NexAira 2400M-01 Wireless 802.11b/g/n Router User Manual

NexAira Inc. Wireless 802.11b/g/n Router

Users Manual

IntroductionFeaturesPackage ContentsSystemRequirementsWi-FiRequirementsHardware SetupWi-Fi ConnectionInitial 3G/4GSetupConfigurationBasic SettingsSetup WizardAdmin PasswordWi-Fi SettingsInterfacesCellular DatacardCard UpdatesNetwork Traffic User ManualIntroductionThe BC2400M High Availability Router is a high-performance device that supportswireless networking at home, work, or in a public place. Supports USB modems,and Mini PCI-e Modules. The BC2400M High Availability Router works with bothEVDO and HSDPA technologies. The BC2400M High Availability Router supportsup to 300 Mbps Wi-Fi, and 100 Mbps Ethernet.FeaturesNexWare’s quick and easy setup allows you to go where wires cannot, outside thehome or office. Fully compatible with the IEEE 802.11 b/g/n 2x2 mimo to provide awireless data transfer rate of up to 300 Mbps Wi-Fi 100 Mbps Ethernet. Backwardscompatible with the 802.11b IEEE standard. Operates in the Tx/Rx power18dbm/Per Cell, indoors approx. 35-100 meters and outdoors up to 100-300meters. Supports NAT with VPN pass-through. DHCP server enables all networkedcomputers to automatically receive IP addresses. Access Control for managingusers on the network. User-friendly configuration and diagnostic utilities.Supports special applications that require multiple connections. Equipped withtwo 10/100 Ethernet ports, one for LAN and one for WAN access, an Mini PCI-eModule port, and a USB port for 3G/4G network connections. Connects multiplecomputers to the Internet via a broadband EVDO, HSDPA network connection orvia cable/DSL connection. Please consult your service provider for more detailedinformation on wireless network standards. Customizable 3G/4G Auto-Failoverwith Anti-Flap. Virtual Router Redundancy Protocol (VRRP provides no singlepoint of failure). QoS (Quality of Service). Wireless Distribution System. SoftwareUser Manual
LogoutTool BoxSignal StrengthSystem SettingsEmailNotificationsSystem LogFlash FirmwareBackup/RestoreReset to DefaultsRebootLicenseAgreementAdvancedSettingsDHCPSNMPDynamic DNSQoSGPSSecuritySettingsRemote AdminIPsecSSH Serverdefinable Ethernet ports. 4G/WiMax Support.NexWare’s quick and easy setup allows you to go where wires cannot, outside thehome or office.Fully compatible with the IEEE 802.11 b/g/n 2x2 mimo to provide a wireless datatransfer rate of up to 300 Mbps Wi-Fi 100 Mbps Ethernet.Backwards compatible with the 802.11b IEEE standard.Operates in the Tx/Rx power 18dbm/Per Cell, indoors approx. 35-100 meters andoutdoors up to 100-300 meters.Supports NAT with VPN pass-through.DHCP server enables all networked computers to automatically receive IPaddresses.Access Control for managing users on the network.User-friendly configuration and diagnostic utilities.Supports special applications that require multiple connections.Equipped with two 10/100 Ethernet ports, one for LAN and one for WAN access,an ExpressCard port, and a USB port for 3G/4G network connections.Connects multiple computers to the Internet via a broadband EVDO, HSDPAnetwork connection or via cable/DSL connection. Please consult your serviceprovider for more detailed information on wireless network standards.Customizable 3G/4G Auto-Failover with Anti-Flap.Virtual Router Redundancy Protocol (VRRP provides no single point of failure).QoS (Quality of Service).Wireless Distribution System.Software definable Ethernet ports.4G/WiMax Support.Package ContentsImportant: Check the contents of the box first.The BC2400M High Availability Router package should contain the items listedbelow. If any of the items are missing, please contact your reseller.(1) BC2400M High Availability Router
SHH KeysRouting SettingsRoutesRIPDMZ HostVRRPInternet FailoverPort ForwardingUPnP(1) CD-ROM(1) RJ-45 Ethernet Cable(1) USB Cable(1) Switching 12V 1.25A Power Adapter(2) WiFi External RP-SMA Antennas(2) Ipex Coax CablesCaution: Using a power supply with a different voltage rating other than the oneincluded with the BC2400M will cause damage and void the warranty for thisproduct.System RequirementsCompatible with Mini PCI-e Module or USB 3G/4G modem card with activatedservice. NOTE: Subject to terms available from your carrier.Computer with Windows XP, Vista, Windows 7, Macintosh, or Linux-basedoperating system with an integrated Ethernet adapter or Wireless Wi-Fi 802.11 Ginterface. Internet Explorer, Firefox, Safari, and Google Chrome (for accessingweb-based configuration settings).Wi-Fi RequirementsIEEE 802.11 b/g/n adapter. NOTE: Mini PCI-e Modules, and USB modems need tobe activated through your cellular service provider prior to insertion into theBC2400M High Availability Router.Hardware SetupThe BC2400M High Availability Router allows you to access your network using a
wireless connection from virtually anywhere within its operating range. Pleasenote that location placement of the router could affect the wireless signal andrange limits.Typical ranges also vary depending on the types of materials and background RF(Radio Frequency) noise present in your networking environment.To maximize your wireless range, please follow these guidelines:Choose the right location in your environment for the BC2400M High AvailabilityRouter. The WLAN transmitters are radios; their signals radiate out from theantenna, and degrade as they go through walls, floors, and obstacles like tubs fullof water (almost impenetrable), stone, or concrete. So for best reception, placeyour router centrally to the rooms in which you expect to use WLAN the most.Each wall or ceiling can reduce the BC2400M’s range by as much as 90 feet (27meters). NOTE: The same considerations apply to your carrier’s 3G/4G broadbandcarrier’s connection.Keep your product away from electrical devices (such as microwaves, airconditioners, cordless phones, refrigerators and televisions) that emit largequantities of RFI (Radio Frequency Interference).BC2400M High Availability Router Setup NOTE: DO NOT connect the BC2400Mto power before following the installation steps below!Mini PCI-e Module or USB connection:Insert an activated Mini PCI-e Module into the card slot and connect the two IpexCoax Cables per the diagram below.Alternatively, insert an activated USB modem into the USB slot.Ethernet connection:Insert one end of an Ethernet cable into the LAN Port on the back panel of therouter. Insert the other end into an available Ethernet port of the network adapterin the computer that will be used to configure the unit. LAN LED should be onwhen connected. If not, check the connection between the router and computer.LAN LED should be on when connected. If not, check the connection between therouter and computer.
NOTE: The BC2400M LAN Port is “Auto-MDI/MDIX”, so any standardEthernet cable will work.Connect the power adapter to the receptor on the back panel of the router. Plugthe other end of the power adapter into a wall outlet or power strip. The LAN &Wi-Fi LED will turn ON and occasionally flash, indicating that the unit is poweredon. The 3G/4G LED will flash and stabilize once a 3G/4G connection is established.Upon completion of the boot-up cycle, the 3G light, LAN and Wi-Fi lights will beon. Occational flashing may occur indicating normal activity.NOTE: An Uninterruptible power supply (UPS) is recommended for power surgesand/or outages. At a minimum, a surge protector should always be used toprotect the equipment from being damaged by electrical spikes and transients.Wi-Fi Connection:If you are connecting wirelessly to the BC2400M High Availability Router, youmust ensure that the security settings on the connecting PC are the same as thoseon the router.By default, the router broadcasts a secure Wi-Fi signal with WPA-PSK encryption:SSID / Wi-Fi Signal Name is set to NEXWARE###(where ### equal the last three characters of the router’s MAC address).Channel is set to channel 5(2.4GHz).Security is set to WPA-PSK.Key (password) is set to passwordNOTE: It is recommended, for security reasons, that the securitysettings on the router be changed during initial setup.Please refer to your computer’s Wi-Fi adapter documentation foradditional information.Initial 3G/4G SetupConnecting to the Router Main Page for Installation and Configuration Settings
Follow the steps below to access the Router and perform installation andconfigure settings:Open a web-browser on your computer connected to the router’s LAN port by anEthernet cable.Enter the IP address of the BC2400M in the URL line of your web browser:http://192.168.1.1NOTE: If you have changed the router’s default IP address, enter thataddress instead of the one above.Type “admin” in the Password field. If you have changed the password, enter thenew one in this field. NOTE: Default Username is “root“.Click “Login” button.You will be greeted by the iconic home page.Basic SettingsSetup WizardSelect the Setup Wizard Icon. Select the Next button to proceed with theindicated steps of the automated setup process.1. Change your administration password.It is recommended that the default password "admin" be replaced for securityreasons. Enter your new password and then re-enter to confirm.Select next to retain any changes and move to the next step2. Set up your Wired Internet connection.During the boot up process of the router if your wide area network (WAN)Ethernet cable is plugged into the WAN port of the router, the router willautomatically be connected to your ISP.If your ISP requires you to setup the WAN as a PPPoE or PPTP, you will need toenter your ISP’s required information into the proper fields.PPPoE Typical entries include the Username and PasswordPPTP Typical entries include the Username, Password, and the PPTP Server Name.3. 3G/4G Internet Connection Setup.
During the boot up process of the router all compatible data cards or modules arerecognized and are setup automatically. No additional information is typicallyrequired to complete the setup of your compatible 3G/4G data card or module. Ifyour ISP requires additional information to connect to their network, please referto their documentation for APN, PIN Code, Username, and Password. All dataentry fields may not be required to connect to your ISP’s network.4. Configure your wireless settings.This step allows you to change whether the Wi-Fi is enabled, thechannel on which the Wi-Fi is broadcast on, the name that is broadcast,the mode, the encryption type, and the key (password) to access thebroadcasted Wi-Fi signal.Disable only if you do not want anyone accessing the router wirelessly.Change channel if other wireless devices are interfering with the router.Change the Network Name (ESSID) to whatever name you wish to bebroadcasted.Hiding the ESSID does not disable the Wi-Fi signal and should not be thought ofas security setting. Hiding the ESSID only eliminates the name from beingbroadcasted.Select the router's wireless operation mode. Provide, Independent, or Join. Thedefault setting is Provide (Access Point).Change encryption type as necessary. Some wireless devices cannot connect to allencryption modes. The default setting is WPA-PSK. Other typical choices includeWEP (ASCII or Hex), WPA=PSK, or WPA2-PSK. Additional available settings requireadditional software or hardware not included with this router.Change Key (password). We suggest that this setting be changed. This settingcontrols the require Key or password to access your wireless signal.Select Next to retain any changes and move to the Completion page and selectFinish.Admin PasswordYou can change the router's administrative password. (default = admin).Wi-Fi Settings
Here you can change whether the Wi-Fi is enabled, the channel on which the Wi-Fiis broadcast on, the name that is broadcast, the wireless mode, the encryptiontype, the key (password) to access the broadcasted Wi-Fi signal, and enableWireless Distribution System (WDS).Disable only if you do not want anyone accessing the router wirelessly.Change channel if other wireless devices are interfering with the router.Change the router’s Wireless Mode. Choose from six settings, b, g, or n and mixes.Routing mode is factory set to Provide (Access Point).Choose to hide the ESSID.Change the Network Name (ESSID) to whatever name you wish to bebroadcasted.Change security and encryption type as necessary. Some wireless devices cannotconnect to all security modes.Change Key (password). We suggest that this setting be changed.Choose to enable MAC Address filtering, then select filter policy and create theaddress list.You can change the router's administrative password. (default = admin).NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.WDS: Wireless Distribution System (WDS) is a feature that allows multiple accesspoints of the same physical radio type to be bridged together as one commonWi-Fi network. Because the same physical radio type must be used, this featureonly operates with other Nexaira routers. The following configuration options areavailable:BSSID: Your router supports up to four WDS clients. Enter the BSSID (MAC addresslisted on the bottom label of the router, also listed under LAN on the WiredInterfaces page) of the other devices to be connected to via WDS.NOTE: External WiFi antennas selection is on System Setting page. Routerconfiguration must use internal WiFi antennas if using a Mini PCI-e Module, as theModule requires use of the two RP-SMA Female connectors on Rear of Router.Default configuration is for Internal WiFi Antennas.
InterfacesHere you can review WAN, and LAN status as well as change Local Network, andWAN Ethernet settings.The IP address is the address of the router. It is also your local network’s gatewayaddress which is used by all LAN hosts to access the Internet through the WANconnection.The Netmask is used to determine the number of sub networks that can beconnected to the router.The IP Gateway (optional) field is and advanced and optional setting that availableif your local network has a gateway that is different than the router's LAN IPaddress.DNS Server (optional) allows you to specify a DNS server for LAN hosts to use ifyour WAN connection does not supply a valid server address, or if not-peer DNSServer information is required or chosen under Cellular Datacard settings.Change WAN port into a second LAN port.Enable IP Pass-through mode to have one client have the WAN IP. All routerfunctions are disabled.Enable or disable the router’s ability to connect to the internet through a WANEthernet connection.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”Network TrafficThe Network Traffic status screen shows current traffic status of active interfaces,such as the LAN, the connected Datacard, and the WAN.Cellular DatacardEnable or disable the router’s ability to access the Internet through a datacard.Select Service type: UMTS/GPRS, CDMA (default), or EV-DO.Insert Access Point (APN), PIN code, Username, and Password as indicated by your
3G/4G wireless provider. (default = admin).Select to use the Peer DNS or an optional location. Input DNS Server informationin Wired Interfaces.Enable Keep-Alive to determine it the connection is up. Router well reinitializeconnection if connection is down.Input time (in seconds) of inactivity until link is disconnected.NOTE: Settings are auto-populated when an activated compatible datacard isinserted.Card UpdatesDatacard activation, updates and network information.LogoutThis feature will log you out of administrative mode. You will be returned to thelogin screen.Tool BoxSignal Strength MeterThis feature displays feedback to determine the optimal position of the antennaor router, to aquire the best signal strength.System SettingsView system resource information such as load, memory usage, system time, andsystem up time. Configure the router Hostname and Time zone for loggingtimestamp. Additionally, selection of internal or external WiFi antennas isperformed on the page. Note if using a Mini PCI-e 3G/4G Modules internal WiFiantennas must be selected. This allows the external RP-SMA female jacks on rearof board to be used for the modules required external antennas.
System LogView System Log file.Email NotificationsEnable Email Notifications for certain router events.Choose to truncate system logs to the last 50 lines.Choose to be notified on: Boot-up, Interface Failover, and Interface Up/Down .Input the name, Mail Domain, the To Address, the Mail Hub, Mail Port, Username,and Password.Select Email Now to send the system log to the specified location now.Flash FirmwareBrowse and select the firmware upgrade file from a selected location.Choose to keep current or overwrite with new firmware configuration.Select Flash Firmware to flash selected firmware file.Router will upload selected file, flash the new firmware, and reboot to the loginscreen upon completion.Backup SettingsCreate a backup file of current settings to a selected location.Restore: Select a previously saved backup file by browsing to the file location andthen clicking “Restore backup”.Reset to DefaultsThis feature will reset the router to factory defaults.Reboot
This feature will Reboot the router.License AgreementNexaira, Inc.Software License AgreementImportant: Please read this license agreement (this "Agreement") carefully beforeusing the software provided with the router (the "Software"). If you disagree withany of these terms, do not use the router and the software.1. License Grant. Subject to the terms and conditions of this Agreement, Nexairahereby grants you a non-exclusive, worldwide, non-transferable, perpetual,revocable license to: (i) internally use the Software (in object code only) solely inaccordance with any user documentation (the "Documentation") for operatingthe router provided with the Software; and (ii) internally use the Documentationsolely in connection with the use of the Software and the router.2. Restriction. You acknowledge that the Software, including the structure,organization, and source code of the Software, contains valuable trade secrets ofNexaira. Accordingly, except as expressly permitted under this Agreement, youagree not to: (i) sublicense, rent, lease, or otherwise transfer the Software to anythird party; (ii) modify, alter, translate, or create derivative works of the Software;(iii) reverse engineer, decompile, disassemble, or otherwise attempt to derive thesource code for the Software; (iv) use the Software to control any otherinstrument, computing hardware, or peripherals other than the Router; or (v) useor copy the Software for any purpose except as permitted under Section 1.3. Open Source. The Software includes third party codes, which are licensed toyou pursuant to the terms and conditions referenced in Exhibit A (the "OpenSource Codes").4. Proprietary Rights. The Software, the Documentation, and all intellectualproperty rights therein, are the exclusive property of Nexaira and its suppliers. Allrights in and to the Software not expressly granted to you are reserved by Nexairaand its suppliers. This Agreement does not grant you title to the Software or titleto any copies of the Software, or an ownership of any intellectual property rights
in the Software.5. Warranty. Except as provided in the standard warranty policy of Nexaira oranother supplier from whom you obtained the router, the Software and theDocumentation are provided “AS IS” without any warranty. Open Source Codes areprovided “AS IS” without any warranty. Nexaira disclaims all other warranties ofany kind, express, implied, or statutory, including any implied warranties ofmerchantability, fitness for a particular purpose, title, and non-infringement ofthird party rights. Nexaira does not warrant that the operation of the Software willbe uninterrupted or error free.6. Limitation of Liability. In no event will Nexaira be liable for any incidental,consequential, special, exemplary, or indirect damages (including lost profits andlost data) arising from or relating to this Agreement or the Software, even ifNexaira has been advised of the possibility of such damages. Nexaira’s total,cumulative liability in connection with this Agreement and the Software, whetherin contract or tort or otherwise, will not exceed the amount of fees received byNexaira in consideration for licensing the Software or selling the router if youpurchased the router directly from Nexaira. In no event will suppliers be liable forany direct, incidental, consequential, special, exemplary, or indirect damages(including lost profits and lost data) arising from or relating to this Agreement orthe Open Source Codes. This section shall be given full effect even if thewarranties provided in Section 5 is deemed to have failed of its essential purpose.7. Term and Termination. This Agreement is effective until terminated by eitherparty pursuant to this Section. You may terminate this Agreement for convenienceby notice to Nexaira. Nexaira may terminate this Agreement effective immediatelyby providing a notice to you if you are in material breach of this Agreement anddo not cure such breach within twenty (20) days after receiving notice thereoffrom Nexaira. Upon termination of this Agreement, you must immediately ceaseall use of the Software.8. Governing Law and Venue. This Agreement shall be governed by the laws ofthe State of California without regard to conflicts of law principles that wouldrequire the application of the laws of any other state. The United NationsConvention on Contracts for the International Sale of Goods does not apply to thisAgreement. Any action or proceeding arising from or relating to this Agreement
must be brought in a federal court in the Southern District of California or in astate court in San Diego County, California, and each party irrevocably submits tothe jurisdiction and venue of any such court in any such action or proceeding.9. General. You acknowledge that any actual or threatened breach of Section 2will constitute immediate, irreparable harm to Nexaira for which monetarydamages would be an inadequate remedy, and that injunctive relief is anappropriate remedy for such breach. You will not export or re-export the Softwarein violation of the U.S. Export Administration regulations or other applicable lawsand regulations. You may not assign or transfer any of the rights or obligationsunder this Agreement to any third party without the prior written consent ofNexaira, except in connection with the transfer of the router. Any attemptedtransfer in violation of the foregoing will be null and void. The Software andDocumentation are "commercial items" as that term is defined at 48 C.F.R. 2.101,consisting of "commercial computer software" and "commercial computersoftware documentation" as such terms are used in 48 C.F.R. 12.212. Consistentwith 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4, all U.S.Government end users acquire the Software and Documentation with only thoserights set forth therein. All waivers must be in writing. A party’s failure to exerciseany of its rights under this Agreement shall not constitute a waiver or forfeiture ofany such rights nor of any other rights. If any provision of this Agreement isunenforceable or invalid pursuant to any applicable law, such unenforceability orinvalidity will not render this Agreement unenforceable or invalid as a whole, andsuch unenforceable or invalid provision will be changed and interpreted so as tobest accomplish the objectives of such provision within the limits of applicablelaw or applicable court decisions. This Agreement represents the entireagreement between you and Nexaira as to the matters set forth herein andintegrates all prior discussions and understanding between us. This Agreementmay be modified only by a binding written instrument entered into by you andNexaira.Exhibit A (Open Source Codes)The Software includes third party codes that are licensed to you pursuant to thelicense agreements listed below:GNU GENERAL PUBLIC LICENSE
Version 2, June 1991Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, FifthFloor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distributeverbatim copies of this license document, but changing it is not allowed.PreambleThe licenses for most software are designed to take away your freedom to shareand change it. By contrast, the GNU General Public License is intended toguarantee your freedom to share and change free software--to make sure thesoftware is free for all its users. This General Public License applies to most of theFree Software Foundation's software and to any other program whose authorscommit to using it. (Some other Free Software Foundation software is covered bythe GNU Lesser General Public License instead.) You can apply it to your programs,too.When we speak of free software, we are referring to freedom, not price. OurGeneral Public Licenses are designed to make sure that you have the freedom todistribute copies of free software (and charge for this service if you wish), that youreceive source code or can get it if you want it, that you can change the softwareor use pieces of it in new free programs; and that you know you can do thesethings.To protect your rights, we need to make restrictions that forbid anyone to denyyou these rights or to ask you to surrender the rights. These restrictions translateto certain responsibilities for you if you distribute copies of the software, or if youmodify it.For example, if you distribute copies of such a program, whether gratis or for a fee,you must give the recipients all the rights that you have. You must make sure thatthey, too, receive or can get the source code. And you must show them theseterms so they know their rights.We protect your rights with two steps: (1) copyright the software, and (2) offer youthis license which gives you legal permission to copy, distribute and/or modify thesoftware.Also, for each author's protection and ours, we want to make certain that
everyone understands that there is no warranty for this free software. If thesoftware is modified by someone else and passed on, we want its recipients toknow that what they have is not the original, so that any problems introduced byothers will not reflect on the original authors' reputations.Finally, any free program is threatened constantly by software patents. We wish toavoid the danger that redistributors of a free program will individually obtainpatent licenses, in effect making the program proprietary. To prevent this, we havemade it clear that any patent must be licensed for everyone's free use or notlicensed at all.The precise terms and conditions for copying, distribution and modificationfollow.GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING,DISTRIBUTION AND MODIFICATION0. This License applies to any program or other work which contains a noticeplaced by the copyright holder saying it may be distributed under the terms ofthis General Public License. The "Program", below, refers to any such program orwork, and a "work based on the Program" means either the Program or anyderivative work under copyright law: that is to say, a work containing the Programor a portion of it, either verbatim or with modifications and/or translated intoanother language. (Hereinafter, translation is included without limitation in theterm "modification".) Each licensee is addressed as "you".Activities other than copying, distribution and modification are not covered bythis License; they are outside its scope. The act of running the Program is notrestricted, and the output from the Program is covered only if its contentsconstitute a work based on the Program (independent of having been made byrunning the Program). Whether that is true depends on what the Program does.1. You may copy and distribute verbatim copies of the Program's source code asyou receive it, in any medium, provided that you conspicuously and appropriatelypublish on each copy an appropriate copyright notice and disclaimer of warranty;keep intact all the notices that refer to this License and to the absence of anywarranty; and give any other recipients of the Program a copy of this Licensealong with the Program.
You may charge a fee for the physical act of transferring a copy, and you may atyour option offer warranty protection in exchange for a fee.2. You may modify your copy or copies of the Program or any portion of it, thusforming a work based on the Program, and copy and distribute suchmodifications or work under the terms of Section 1 above, provided that you alsomeet all of these conditions:a) You must cause the modified files to carry prominent notices stating that youchanged the files and the date of any change.b) You must cause any work that you distribute or publish, that in whole or in partcontains or is derived from the Program or any part thereof, to be licensed as awhole at no charge to all third parties under the terms of this License.c) If the modified program normally reads commands interactively when run, youmust cause it, when started running for such interactive use in the most ordinaryway, to print or display an announcement including an appropriate copyrightnotice and a notice that there is no warranty (or else, saying that you provide awarranty) and that users may redistribute the program under these conditions,and telling the user how to view a copy of this License. (Exception: if the Programitself is interactive but does not normally print such an announcement, your workbased on the Program is not required to print an announcement.)These requirements apply to the modified work as a whole. If identifiable sectionsof that work are not derived from the Program, and can be reasonably consideredindependent and separate works in themselves, then this License, and its terms,do not apply to those sections when you distribute them as separate works. Butwhen you distribute the same sections as part of a whole which is a work basedon the Program, the distribution of the whole must be on the terms of thisLicense, whose permissions for other licensees extend to the entire whole, andthus to each and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights towork written entirely by you; rather, the intent is to exercise the right to controlthe distribution of derivative or collective works based on the Program.In addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage ordistribution medium does not bring the other work under the scope of thisLicense.3. You may copy and distribute the Program (or a work based on it, under Section2) in object code or executable form under the terms of Sections 1 and 2 aboveprovided that you also do one of the following:a) Accompany it with the complete corresponding machine-readable source code,which must be distributed under the terms of Sections 1 and 2 above on amedium customarily used for software interchange; or,b) Accompany it with a written offer, valid for at least three years, to give any thirdparty, for a charge no more than your cost of physically performing sourcedistribution, a complete machine-readable copy of the corresponding sourcecode, to be distributed under the terms of Sections 1 and 2 above on a mediumcustomarily used for software interchange; or,c) Accompany it with the information you received as to the offer to distributecorresponding source code. (This alternative is allowed only for noncommercialdistribution and only if you received the program in object code or executableform with such an offer, in accord with Subsection b above.)The source code for a work means the preferred form of the work for makingmodifications to it. For an executable work, complete source code means all thesource code for all modules it contains, plus any associated interface definitionfiles, plus the scripts used to control compilation and installation of theexecutable. However, as a special exception, the source code distributed need notinclude anything that is normally distributed (in either source or binary form) withthe major components (compiler, kernel, and so on) of the operating system onwhich the executable runs, unless that component itself accompanies theexecutable.If distribution of executable or object code is made by offering access to copyfrom a designated place, then offering equivalent access to copy the source codefrom the same place counts as distribution of the source code, even though thirdparties are not compelled to copy the source along with the object code.4. You may not copy, modify, sublicense, or distribute the Program except as
expressly provided under this License. Any attempt otherwise to copy, modify,sublicense or distribute the Program is void, and will automatically terminate yourrights under this License. However, parties who have received copies, or rights,from you under this License will not have their licenses terminated so long as suchparties remain in full compliance.5. You are not required to accept this License, since you have not signed it.However, nothing else grants you permission to modify or distribute the Programor its derivative works. These actions are prohibited by law if you do not acceptthis License. Therefore, by modifying or distributing the Program (or any workbased on the Program), you indicate your acceptance of this License to do so, andall its terms and conditions for copying, distributing or modifying the Program orworks based on it.6. Each time you redistribute the Program (or any work based on the Program),the recipient automatically receives a license from the original licensor to copy,distribute or modify the Program subject to these terms and conditions. You maynot impose any further restrictions on the recipients' exercise of the rightsgranted herein. You are not responsible for enforcing compliance by third partiesto this License.7. If, as a consequence of a court judgment or allegation of patent infringement orfor any other reason (not limited to patent issues), conditions are imposed on you(whether by court order, agreement or otherwise) that contradict the conditionsof this License, they do not excuse you from the conditions of this License. If youcannot distribute so as to satisfy simultaneously your obligations under thisLicense and any other pertinent obligations, then as a consequence you may notdistribute the Program at all. For example, if a patent license would not permitroyalty-free redistribution of the Program by all those who receive copies directlyor indirectly through you, then the only way you could satisfy both it and thisLicense would be to refrain entirely from distribution of the Program.If any portion of this section is held invalid or unenforceable under any particularcircumstance, the balance of the section is intended to apply and the section as awhole is intended to apply in other circumstances.It is not the purpose of this section to induce you to infringe any patents or otherproperty right claims or to contest validity of any such claims; this section has the
sole purpose of protecting the integrity of the free software distribution system,which is implemented by public license practices. Many people have madegenerous contributions to the wide range of software distributed through thatsystem in reliance on consistent application of that system; it is up to theauthor/donor to decide if he or she is willing to distribute software through anyother system and a licensee cannot impose that choice.This section is intended to make thoroughly clear what is believed to be aconsequence of the rest of this License.8. If the distribution and/or use of the Program is restricted in certain countrieseither by patents or by copyrighted interfaces, the original copyright holder whoplaces the Program under this License may add an explicit geographicaldistribution limitation excluding those countries, so that distribution is permittedonly in or among countries not thus excluded. In such case, this Licenseincorporates the limitation as if written in the body of this License.9. The Free Software Foundation may publish revised and/or new versions of theGeneral Public License from time to time. Such new versions will be similar inspirit to the present version, but may differ in detail to address new problems orconcerns.Each version is given a distinguishing version number. If the Program specifies aversion number of this License which applies to it and "any later version", you havethe option of following the terms and conditions either of that version or of anylater version published by the Free Software Foundation. If the Program does notspecify a version number of this License, you may choose any version everpublished by the Free Software Foundation.10. If you wish to incorporate parts of the Program into other free programswhose distribution conditions are different, write to the author to ask forpermission. For software which is copyrighted by the Free Software Foundation,write to the Free Software Foundation; we sometimes make exceptions for this.Our decision will be guided by the two goals of preserving the free status of allderivatives of our free software and of promoting the sharing and reuse ofsoftware generally.NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NOWARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERSAND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OFANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THEIMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THEPROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUMETHE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO INWRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAYMODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLETO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL ORCONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THEPROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR AFAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IFSUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.END OF TERMS AND CONDITIONSHow to Apply These Terms to Your New ProgramsIf you develop a new program, and you want it to be of the greatest possible useto the public, the best way to achieve this is to make it free software whicheveryone can redistribute and change under these terms.To do so, attach the following notices to the program. It is safest to attach them tothe start of each source file to most effectively convey the exclusion of warranty;and each file should have at least the "copyright" line and a pointer to where thefull notice is found.Copyright (C)This program is free software; you can redistribute it and/or modify it under theterms of the GNU General Public License as published by the Free Software
Foundation; either version 2 of the License, or (at your option) any later version.This program is distributed in the hope that it will be useful, but WITHOUT ANYWARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESSFOR A PARTICULAR PURPOSE. See the GNU General Public License for moredetails.You should have received a copy of the GNU General Public License along withthis program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street,Fifth Floor, Boston, MA 02110-1301 USA.Also add information on how to contact you by electronic and paper mail.If the program is interactive, make it output a short notice like this when it startsin an interactive mode:Gnomovision version 69, Copyright (C) year name of author Gnomovision comeswith ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software,and you are welcome to redistribute it under certain conditions; type `show c' fordetails.The hypothetical commands `show w' and `show c' should show the appropriateparts of the General Public License. Of course, the commands you use may becalled something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.You should also get your employer (if you work as a programmer) or your school, ifany, to sign a "copyright disclaimer" for the program, if necessary. Here is asample; alter the names:Yoyodyne, Inc., hereby disclaims all copyright interest in the program`Gnomovision' (which makes passes at compilers) written by James Hacker., 1 April 1989 Ty Coon, President of ViceThis General Public License does not permit incorporating your program intoproprietary programs. If your program is a subroutine library, you may consider itmore useful to permit linking proprietary applications with the library. If this iswhat you want to do, use the GNU Lesser General Public License instead of thisLicense.
GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, FifthFloor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distributeverbatim copies of this license document, but changing it is not allowed.[This is the first released version of the Lesser GPL. It also counts as the successorof the GNU Library Public License, version 2, hence the version number 2.1.]PreambleThe licenses for most software are designed to take away your freedom to shareand change it. By contrast, the GNU General Public Licenses are intended toguarantee your freedom to share and change free software--to make sure thesoftware is free for all its users.This license, the Lesser General Public License, applies to some speciallydesignated software packages--typically libraries--of the Free SoftwareFoundation and other authors who decide to use it. You can use it too, but wesuggest you first think carefully about whether this license or the ordinary GeneralPublic License is the better strategy to use in any particular case, based on theexplanations below.When we speak of free software, we are referring to freedom of use, not price. OurGeneral Public Licenses are designed to make sure that you have the freedom todistribute copies of free software (and charge for this service if you wish); that youreceive source code or can get it if you want it; that you can change the softwareand use pieces of it in new free programs; and that you are informed that you cando these things.To protect your rights, we need to make restrictions that forbid distributors todeny you these rights or to ask you to surrender these rights. These restrictionstranslate to certain responsibilities for you if you distribute copies of the library orif you modify it.For example, if you distribute copies of the library, whether gratis or for a fee, youmust give the recipients all the rights that we gave you. You must make sure thatthey, too, receive or can get the source code. If you link other code with thelibrary, you must provide complete object files to the recipients, so that they can
relink them with the library after making changes to the library and recompiling it.And you must show them these terms so they know their rights.We protect your rights with a two-step method: (1) we copyright the library, and(2) we offer you this license, which gives you legal permission to copy, distributeand/or modify the library.To protect each distributor, we want to make it very clear that there is no warrantyfor the free library. Also, if the library is modified by someone else and passed on,the recipients should know that what they have is not the original version, so thatthe original author's reputation will not be affected by problems that might beintroduced by others.Finally, software patents pose a constant threat to the existence of any freeprogram. We wish to make sure that a company cannot effectively restrict theusers of a free program by obtaining a restrictive license from a patent holder.Therefore, we insist that any patent license obtained for a version of the librarymust be consistent with the full freedom of use specified in this license.Most GNU software, including some libraries, is covered by the ordinary GNUGeneral Public License. This license, the GNU Lesser General Public License,applies to certain designated libraries, and is quite different from the ordinaryGeneral Public License. We use this license for certain libraries in order to permitlinking those libraries into non-free programs.When a program is linked with a library, whether statically or using a sharedlibrary, the combination of the two is legally speaking a combined work, aderivative of the original library. The ordinary General Public License thereforepermits such linking only if the entire combination fits its criteria of freedom. TheLesser General Public License permits more lax criteria for linking other code withthe library.We call this license the "Lesser" General Public License because it does Less toprotect the user's freedom than the ordinary General Public License. It alsoprovides other free software developers Less of an advantage over competingnon-free programs. These disadvantages are the reason we use the ordinaryGeneral Public License for many libraries. However, the Lesser license providesadvantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage thewidest possible use of a certain library, so that it becomes a de-facto standard. Toachieve this, non-free programs must be allowed to use the library. A morefrequent case is that a free library does the same job as widely used non-freelibraries. In this case, there is little to gain by limiting the free library to freesoftware only, so we use the Lesser General Public License.In other cases, permission to use a particular library in non-free programs enablesa greater number of people to use a large body of free software. For example,permission to use the GNU C Library in non-free programs enables many morepeople to use the whole GNU operating system, as well as its variant, theGNU/Linux operating system.Although the Lesser General Public License is Less protective of the users'freedom, it does ensure that the user of a program that is linked with the Libraryhas the freedom and the wherewithal to run that program using a modifiedversion of the Library.The precise terms and conditions for copying, distribution and modificationfollow. Pay close attention to the difference between a "work based on the library"and a "work that uses the library". The former contains code derived from thelibrary, whereas the latter must be combined with the library in order to run.GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING,DISTRIBUTION AND MODIFICATION0. This License Agreement applies to any software library or other program whichcontains a notice placed by the copyright holder or other authorized party sayingit may be distributed under the terms of this Lesser General Public License (alsocalled "this License"). Each licensee is addressed as "you".A "library" means a collection of software functions and/or data prepared so as tobe conveniently linked with application programs (which use some of thosefunctions and data) to form executables.The "Library", below, refers to any such software library or work which has beendistributed under these terms. A "work based on the Library" means either theLibrary or any derivative work under copyright law: that is to say, a work
containing the Library or a portion of it, either verbatim or with modificationsand/or translated straightforwardly into another language. (Hereinafter,translation is included without limitation in the term "modification".)"Source code" for a work means the preferred form of the work for makingmodifications to it. For a library, complete source code means all the source codefor all modules it contains, plus any associated interface definition files, plus thescripts used to control compilation and installation of the library.Activities other than copying, distribution and modification are not covered bythis License; they are outside its scope. The act of running a program using theLibrary is not restricted, and output from such a program is covered only if itscontents constitute a work based on the Library (independent of the use of theLibrary in a tool for writing it). Whether that is true depends on what the Librarydoes and what the program that uses the Library does.1. You may copy and distribute verbatim copies of the Library's complete sourcecode as you receive it, in any medium, provided that you conspicuously andappropriately publish on each copy an appropriate copyright notice anddisclaimer of warranty; keep intact all the notices that refer to this License and tothe absence of any warranty; and distribute a copy of this License along with theLibrary.You may charge a fee for the physical act of transferring a copy, and you may atyour option offer warranty protection in exchange for a fee.2. You may modify your copy or copies of the Library or any portion of it, thusforming a work based on the Library, and copy and distribute such modificationsor work under the terms of Section 1 above, provided that you also meet all ofthese conditions:a) The modified work must itself be a software library.b) You must cause the files modified to carry prominent notices stating that youchanged the files and the date of any change.c) You must cause the whole of the work to be licensed at no charge to all thirdparties under the terms of this License.d) If a facility in the modified Library refers to a function or a table of data to be
supplied by an application program that uses the facility, other than as anargument passed when the facility is invoked, then you must make a good faitheffort to ensure that, in the event an application does not supply such function ortable, the facility still operates, and performs whatever part of its purpose remainsmeaningful.(For example, a function in a library to compute square roots has a purpose that isentirely well-defined independent of the application. Therefore, Subsection 2drequires that any application-supplied function or table used by this functionmust be optional: if the application does not supply it, the square root functionmust still compute square roots.)These requirements apply to the modified work as a whole. If identifiable sectionsof that work are not derived from the Library, and can be reasonably consideredindependent and separate works in themselves, then this License, and its terms,do not apply to those sections when you distribute them as separate works. Butwhen you distribute the same sections as part of a whole which is a work basedon the Library, the distribution of the whole must be on the terms of this License,whose permissions for other licensees extend to the entire whole, and thus toeach and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights towork written entirely by you; rather, the intent is to exercise the right to controlthe distribution of derivative or collective works based on the Library.In addition, mere aggregation of another work not based on the Library with theLibrary (or with a work based on the Library) on a volume of a storage ordistribution medium does not bring the other work under the scope of thisLicense.3. You may opt to apply the terms of the ordinary GNU General Public Licenseinstead of this License to a given copy of the Library. To do this, you must alter allthe notices that refer to this License, so that they refer to the ordinary GNUGeneral Public License, version 2, instead of to this License. (If a newer versionthan version 2 of the ordinary GNU General Public License has appeared, then youcan specify that version instead if you wish.) Do not make any other change inthese notices.
Once this change is made in a given copy, it is irreversible for that copy, so theordinary GNU General Public License applies to all subsequent copies andderivative works made from that copy.This option is useful when you wish to copy part of the code of the Library into aprogram that is not a library.4. You may copy and distribute the Library (or a portion or derivative of it, underSection 2) in object code or executable form under the terms of Sections 1 and 2above provided that you accompany it with the complete correspondingmachine-readable source code, which must be distributed under the terms ofSections 1 and 2 above on a medium customarily used for software interchange.If distribution of object code is made by offering access to copy from a designatedplace, then offering equivalent access to copy the source code from the sameplace satisfies the requirement to distribute the source code, even though thirdparties are not compelled to copy the source along with the object code.5. A program that contains no derivative of any portion of the Library, but isdesigned to work with the Library by being compiled or linked with it, is called a"work that uses the Library". Such a work, in isolation, is not a derivative work ofthe Library, and therefore falls outside the scope of this License.However, linking a "work that uses the Library" with the Library creates anexecutable that is a derivative of the Library (because it contains portions of theLibrary), rather than a "work that uses the library". The executable is thereforecovered by this License. Section 6 states terms for distribution of suchexecutables.When a "work that uses the Library" uses material from a header file that is part ofthe Library, the object code for the work may be a derivative work of the Libraryeven though the source code is not. Whether this is true is especially significant ifthe work can be linked without the Library, or if the work is itself a library. Thethreshold for this to be true is not precisely defined by law.If such an object file uses only numerical parameters, data structure layouts andaccessors, and small macros and small inline functions (ten lines or less in length),then the use of the object file is unrestricted, regardless of whether it is legally a
derivative work. (Executables containing this object code plus portions of theLibrary will still fall under Section 6.)Otherwise, if the work is a derivative of the Library, you may distribute the objectcode for the work under the terms of Section 6. Any executables containing thatwork also fall under Section 6, whether or not they are linked directly with theLibrary itself.6. As an exception to the Sections above, you may also combine or link a "workthat uses the Library" with the Library to produce a work containing portions ofthe Library, and distribute that work under terms of your choice, provided that theterms permit modification of the work for the customer's own use and reverseengineering for debugging such modifications.You must give prominent notice with each copy of the work that the Library isused in it and that the Library and its use are covered by this License. You mustsupply a copy of this License. If the work during execution displays copyrightnotices, you must include the copyright notice for the Library among them, aswell as a reference directing the user to the copy of this License. Also, you must doone of these things:a) Accompany the work with the complete corresponding machine-readablesource code for the Library including whatever changes were used in the work(which must be distributed under Sections 1 and 2 above); and, if the work is anexecutable linked with the Library, with the complete machine-readable "workthat uses the Library", as object code and/or source code, so that the user canmodify the Library and then relink to produce a modified executable containingthe modified Library. (It is understood that the user who changes the contents ofdefinitions files in the Library will not necessarily be able to recompile theapplication to use the modified definitions.)b) Use a suitable shared library mechanism for linking with the Library. A suitablemechanism is one that (1) uses at run time a copy of the library already present onthe user's computer system, rather than copying library functions into theexecutable, and (2) will operate properly with a modified version of the library, ifthe user installs one, as long as the modified version is interface-compatible withthe version that the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to givethe same user the materials specified in Subsection 6a, above, for a charge nomore than the cost of performing this distribution.d) If distribution of the work is made by offering access to copy from a designatedplace, offer equivalent access to copy the above specified materials from the sameplace.e) Verify that the user has already received a copy of these materials or that youhave already sent this user a copy.For an executable, the required form of the "work that uses the Library" mustinclude any data and utility programs needed for reproducing the executablefrom it. However, as a special exception, the materials to be distributed need notinclude anything that is normally distributed (in either source or binary form) withthe major components (compiler, kernel, and so on) of the operating system onwhich the executable runs, unless that component itself accompanies theexecutable.It may happen that this requirement contradicts the license restrictions of otherproprietary libraries that do not normally accompany the operating system. Sucha contradiction means you cannot use both them and the Library together in anexecutable that you distribute.7. You may place library facilities that are a work based on the Library side-by-sidein a single library together with other library facilities not covered by this License,and distribute such a combined library, provided that the separate distribution ofthe work based on the Library and of the other library facilities is otherwisepermitted, and provided that you do these two things:a) Accompany the combined library with a copy of the same work based on theLibrary, uncombined with any other library facilities. This must be distributedunder the terms of the Sections above.b) Give prominent notice with the combined library of the fact that part of it is awork based on the Library, and explaining where to find the accompanyinguncombined form of the same work.8. You may not copy, modify, sublicense, link with, or distribute the Library except
as expressly provided under this License. Any attempt otherwise to copy, modify,sublicense, link with, or distribute the Library is void, and will automaticallyterminate your rights under this License. However, parties who have receivedcopies, or rights, from you under this License will not have their licensesterminated so long as such parties remain in full compliance.9. You are not required to accept this License, since you have not signed it.However, nothing else grants you permission to modify or distribute the Library orits derivative works. These actions are prohibited by law if you do not accept thisLicense. Therefore, by modifying or distributing the Library (or any work based onthe Library), you indicate your acceptance of this License to do so, and all its termsand conditions for copying, distributing or modifying the Library or works basedon it.10. Each time you redistribute the Library (or any work based on the Library), therecipient automatically receives a license from the original licensor to copy,distribute, link with or modify the Library subject to these terms and conditions.You may not impose any further restrictions on the recipients' exercise of therights granted herein. You are not responsible for enforcing compliance by thirdparties with this License.11. If, as a consequence of a court judgment or allegation of patent infringementor for any other reason (not limited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise) that contradict theconditions of this License, they do not excuse you from the conditions of thisLicense. If you cannot distribute so as to satisfy simultaneously your obligationsunder this License and any other pertinent obligations, then as a consequenceyou may not distribute the Library at all. For example, if a patent license would notpermit royalty-free redistribution of the Library by all those who receive copiesdirectly or indirectly through you, then the only way you could satisfy both it andthis License would be to refrain entirely from distribution of the Library.If any portion of this section is held invalid or unenforceable under any particularcircumstance, the balance of the section is intended to apply, and the section as awhole is intended to apply in other circumstances.It is not the purpose of this section to induce you to infringe any patents or otherproperty right claims or to contest validity of any such claims; this section has the
sole purpose of protecting the integrity of the free software distribution systemwhich is implemented by public license practices. Many people have madegenerous contributions to the wide range of software distributed through thatsystem in reliance on consistent application of that system; it is up to theauthor/donor to decide if he or she is willing to distribute software through anyother system and a licensee cannot impose that choice.This section is intended to make thoroughly clear what is believed to be aconsequence of the rest of this License.12. If the distribution and/or use of the Library is restricted in certain countrieseither by patents or by copyrighted interfaces, the original copyright holder whoplaces the Library under this License may add an explicit geographicaldistribution limitation excluding those countries, so that distribution is permittedonly in or among countries not thus excluded. In such case, this Licenseincorporates the limitation as if written in the body of this License.13. The Free Software Foundation may publish revised and/or new versions of theLesser General Public License from time to time. Such new versions will be similarin spirit to the present version, but may differ in detail to address new problems orconcerns.Each version is given a distinguishing version number. If the Library specifies aversion number of this License which applies to it and "any later version", you havethe option of following the terms and conditions either of that version or of anylater version published by the Free Software Foundation. If the Library does notspecify a license version number, you may choose any version ever published bythe Free Software Foundation.14. If you wish to incorporate parts of the Library into other free programs whosedistribution conditions are incompatible with these, write to the author to ask forpermission. For software which is copyrighted by the Free Software Foundation,write to the Free Software Foundation; we sometimes make exceptions for this.Our decision will be guided by the two goals of preserving the free status of allderivatives of our free software and of promoting the sharing and reuse ofsoftware generally.NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTYFOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHENOTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHERPARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY ISWITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OFALL NECESSARY SERVICING, REPAIR OR CORRECTION.16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO INWRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAYMODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TOYOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL ORCONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THELIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR AFAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IFSUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.END OF TERMS AND CONDITIONSHow to Apply These Terms to Your New LibrariesIf you develop a new library, and you want it to be of the greatest possible use tothe public, we recommend making it free software that everyone can redistributeand change. You can do so by permitting redistribution under these terms (or,alternatively, under the terms of the ordinary General Public License).To apply these terms, attach the following notices to the library. It is safest toattach them to the start of each source file to most effectively convey theexclusion of warranty; and each file should have at least the "copyright" line and apointer to where the full notice is found.Copyright (C)This library is free software; you can redistribute it and/or modify it under the
terms of the GNU Lesser General Public License as published by the Free SoftwareFoundation; either version 2.1 of the License, or (at your option) any later version.This library is distributed in the hope that it will be useful, but WITHOUT ANYWARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESSFOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for moredetails.You should have received a copy of the GNU Lesser General Public License alongwith this library; if not, write to the Free Software Foundation, Inc., 51 FranklinStreet, Fifth Floor, Boston, MA 02110-1301 USAAlso add information on how to contact you by electronic and paper mail.You should also get your employer (if you work as a programmer) or your school, ifany, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample;alter the names:Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a libraryfor tweaking knobs) written by James Random Hacker., 1 April 1990 Ty Coon, President of ViceThat's all there is to it!Advanced SettingsDHCP SettingsHere you can change whether the DHCP server is enabled, view current ActiveLeases, and assign Static DHCP Leases to other devices.Change first available lease number.Change the total number of leases available.Change the duration of an active lease (h = hours).Assign Static DHCP leases to other devices.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.
SNMPSimple Network Management Protocol (SNMP) is used in conjunction with anetwork management system to monitor specified network devices for definedevents and activities. Those activities are defined in a Management InformationBase (MIB). Your router supports a light implementation of SNMP with a definedMIB.The following configuration options are available:Enable Check Box: This box will enable or disable the SNMP feature.TCP Port: Specify the TCP port you would like the SNMP server to listen on. Thedefault is 161.UDP Port: Specify the UDP port you would like the SNMP server to listen on. Thedefault is 161.Community Name: Specify the community name for your SNMP neighborhood.Device Description: An optional field to give the device a description upon SNMPquery.Location Name: An optional field to list the device's location.Administrator Email: An optional field to input the network administrator's e-mailcontact information.LAN, WAN, and 3G checkboxes: Enable or disable reporting of these interfacesupon SNMP query.Dynamic DNSThe Dynamic DNS feature enables the router to interface directly with DDNSservice providers to update your WAN IP address when it changes. Dynamic DNSmaps the name of your DDNS host to your current WAN IP address. Before youenable Dynamic DNS, you need to register an account on one of the Dynamic DNSservers listed in the Service field. To enable Dynamic DNS click the check box nextto Enable. Next enter the appropriate information about your Dynamic DNSServer.You have to define:
Service.Hostname.Username.Password.Additional controls of the Dynamic DNS server include:Check for changed IP every – Enter numeric value.Check-Time unit – Select a unit of time from the list.Force update every – Enter numeric value.Force-Time unit – Select a unit of time from the list.Add additional entry(ies).NOTE: This information is established when you register an account ona Dynamic DNS server. After any changes, select ”Save” to retain.System will refresh following, “Save”.QoSQuality of Service settings provide a mechanism to provide prioritization ofcertain types of traffic over other types of traffic. Disable by default, QoS can beenabled as necessary.Downlink and Uplink speeds can be modified for either the Datacard or WANconnections.Prioritization. This section allows for the following choices:Set Priority: Low, normal, express, or prioritySource address: Select from detected sources.Target Address: Select detected targets.Service: Select Service option.P2P: Select Peer-to-Peer protocol.Protocol: Select internet protocol.Ports: Enter ports.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.GPS
BC2400M and RB2400M provided a rich GPS (Global Positioning System) functionwhen used with a compatible and certified GPS modem. The GPS is a receiverwhich calculates its position by precisely timing the signals sent by GPS satelliteshigh above the Earth. Each satellite continually transmits messages that include:The time the message was transmittedPrecise orbital information (the ephemeris)The general system health and rough orbits of all GPS satellites (the almanac).The receiver uses the messages it receives to determine the transit time of eachmessage and computes the distance to each satellite. These distances along withthe satellites' locations are used to compute the position of the receiver. TheBC2400M provides this position data in the KLM/KMZ format which is compatiblewith Google.Setup: controlling the GPS function and configuration on BC2400M and RB2400Mmay be done via both the Web based i3GUI or CLI commands. Please referencethe BC2400M / RB2400M CLI manual for all CLI commands. Following are the Webbased GUI instruction for configuring the GPS.The BC2400M and RB2400M support GPS on certified compatible modems only.Please see the BC2400M and RB2400M compatibility chart at http://nexaira.com/wireless-routers for the GPS certified compatible modems. Additionally, if amodem is certified for GPS on the BC2400M and RB2400M, the GPS icon on theGUI in the advanced section is displayed indicating GPS feature is available asshown below.
Configuraion Step 1: Select the GPS ICON and Selct Enable.Configuration Step 2: Select to access GPS data locally by checking Host KMZ onRouter GUIThis will allow the KMZ file to be stored on the router and accessed at thehttp://ROUTER_IP/FILENAME.kmz where FILENAME is defined as one of threeoptions:WiFi MAC Address (which is the Default)Router Host Name (Note; create a unique Router Hostname: located on theSystems Page accessed from the Main GUI)Custom Name
Configuration Step 3: Allows selection of using a remote GPS sever to store andutilize the location information. The GPS data will always be sent in a KMZcompressed file format. To enable check send KMZ to Remote FTP Server.Upon selecting Remote FTP GPS Sever three additional entry fields appear theremote server information:FTP Server IP AddressFTP Sever UsernameFTP Password
Configuration Step 4: allow for setting the sample interval and quantity which willbe stored and shipped in each KMZ file of information. This allows for longer timebuffering the GPS data for situations where the device may be out cellular serviceyet still powered on and receiving GPS data.Frequency is drop down box allows for sample storage every 10 seconds to oncean hour.Accuracy setting 10 to 1000 meters will drive the GPS chipset to improve locationaccuracy at the expense of delay and fewer samples.KML Samples in a drop down box sets the maximum number of sample storedand sent in each file.Please note: the KMZ file storage is limited to 720 samples so as to not burdenthe network when the GPS data sent to the FTP GPS server. However, at asample an hour that would provide about 30 days of GPS location data storagegiven power remained on the device. This would maintain GPS data duringnormal or extended cellular outages.Configuration Step 5: Provides KML identities to the GPS DataKML Name well be used to identify the Name TAG of the fileKML Description will be used to identify the Description Tag of the KML file
Configuration of the GPS modem is complete.Security SettingsRemote AdminThis feature allows you to enable administrative remote access to the router. Youcan choose the default port of 8080, or assign any other valid port.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.IPsecIP Security (IPsec) is a suite of protocols for transmitting encrypted IP datasecurely. This function is performed by authenticating and securing each packetfrom source to destination. The BC2400M supports IPsec in tunnel mode, withmultiple configuration options for authentication and encryption. Two concurrentIPsec tunnels utilizing AES encryption are supported in your router. The followingconfiguration options are available:Enable Check Box: This checkbox will enable or disable the IPsec tunnelingfeature.Initiate Tunnel: Choose when tunnel is initiated.WAN Interface: Choose the routing WAN interface.Key Exchange Method:Choose encryption key exchange method.Local LAN Network: Enter the Network and subnet in network prefix notation ofyour LAN.Remote WAN IP: Enter the public WAN IP address of the IPsec endpoint you wishto connect to.Remote LAN IP: Enter the LAN gateway IP address of the LAN you wish to connectto.Remote LAN Network: Enter the Network and subnet in network prefix notationof the LAN you wish to connect to.WAN IP Address: Your router’s public WAN IP address, either from Ethernet or
3G/4G, should be entered here.Integrity: Choose integrity type.Encryption Algorithm: Choose encryption algorithm.DH Group: Choose DH groupStrict Negotiation: Choose to use only above settings.Pre-Shared Key: Enter your chosen PSK value in this field.Add Entry: Choose to add an entry.SSH ServerEnable remote shell access.Choose the port.Select connection criteria.Allow SSH access remotely.Choose to allow only listed IP addresses.Choose to allow authentication.SSH KeysHere you can insert keys for Public-Key authentication (one per line.)Routing SettingsRoutesActive IPv4-RoutesView current routes for the datacard, LAN, or WAN. Static IPv4 Routes.Add entry. Adding an entry inserts fields which require additional information.Interface: Set interface (LAN, datacard, or WAN).Target: Select Target (Host-IP or Network).IPv4-Netmask: Select IPv4-Netmask (only if target is a network).IPv4-Gateway: Select IPv4-Gateway.NOTE: After any changes, select ”Save” to retain. System will refresh
following, “Save”.RIPThis feature allows use of RIP protocol over the selected RIP device.RIP Version 1 or Version 2 can be selected.Additional entries can also be added.NOTE: After any changes, select ”Save” to retain. System will refreshfollowing, “Save”.DMZ HostDMZ allows all traffic to be forwarded to one host on the LAN provided there areno other port forwarding rules that will effect that traffic.Check the enable boxType in the IP Address on LAN to be placed in DMZ.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.VRRPVirtual Router Redundancy Protocol (VRRP) is an open source router redundancyprotocol as specified in RFC 3768. It is designed to provide gateway redundancyacross multiple routers on the same subnet. It is important to note that thisfeature provides redundancy for routing functions only, and does not includeother LAN functions such as DHCP.NOTE: After configuring VRRP, the router must be rebooted before VRRP takeseffect.The following configuration options are available:Enable Check Box: Enable or disable the VRRP feature.ID: The ID value of the router, a range of 1 through 254.Priority: This is the priority of the router in the VRRP chain; 254 is always master.
The higher the value, the higher the priority of the device.IP Address: This is the virtual router IP address. By default it should match yourprimary gateway's LAN IP address. All VRRP routers on the subnet must utilize thesame virtual router IP address.Interval: This is the interval by which VRRP registration messages are sent viabroadcast and gratuitous ARP.Internet FailoverInternet Failover is a feature that provides failover from your primary internetconnection, WAN, to your secondary internet connection when your primaryconnection fails.Choose to enable Internet Failover.Choose Primary and Backup interfaces.Choose to keep the backup connection alive .Choose Failover and Switchback times.Input Test IP names for connection testing.Choose the number of seconds between each ping for connection testing.NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.Port ForwardingPort forwarding allows a port or range of ports to be opened to inbound traffic.That traffic is than forwarded to a LAN host on a specified port or range of ports.Adding an entry will insert fields requiring additional information to configure thisfeature.Insert Name (optional).Choose Protocol, TCP, UDP, or TCP + UDP.Insert port number or range of ports (first-last) for external device.Select internal IP-address.Select internal port or range (optional).
NOTE: After any changes, select ”Save” to retain. System will refresh following,“Save”.UPnPEnable UPnP to allow clients in the local network to automatically configure therouter.©2011 Nexaira Inc.
NEX-BC-2400MIC 7839B-2400M01Industry Canada - Class BThis digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus as set out in the interference-causing equipment standard entitled“Digital Apparatus,” ICES-003 of Industry Canada. Cet appareil numérique respecte les limites de bruits radioélectriques applicables aux appareils numériques de Classe B prescrites dans la norme sur le matérial brouilleur: “Appareils Numériques,” NMB-003édictée par l’Industrie. (1) This device may not cause interference,and (2) this device must accept any interference, including interference that may cause undesired operation of the device." Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. Sous la réglementation d'Industrie Canada, ce transmetteur radio ne peut fonctionner en utilisant une antenne d'un type et un maximum (ou moins) gain approuvées pour l'émetteur par Industrie Canada. Pour réduire le risque d'interférence aux autres utilisateurs, le type d'antenne et son gain doivent être choisis de manière que la puissance isotrope rayonnée équivalente (PIRE) ne dépasse pas ce qui est nécessaire pour une communication réussie. L'equipement est conforme aux limites d'exposition aux RF etablies pour un environnement non controle. L'antenne (s) utilisee pour ce transmetteur ne doit pas etre co-localises ou fonctionnant en conjonction avec une autre antenne ou transmetteur.RF exposure warning:The equipment complies with RF exposure limits set forth for an uncontrolled environment. The antenna(s) used for this transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range. IC requires this product to be used indoors for the frequency range 5.15 to 5.25 GHz to reduce the potential for harmful interference to co-channel Mobile Satellite systems. High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and /or damage this device. Ce dispositif est limite a une utilisation en interieur a cause de son fonctionnement dans la gamme 5.15 a 5.25 GHz. IC exige que ce produit soit utilise a l'interieur de la gamme de frequence 5,15 a 5,25 GHz pour reduire les risques d'interference nuisible a la co-canal systemes mobiles par satellite. Radars a haute puissance sont designes comme utilisateurs principaux de l'5,25 a 5,35 GHz et 5,65 a 5,85 GHz. Ces stations radar peut provoquer des interferences avec et / ou endommager l'appareil.Warning: This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.IC Warning:Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence.L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
FCC YAZ-2400M-01 FCC 15b devices This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: -Reorient or relocate the receiving antenna. -Increase the separation between the equipment and receiver. -Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -Consult the dealer or an experienced radio/TV technician for help  FCC Part 15.21 information for user You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment.  FCC part 15.19 This device complies with part 15 of the FCC rules.   Operation is subject to the following two conditions (1) This device may not cause harmful interference and   (2) This device must accept any interference received, including interference that may cause undesired operation for mobile devices without co-location condition ( the transmitting antenna is installed or located more than 20cm away from the body of user and near by person )  FCC RF Radiation Exposure Statement: 1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body.

Navigation menu