̆ʳ̃̅̂˷̈˶̇ʳ˼́ʳ̇˻˸ʳ˨ˁ˦ˁ˔ˁʳ˼̆ʳ˹˼̅̀̊˴̅˸ˀ˿˼̀˼̇˸˷ʳ̇̂ʳ˶˻˴́́˸˿̆ʳ˄ʳ̇˻̅̂̈˺˻ʳ˄˄ˁ
ϘOperation is subject to the following two conditions:(1) this device may not cause
interference, and (2) this device must accept any interference, including interference
that may cause undesired operation of the device.”
REMARK
IEEE 802.11b or 802.11g operation of this product in the Canada is firmware-limited to channels 1 through 11.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may
not cause harmful interference and (2) this device must accept any interference received, including interference that may cause
undesired operation