41
USER GUIDE  Wireless-G Broadband Router Model: WRT54GL

Wireless-g Broadband Router User Guide

  • Upload
    jbn2009

  • View
    223

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 1/41

USER GUIDE

 Wireless-G Broadband Router

Model:WRT54GL

Page 2: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 2/41

  About This Guide

iWireless-G Broadband Router

About This Guide

Icon Descriptions

While reading through the User Guide you may see

various icons that call attention to speciic items. Below isa description o these icons:

NOTE: This check mark indicates that there isa note o interest and is something that youshould pay special attention to while using theproduct.

 WARNING: This exclamation point indicatesthat there is a caution or warning and it issomething that could damage your property orproduct.

WEB: This globe icon indicates a noteworthywebsite address or e-mail address.

Online Resources

Website addresses in this document are listed withouthttp:// in ront o the address because most current webbrowsers do not require it. I you use an older web browser,you may have to add http:// in ront o the web address.

Resource Website

LinksysWRT54GL User Guide WRT54GLUser Guide www.linksys.com

Linksys International www.linksys.com/international

Glossary www.linksys.com/glossary

Network Security www.linksys.com/security

Copyright and Trademarks

Linksys is a registered trademark ortrademark o Cisco Systems, Inc. and/or its ailiates in the U.S. and certainother countries. Copyright © 2008Cisco Systems, Inc. All rights reserved.Other brands and product names aretrademarks or registered trademarkso their respective holders.

Page 3: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 3/41

  Table of Contents

iWireless-G Broadband Router

Chapter 1: Product Overview 3

Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Chapter 2: Wireless Security Checklist 4

General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Chapter 3: Advanced Confguration 5

Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Setup > DDNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Setup > MAC Address Clone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Wireless > Wireless MAC Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

Applications and Gaming > Port Range Forward. . . . . . . . . . . . . . . . . . . . . . . . . .17

Applications & Gaming > Port Triggering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

Administration > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Administration > Factory Deaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Administration > Confg Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Status > Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Appendix A: Troubleshooting 23

Appendix B: Specifcations 24

Appendix C: Warranty Inormation 25

Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Appendix D: Regulatory Inormation 27

FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Saety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Page 4: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 4/41

  Table of Contents

iiWireless-G Broadband Router

Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Avis de non-responsabilité concernant les appareils sans fl . . . . . . . . . . . . . . . . . .28

User Inormation or Consumer Products Covered by EU Directive 2002/96/EC on WasteElectric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

Appendix E: Sotware License Agreement 33

Sotware in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Sotware Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Page 5: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 5/41

Chapter 1 Product Overview

3Wireless-G Broadband Router

Chapter 1:Product Overview

Thank you or choosing the Linksys Wireless-G BroadbandRouter. The Router lets you access the Internet via a

wireless connection, broadcast at up to 54 Mbps, orthrough one o its our switched ports. You can also usethe Router to share resources such as computers, printersand iles. A variety o security eatures help to protectyour data and your privacy while online. Security eaturesinclude WPA2 security, a Stateul Packet Inspection (SPI)irewall and NAT technology. Coniguring the Router iseasy using the provided browser-based utility.

Front Panel

SecureEasySetup (Orange/White) The Ciscologo is the Router’s SecureEasySetup button. Itlights up and will stay orange when the Routeris powered on. The color orange indicates thatthe Router is not using the SecureEasySetupeature, while the color white indicates that theRouter is using the SecureEasySetup eature.

When the Router enters SecureEasySetupmode, the Cisco logo will turn white andstart lashing. Ater the Router has generatedthe SSID and WPA Personal key, the Ciscologo will stop lashing and stay white.

To clear the SSID and WPA Personal key, pressand hold down the Cisco logo or ive seconds.The Cisco logo will lash slowly as the Routerresets itsel. The Cisco logo will turn orange toindicate a successul reset.

NOTE:SecureEasySetup is a eature that makes

it easy to set up your wireless network. I youhave SecureEasySetup devices, run the Router’sSetup Wizard CD-ROM and ollow the on-screen instructions to use SecureEasySetup.

Power (Green) The Power LED lights upand will stay on while the Router is poweredon. When the Router goes through its sel-diagnostic mode during every boot-up, thisLED will lash. When the diagnostic is complete,the LED will be solidly lit.

DMZ (Green) The DMZ LED indicates whenthe DMZ unction is being used. This LED willremain lit as long as DMZ is enabled.

WLAN (Green) The WLAN LED lights up whenthe wireless eature is enabled. I the LED islashing, the Router is actively sending orreceiving data over the network.

1, 2, 3, 4 (Green) These numbered LEDs,corresponding with the numbered ports on theRouter’s back panel, serve two purposes. I theLED is continuously lit, the Router is successullyconnected to a device through that port. A

lashing LED indicates network activity overthat port.

Internet (Green) The Internet LED lights upwhen there is a connection made through theInternet port. A lashing LED indicates network activity over the Internet port.

Back Panel

Reset There are two ways to reset the Router’sactory deaults. Either press and hold the ResetButton or approximately ive seconds, or restorethe deaults rom Administration > FactoryDeaults in the Router’s web-based utility.

InternetThe Internet port is where you will

connect your cable or DSL Internet connection.

1, 2, 3, 4 These Ethernet ports (1, 2, 3, 4) connectthe Router to PCs on your wired network andother Ethernet network devices.

Power The Power port is where you willconnect the power adapter.

Page 6: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 6/41

Chapter 2 Wireless Security Checklist

4Wireless-G Broadband Router

Chapter 2:Wireless Security Checklist

Wireless networks are convenient and easy to install, sohomes with high-speed Internet access are adopting them

at a rapid pace. Because wireless networking operates bysending inormation over radio waves, it can be morevulnerable to intruders than a traditional wired network.Like signals rom your cellular or cordless phones, signalsrom your wireless network can also be intercepted. Sinceyou cannot physically prevent someone rom connectingto your wireless network, you need to take some additionalsteps to keep your network secure.

1. Change the default wirelessnetwork name or SSID

Wireless devices have a deault wireless network nameor Service Set Identiier (SSID) set by the actory. Thisis the name o your wireless network, and can be upto 32 characters in length. Linksys wireless productsuse linksys as the deault wireless network name. Youshould change the wireless network name to somethingunique to distinguish your wireless network rom otherwireless networks that may exist around you, but do notuse personal inormation (such as your Social Securitynumber) because this inormation may be available oranyone to see when browsing or wireless networks.

2. Change the default password

For wireless products such as access points and routers,you will be asked or a password when you want to changetheir settings. These devices have a deault password setby the actory. The Linksys deault password is admin.Hackers know these deaults and may try to use themto access your wireless device and change your network settings. To thwart any unauthorized changes, customizethe device’s password so it will be hard to guess.

3. Enable MAC address filtering

Linksys routers give you the ability to enable Media AccessControl (MAC) address iltering. The MAC address is aunique series o numbers and letters assigned to everynetworking device. With MAC address iltering enabled,wireless network access is provided solely or wirelessdevices with speciic MAC addresses. For example, you canspeciy the MAC address o each computer in your homeso that only those computers can access your wirelessnetwork.

4. Enable encryption

Encryption protects data transmitted over a wirelessnetwork. Wi-Fi Protected Access (WPA/WPA2) and WiredEquivalency Privacy (WEP) oer dierent levels o security

or wireless communication. Currently, devices that areWi-Fi certiied are required to support WPA2, but are notrequired to support WEP.

A network encrypted with WPA/WPA2 is more securethan a network encrypted with WEP, because WPA/WPA2uses dynamic key encryption. To protect the inormationas it passes over the airwaves, you should enable thehighest level o encryption supported by your network equipment.

WEP is an older encryption standard and may be theonly option available on some older devices that do not

support WPA.

General Network Security Guidelines

Wireless network security is useless i the underlyingnetwork is not secure.

Password protect all computers on the network and•

individually password protect sensitive iles.

Change passwords on a regular basis.•

Install anti-virus sotware and personal irewall•

sotware.

Disable ile sharing (peer-to-peer). Some applications•

may open ile sharing without your consent and/orknowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away•

rom exterior walls and windows.

Turn wireless routers, access points, or gateways•

o when they are not being used (at night, duringvacations).

Use strong passphrases that are at least eight characters•

in length. Combine letters and numbers to avoid usingstandard words that can be ound in the dictionary.

WEB: For more inormation on wirelesssecurity, visit www.linksys.com/security

WRT54GL User Guide•

Page 7: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 7/41

Chapter 3 Advanced Configuration

5Wireless-G Broadband Router

Chapter 3:Advanced Configuration

Ater setting up the Router with the Setup Wizard (locatedon the CD-ROM), the Router will be ready or use. However,

i you’d like to change its advanced settings, use theRouter’s web-based utility. This chapter describes eachweb page o the utility and each page’s key unctions. Youcan access the utility via a web browser on a computerconnected to the Router.

The web-based utility has these main tabs: Setup,Wireless, Security, Access Restrictions, Applications &Gaming, Administration, and Status. Additional tabs willbe available ater you click one o the main tabs.

NOTE: When irst installing the Router, youshould use the Setup Wizard on the Setup

CD-ROM. I you want to conigure advancedsettings, use this chapter to learn about theweb-based utility.

How to Access the Web-Based Utility

To access the web-based utility, launch the web browser onyour computer, and enter the Router’s deault IP address,192.168.1.1, in the Address ield. Then, press Enter.

A password request screen will appear. (Non-Windows XPusers will see a similar screen.) Leave the User name ield

blank. The irst time you open the Web-based utility, usethe deault password admin. (You can set a new passwordrom the Administration tab’s Management  screen.) Click OK to continue.

Password Screen

Setup > Basic Setup

The irst screen that appears is the Basic Setup screen. Thisallows you to change the Router’s general settings.

Setup > Basic Setup

Internet Setup

The Internet Setup section conigures the Router to yourInternet connection. Most o this inormation can beobtained through your ISP.

Internet Connection Type

Select the type o Internet connection your ISP providesrom the drop-down menu. The available types are:

Automatic Coniguration - DHCP•

Static IP•

PPPoE•

PPTP•

L2TP•

Telstra Cable•

Automatic Configuration - DHCP

By deault, the Router’s Internet Connection Type is set

to Automatic Configuration - DHCP, which should bekept only i your ISP supports DHCP or you are connectingthrough a dynamic IP address. (This option usually appliesto cable connections.)

Internet Connection Type > Automatic Coniguration - DHCP

Page 8: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 8/41

Chapter 3 Advanced Configuration

6Wireless-G Broadband Router

Static IP

I you are required to use a permanent IP address toconnect to the Internet, select Static IP.

Internet Connection Type > Static IP

Internet IP Address This is the Router’s IP address, whenseen rom the Internet. Your ISP will provide you with theIP Address you need to speciy here.

Subnet Mask  This is the Router’s Subnet Mask, as seenby users on the Internet (including your ISP). Your ISP willprovide you with the Subnet Mask.

Gateway Your ISP will provide you with the GatewayAddress, which is the ISP server’s IP address.

DNS Your ISP will provide you with at least one DNS(Domain Name System) Server IP Address.

PPPoE

Some DSL-based ISPs use PPPoE (Point-to-Point Protocolover Ethernet) to establish Internet connections. I you areconnected to the Internet through a DSL line, check withyour ISP to see i they use PPPoE. I they do, you will have

to enable PPPoE.

Internet Connection Type > PPPoE

User Name and Password Enter the User Name andPassword provided by your ISP.

Service Name I provided by your ISP, enter the ServiceName.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsed

beore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period I you select this option,the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To use

this option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check the Internet connection. The deault Redial Period is30 seconds.

PPTP

Point-to-Point Tunneling Protocol (PPTP) is a service thatapplies to connections in Europe only.

Internet Connection Type > PPTP

Internet IP Address This is the Router’s IP address, asseen rom the Internet. Your ISP will provide you with theIP Address you need to speciy here.

Subnet Mask  This is the Router’s Subnet Mask, as seenby users on the Internet (including your ISP). Your ISP will

provide you with the Subnet Mask.Gateway Your ISP will provide you with the GatewayAddress.

User Name and Password Enter the User Name andPassword provided by your ISP.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as you

attempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period If you select this option, the

Router will periodically check your Internet connection. If 

you are disconnected, then the Router will automatically

re-establish your connection. To use this option, selectKeep Alive. In the Redial Period field, you specify how often

you want the Router to check the Internet connection. The

default value is 30 seconds.

Page 9: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 9/41

Chapter 3 Advanced Configuration

7Wireless-G Broadband Router

L2TP

L2TP is a service that applies to connections in Israel only.

Internet Connection Type > L2TP

User Name and Password Enter the User Name andPassword provided by your ISP.

L2TP Server This is the IP address o the L2TP Server.Your ISP will provide you with the IP Address you need tospeciy here.

Connect on Demand: Max Idle Time You can conigure

the Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes

Keep Alive: Redial Period I you select this option,the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check the Internet connection. The deault Redial Period is30 seconds.

Telstra Cable

Telstra Cable is a service that applies to connections inAustralia only.

Internet Connection Type > Telstra Cable

User Name and Password Enter the User Name andPassword provided by your ISP.

Heart Beat Server This is the IP address o the HeartbeatServer. Your ISP will provide you with the IP Address youneed to speciy here.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as you

attempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes

Keep Alive: Redial Period I you select this option,the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check the Internet connection. The deault Redial Period is30 seconds.

Optional Settings

Some o these settings may be required by your ISP. Veriywith your ISP beore making any changes.

Optional Settings

Router Name In this ield, you can enter a name o up to39 characters to represent the Router.

Host Name/Domain Name These ields allow you tosupply a host and domain name or the Router. Some ISPs,usually cable ISPs, require these names as identiication.You may have to check with your ISP to see i yourbroadband Internet service has been conigured with ahost and domain name. In most cases, leaving these ieldsblank will work.

MTU MTU is the Maximum Transmission Unit. It speciiesthe largest packet size permitted or Internet transmission.

Select Manual i you want to manually enter the largestpacket size that is transmitted. To have the Router selectthe best MTU or your Internet connection, keep thedeault setting, Auto.

Size When Manual is selected in the MTU ield, this optionis enabled. Leave this value in the 1200 to 1500 range. Thedeault size depends on the Internet Connection Type:WRT54GL User Guide

DHCP, Static IP, or Telstra:• 1500

PPPoE:• 1492

Page 10: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 10/41

Chapter 3 Advanced Configuration

8Wireless-G Broadband Router

PPTP or L2TP:• 1460

Network Setup

The Network Setup section changes the settings on thenetwork connected to the Router’s Ethernet ports. WirelessSetup is perormed through the Wireless tab.

Router IP

This presents both the Router’s IP Address and SubnetMask as seen by your network.

Router IP Address

Network Address Server Settings (DHCP)

The settings allow you to conigure the Router’s Dynamic

Host Coniguration Protocol (DHCP) server unction. TheRouter can be used as a DHCP server or your network. ADHCP server automatically assigns an IP address to eachcomputer on your network. I you choose to enable theRouter’s DHCP server option, make sure there is no otherDHCP server on your network.

Network Address Server Settings (DHCP)

DHCP Server DHCP is enabled by actory deault. I youalready have a DHCP server on your network, or you don’twant a DHCP server, then select Disable (no other DHCPeatures will be available).

Starting IP Address Enter a value or the DHCP server tostart with when issuing IP addresses. Because the Router’s

default IP address is 192.168.1.1, the Starting IP Address must

be 192.168.1.2 or greater, but smaller than 192.168.1.253. The default Starting IP Address is 192.168.1.100.

Maximum Number of DHCP Users Enter the maximumnumber o PCs that you want the DHCP server to assignIP addresses to. This number cannot be greater than 253.The deault is 50.

Client Lease Time The Client Lease Time is the amounto time a network user will be allowed connection to theRouter with their current dynamic IP address. Enter theamount o time, in minutes, that the user will be “leased”this dynamic IP address. Ater the time is up, the user will

be automatically assigned a new dynamic IP address. Thedeault is 0 minutes, which means one day.

Static DNS (1-3)  The Domain Name System (DNS) is how

the Internet translates domain or website names into

Internet addresses or URLs. Your ISP will provide you with at

least one DNS Server IP Address. If you wish to use another,

enter that IP Address in one of these fields. You can enter upto three DNS Server IP Addresses here. The Router will use

these for quicker access to functioning DNS servers.

WINS The Windows Internet Naming Service (WINS)manages each PC’s interaction with the Internet. I youuse a WINS server, enter that server’s IP Address here.Otherwise, leave this blank.

Time Setting

Select the time zone in which your network unctionsrom this drop-down menu. (You can even automaticallyadjust or daylight saving time.)

Time Setting

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Setup > DDNS

The Router oers a Dynamic Domain Name System (DDNS)eature. DDNS lets you assign a ixed host and domainname to a dynamic Internet IP address. It is useul whenyou are hosting your own website, FTP server, or otherserver behind the Router.

Beore you can use this eature, you need to signup or DDNS service with a DDNS service provider,www.dyndns.org or www.TZO.com. I you do not want touse this eature, keep the deault setting, Disable.

DDNS

DDNS Service

I your DDNS service is provided by DynDNS.org, thenselect DynDNS.org rom the drop-down menu. I yourDDNS service is provided by TZO, then select TZO.com.The eatures available on the DDNS screen will vary,depending on which DDNS service provider you use.

Page 11: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 11/41

Chapter 3 Advanced Configuration

9Wireless-G Broadband Router

DynDNS.org

Setup > DDNS > DynDNS

System Select the DynDNS service you use: Dynamic,

Static, or Custom. The deault selection is Dynamic.User Name Enter the User Name or your DDNS account.

Password Enter the Password or your DDNS account.

Host Name The is the DDNS URL assigned by the DDNSservice.

Mail Exchange (Optional) Enter the address o your mailexchange server, so e-mails to your DynDNS address go toyour mail server.

Backup MX This eature allows the mail exchange serverto be a backup. To disable this eature, keep the deault,No. To enable the eature, select Yes. I you are not sure

which setting to select, keep the deault, No.

WildCard This setting enables or disables wildcardsor your host. For example, i your DDNS address ismyplace.dyndns.org and you enable wildcards, then x.myplace.dyndns.org will work as well (x is the wildcard).To disable wildcards, keep the deault, Off . To enablewildcards, select On. I you are not sure which setting toselect, keep the deault, Off .

Internet IP Address The Router’s Internet IP address isdisplayed here. Because it is dynamic, it will change.

Status The status o the DDNS service connection is

displayed here.Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

TZO.com

Setup > DDNS > TZO

E-mail Address, Password, and Domain Name Enterthe settings o the account you set up with TZO.

Internet IP Address The Router’s Internet IP address is

displayed here. Because it is dynamic, it will change.Status The status o the DDNS service connection isdisplayed here.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Setup > MAC Address Clone

A MAC address is a 12-digit code assigned to a uniquepiece o hardware or identiication. Some ISPs will requireyou to register a MAC address in order to access theInternet. I you do not wish to re-register the MAC address

with your ISP, you may assign the MAC address you havecurrently registered with your ISP to the Router with theMAC Address Clone eature.

Setup > MAC Address Clone

MAC Address Clone

Enable/Disable To have the MAC Address cloned, selectEnable.

User Defined Entry Enter the MAC Address registeredwith your ISP here.

Clone Your PC’s MAC Clicking this button will clone theMAC address o the computer you are using.

Page 12: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 12/41

Chapter 3 Advanced Configuration

10Wireless-G Broadband Router

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Setup > Advanced Routing

This screen is used to set up the Router’s advancedunctions. Operating Mode allows you to select thetype(s) o advanced unctions you use. Dynamic Routingautomatically adjusts how packets travel on your network.Static Routing sets up a ixed route to another network destination.

Setup > Advanced Routing (Gateway)

Setup > Advanced Routing (Router)

Advanced Routing

Operating Mode Select the mode in which this Routerwill unction. I this Router is hosting your network’sconnection to the Internet, select Gateway. I anotherRouter exists on your network, select Router. WhenRouter is chosen, Dynamic Routing will be available asan option.

Dynamic Routing

RIP This eature enables the Router to automaticallyadjust to physical changes in the network’s layout and

exchange routing tables with the other router(s). TheRouter determines the network packets’ route based onthe ewest number o hops between the source and thedestination. This eature is Disabled by deault. From thedrop-down menu, you can also select LAN & Wireless,which perorms dynamic routing over your Ethernet and

wireless networks. You can also select WAN (Internet),which perorms dynamic routing with data coming romthe Internet. Selecting Both enables dynamic routing orboth networks, as well as data rom the Internet.

Static Routing

Select set number To set up a static route betweenthe Router and another network, select a number romthe drop-down list. (A static route is a pre-determinedpathway that network inormation must travel to reach aspeciic host or network.) Enter the inormation describedbelow to set up a new static route. (Click Delete This Entry to delete a static route.)

Enter Route Name Enter a name or the Route here,using a maximum o 25 alphanumeric characters.

Destination LAN IP The Destination LAN IP is the addresso the remote network or host to which you want to assigna static route.

Subnet Mask  The Subnet Mask determines whichportion o a Destination LAN IP address is the network portion, and which portion is the host portion.

Default Gateway This is the IP address o the gatewaydevice that allows or contact between the Router and theremote network or host.

Interface This interace tells you whether the DestinationIP Address is on the LAN & Wireless (Ethernet and wirelessnetworks) or the WAN (Internet).

Click Show Routing Table to view the Static Routes youhave already set up.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Wireless > Basic Wireless Settings

The basic settings or wireless networking are set on this

screen.

Page 13: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 13/41

Chapter 3 Advanced Configuration

11Wireless-G Broadband Router

Wireless > Basic Wireless Settings

Wireless Network

Wireless Network Mode From this drop-down menu,you can select the wireless standards running on yournetwork. I you have both 802.11g and 802.11b devicesin your network, keep the deault setting, Mixed. I youhave only 802.11g devices, select G-Only. I you haveonly 802.11b devices, select B-Only. I you do not haveany 802.11g and 802.11b devices in your network, selectDisable.

Wireless Network Name (SSID) The SSID is the network name shared among all points in a wireless network.The SSID must be identical or all devices in the wirelessnetwork. It is case-sensitive and must not exceed32 characters (use any o the characters on the keyboard).Make sure this setting is the same or all points in yourwireless network. For added security, you should change

the deault SSID (linksys) to a unique name.

Wireless Channel Select the appropriate channel romthe list provided to correspond with your network settings.All devices in your wireless network must use the samechannel in order to communicate.

Wireless SSID Broadcast When wireless clients surveythe local area or wireless networks to associate with, theywill detect the SSID broadcast by the Router. To broadcastthe Router’s SSID, keep the deault setting, Enable. I youdo not want to broadcast the Router’s SSID, then selectDisable.

SecureEasySetup I you did not utilize this network connection eature during the Setup Wizard, you may useit here by clicking the green logo. When you are promptedto start the push button setup, click OK.

Reset Security Use this button to reset the securitysettings on your network. You will need to runSecureEasySetup again on each device on your network to re-associate it with your network.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Wireless > Wireless Security

The Wireless Security settings conigure the security o your wireless network. There are six wireless securitymode options supported by the Router: WPA Personal,WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS,

and WEP. (WPA stands or Wi-Fi Protected Access, whichis a security standard stronger than WEP encryption. WEPstands or Wired Equivalent Privacy, while RADIUS standsor Remote Authentication Dial-In User Service.) Thesesix are briely discussed here. For detailed instructionson coniguring wireless security or the Router, reer to“Chapter 2: Wireless Security.”

Wireless Security

Security Mode

Select the security method or your wireless network. I you do not want to use wireless security, keep the deault,Disabled.

WPA Personal

NOTE: I you are using WPA, always rememberthat each device in your wireless network MUSTuse the same WPA method and shared key, orelse the network will not unction properly.

Security Mode > WPA Personal

WPA Algorithm WPA supports two encryption methods,TKIP and AES, with dynamic encryption keys. Select thetype o algorithm, TKIP or AES. The deault is TKIP.

WPA Shared Key Enter a WPA Shared Key o 8-63characters.

Group Key Renewal Enter a Group Key Renewal period,which instructs the Router how oten it should change theencryption keys. The deault Group Key Renewal period is3600 seconds.

WPA Enterprise

This option eatures WPA used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)

Page 14: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 14/41

Chapter 3 Advanced Configuration

12Wireless-G Broadband Router

Security Mode > WPA Enterprise

WPA Algorithm WPA supports two encryption methods,TKIP and AES, with dynamic encryption keys. Select thetype o algorithm, TKIP or AES. The deault is TKIP.

RADIUS Server Address Enter the IP Address o theRADIUS server.

RADIUS Port Enter the port number o the RADIUSserver. The deault value is 1812.

Shared Key Enter the key shared between the Routerand the server.

Key Renewal Timeout Enter a Key Renewal Timeoutperiod, which instructs the Router how oten it shouldchange the encryption keys. The deault Key RenewalTimeout period is 3600 seconds.

WPA2 Personal

Security Mode > WPA2 Personal

WPA Algorithm WPA2 supports two encryptionmethods, TKIP and AES, with dynamic encryption keys.

Select the type o algorithm, AES, or TKIP + AES. Thedeault selection is TKIP + AES.

WPA Shared Key Enter a WPA Shared Key o 8-63characters.

Group Key Renewal Enter a Group Key Renewal period,which instructs the Router how oten it should change theencryption keys. The deault Group Key Renewal period is3600 seconds.

WPA2 Enterprise

This option eatures WPA2 used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)

Security Mode > WPA2 Enterprise

WPA Algorithm WPA2 supports two encryptionmethods, TKIP and AES, with dynamic encryption keys.Select the type o algorithm, AES, or TKIP + AES. Thedeault selection is TKIP + AES

RADIUS Server Address Enter the IP Address o theRADIUS server.

RADIUS Port Enter the port number o the RADIUSserver. The deault value is 1812.

Shared Key Enter the key shared between the Routerand the server.

Key Renewal Timeout Enter a Key Renewal Timeout

period, which instructs the Router how oten it shouldchange the encryption keys. The deault Key RenewalTimeout period is 3600 seconds.

RADIUS

This option eatures WEP used in coordination with aRADIUS server. (This should only be used when a RADIUSserver is connected to the Router.)

Security Mode > RADIUS

Page 15: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 15/41

Chapter 3 Advanced Configuration

13Wireless-G Broadband Router

IMPORTANT: If you are using WEP encryption,

always remember that each device in your

wireless network MUST use the same WEP

encryption method and encryption key, or else

your wireless network will not function properly.

RADIUS Server Address Enter the IP Address o theRADIUS server.

RADIUS Port Enter the port number o the RADIUSserver. The deault value is 1812.

Shared Key Enter the key shared between the Routerand the server.

Default Transmit Key Select a Deault Transmit Key(choose which Key to use). The deault is 1.

WEP Encryption Select a level o WEP encryption,64 bits 10 hex digits or 128 bits 26 hex digits. Thedeault is 64 bits 10 hex digits.

Passphrase Enter a Passphrase to automatically generateWEP keys. Then click Generate.

Key 1-4 I you did not enter a Passphrase, enter the WEPkey(s) manually.

WEP

WEP is a basic encryption method, which is not as secureas WPA.

Security Mode > WEP

Default Transmit Key Select a Deault Transmit Key

(choose which Key to use). The deault is 1.

WEP Encryption Select a level o WEP encryption, 64 bits10 hex digits or 128 bits 26 hex digits. The deault is64 bits 10 hex digits.

Passphrase Enter a Passphrase to automatically generateWEP keys. Then click Generate.

Key 1-4 I you did not enter a Passphrase, enter the WEPkey(s) manually.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Wireless > Wireless MAC Filter

Wireless access can be filtered by using the MAC addresses of 

the wireless devices transmitting within your network’s radius. 

Wireless > Wireless MAC Filter

Wireless MAC Filter

Wireless MAC Filter  To filter wireless users by MAC Address,either permitting or blocking access, click Enable. If you do

not wish to filter users by MAC Address, keep the default

setting, Disable.

Prevent Select this  to block wireless access by MACAddress. This button is selected by deault.

Permit Only Select this to allow wireless access by MACAddress. This button is not selected by deault.

Edit MAC Filter List Click this to open the MAC Address

Filter List  screen. On this screen, you can list users, by MAC

Address, to whom you wish to provide or block access. For

easy reference, click Wireless Client MAC List to display a listof network users by MAC Address.

MAC Address Filter List

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Page 16: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 16/41

Chapter 3 Advanced Configuration

14Wireless-G Broadband Router

Wireless > Advanced Wireless Settings

This Wireless > Advanced Wireless Settings screen is usedto set up the Router’s advanced wireless unctions. Thesesettings should only be adjusted by an expert administratoras incorrect settings can reduce wireless perormance.

Wireless > Advanced Wireless Settings

Advanced Wireless

Authentication Type The deault is set to Auto, whichallows either Open System or Shared Key authenticationto be used. With Open System authentication, the senderand the recipient do NOT use a WEP key or authentication.With Shared Key authentication, the sender and recipientuse a WEP key or authentication.

Basic Rate The Basic Rate setting is not actually one rate

o transmission but a series o rates at which the Routercan transmit. The Router will advertise its Basic Rate to theother wireless devices in your network, so they know whichrates will be used. The Router will also advertise that it willautomatically select the best rate or transmission. Thedeault setting is Default, when the Router can transmitat all standard wireless rates (1-2Mbps, 5.5Mbps, 11Mbps,18Mbps, and 24Mbps). Other options are 1-2Mbps, oruse with older wireless technology, and All, when theRouter can transmit at all wireless rates. The Basic Rateis not the actual rate o data transmission. I you want tospeciy the Router’s rate o data transmission, conigurethe Transmission Rate setting.

Transmission Rate The rate o data transmission shouldbe set depending on the speed o your wireless network.You can select rom a range o transmission speeds, or youcan select Auto to have the Router automatically use theastest possible data rate and enable the Auto-Fallback eature. Auto-Fallback will negotiate the best possibleconnection speed between the Router and a wirelessclient. The deault value is Auto.

CTS Protection Mode CTS (Clear-To-Send) ProtectionMode should remain disabled unless you are having severeproblems with your Wireless-G products not being able

to transmit to the Router in an environment with heavy802.11b traic. This unction boosts the Router’s abilityto catch all Wireless-G transmissions but will severelydecrease perormance.

Frame Burst Enabling this option should provide yournetwork with greater perormance, depending on the

manuacturer o your wireless products. To turn on theFrame Burst option, select Enable. The deault is Disable.

Beacon Interval The deault value is 100. Enter a valuebetween 1 and 65,535 milliseconds. The Beacon Intervalvalue indicates the requency interval o the beacon. Abeacon is a packet broadcast by the Router to synchronizethe wireless network.

DTIM Interval This value, between 1 and 255, indicatesthe interval o the Delivery Traic Indication Message(DTIM). A DTIM ield is a countdown ield inormingclients o the next window or listening to broadcastand multicast messages. When the Router has buered

broadcast or multicast messages or associated clients, itsends the next DTIM with a DTIM Interval value. Its clientshear the beacons and awaken to receive the broadcastand multicast messages. The deault value is 1.

Fragmentation Threshold This value speciies themaximum size or a packet beore data is ragmentedinto multiple packets. I you experience a high packeterror rate, you may slightly increase the FragmentationThreshold. Setting the Fragmentation Threshold too lowmay result in poor network perormance. Only minorreduction o the deault value is recommended. In mostcases, it should remain at its deault value o 2346.

RTS Threshold Should you encounter inconsistent datalow, only minor reduction o the deault value, 2347, isrecommended. I a network packet is smaller than thepreset RTS threshold size, the RTS/CTS mechanism willnot be enabled. The Router sends Request to Send (RTS)rames to a particular receiving station and negotiatesthe sending o a data rame. Ater receiving an RTS, thewireless station responds with a Clear to Send (CTS) rameto acknowledge the right to begin transmission. The RTSThreshold value should remain at its deault value o 2347.

AP Isolation This isolates all wireless clients and wireless

devices on your network rom each other. Wireless deviceswill be able to communicate with the Router but not witheach other. To use this unction, select On. AP Isolation isturned Off by deault.

SecureEasySetup This eature allows you to enable ordisable the SecureEasySetup eature. Select Disabled todisable the eature and turn o the button’s light. Theeature is Enabled by deault.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Page 17: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 17/41

Chapter 3 Advanced Configuration

15Wireless-G Broadband Router

Security > Firewall

The Security > Firewall screen is used to conigure a irewallthat can ilter out various types o unwanted traic on theRouter’s local network.

Security > Firewall

Firewall

Firewall Protection To use irewall protection, keep thedeault selection, Enable. To turn o irewall protection,select Disable.

Block WAN Requests

Block Anonymous Internet Requests This eaturemakes it more diicult or outside users to work theirway into your network. This eature is selected by deault.Deselect the eature to allow anonymous Internetrequests.

Filter Multicast Multicasting allows or multiple

transmissions to speciic recipients at the same time. I multicasting is permitted, then the Router will allow IPmulticast packets to be orwarded to the appropriatecomputers. This eature is selected by deault. Deselectthis eature to disable it.

Filter Internet NAT Redirection This eature usesport orwarding to block access to local servers romlocal networked computers. Select Filter Internet NATRedirection to ilter Internet NAT redirection. This eatureis not selected by deault.

Filter IDENT (Port 113) This eature keeps port 113 rombeing scanned by devices outside o your local network.

This eature is selected by deault. Deselect this eature todisable it.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Security > VPN Passthrough

 The Security > VPN Passthrough screen allows you to enable

VPN tunnels using IPSec, PPTP, or L2TP protocols to pass

through the Router’s firewall.

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough Internet Protocol Security (IPSec) isa suite o protocols used to implement secure exchangeo packets at the IP layer. To allow IPSec tunnels to passthrough the Router, keep the deault, Enable.

PPTP Passthrough Point-to-Point Tunneling Protocol(PPTP) allows the Point-to-Point Protocol (PPP) to betunneled through an IP network. To allow PPTP tunnels topass through the Router, keep the deault, Enable.

L2TP Passthrough Layer 2 Tunneling Protocol is themethod used to enable Point-to-Point sessions via theInternet on the Layer 2 level. To allow L2TP tunnels to passthrough the Router, keep the deault, Enable.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Page 18: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 18/41

Chapter 3 Advanced Configuration

16Wireless-G Broadband Router

Access Restrictions > Internet Access

The  Access Restrictions > Internet Access screen allows youto block or allow speciic kinds o Internet usage andtraic, such as Internet access, designated services, andwebsites during speciic days and times.

Access Restrictions > Internet Access

Internet Access

Internet Access Policy Access can be managed by apolicy. Use the settings on this screen to establish anaccess policy (ater Save Settings is clicked). Selecting apolicy rom the drop-down menu will display that policy’ssettings. To delete a policy, select that policy’s numberand click Delete. To view all the policies, click Summary.(Policies can be deleted rom the Summary  screen byselecting the policy or policies and clicking Delete. Toreturn to the Internet Access tab, click Close.)

Internet Policy Summary

Status Policies are disabled by deault. To enable a policy,select the policy number rom the drop-down menu, andselect Enable.

To create an Internet Access policy:

Select a number rom the1. Internet Access Policy  drop-down menu.

To enable this policy, select2. Enable.

Enter a Policy Name in the ield provided.3.

Click 4. Edit List of PCs to select which PCs will be affected

by the policy. The List of PCs screen appears. You can

select a PC by MAC Address or IP Address. You can also

enter a range of IP Addresses if you want this policy

to affect a group of PCs. After making your changes,click  Save Settings to apply your changes or Cancel

Changes to cancel your changes. Then click Close. 

List o PCs

Select the appropriate option,5. Deny or Allow,depending on whether you want to block or allowInternet access or the PCs you listed on the List of PCs screen.

Decide which days and what times you want this policy6.to be enorced. Select the individual days during whichthe policy will be in eect, or select Everyday. Thenenter a range o hours and minutes during which thepolicy will be in eect, or select 24 Hours.

Select any Blocked Services or Website Blocking you7.wish to use.

Click 8. Save Settings to save the policy’s settings, orclick Cancel Changes to cancel the policy’s settings.

Blocked Services

You can ilter access to various services accessed over theInternet, such as FTP or telnet, by selecting services romthe drop-down menus next to Blocked Services. (You canblock up to 20 services.) Then enter the range o ports youwant to ilter.

I the service you want to block is not listed or you want toedit a service’s settings, then click Add/Edit Service. Thenthe Port Services screen will appear.

Port Services

Page 19: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 19/41

Chapter 3 Advanced Configuration

17Wireless-G Broadband Router

To add a service, enter the service’s name in the Service

Name ield. Select its protocol rom the Protocol  drop-down menu, and enter its range in the Port Range ields.Then click Add.

To modiy a service, select it rom the list on the right.Change its name, protocol setting, or port range. Then

click Modify.To delete a service, select it rom the list on the right. Thenclick Delete.

When you are inished making changes on the Port 

Services screen, click  Apply to save the changes. I youwant to cancel your changes, click  Cancel. To close thePort Services screen and return to the  Access Restrictions screen, click Close.

Website Blocking by URL Address

I you want to block websites with speciic URL addresses,

enter each URL in a separate ield next to Website Blockingby URL Address.

Website Blocking by Keyword

I you want to block websites using speciic keywords,enter each keyword in a separate ield next to Website

Blocking by Keyword .

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Applications and Gaming > Port Range

Forward The Applications & Gaming > Port Range Forward  screen

allows you to set up public services on your network, such as

web servers, ftp servers, e-mail servers, or other specialized

Internet applications. (Specialized Internet applications are

any applications that use Internet access to perform functions

such as videoconferencing or online gaming. Some Internet

applications may not require any forwarding.)

Applications and Gaming > Port Range Forward

Port Range Forward

To orward a port, enter the inormation on each line orthe criteria required.

Application In this ield, enter the name you wish to givethe application. Each name can be up to 12 characters.

Start/End This is the port range. Enter the number thatstarts the port range in the Start column and the numberthat ends the range in the End column.

Protocol Select the protocol used or this application,either TCP or UDP, or Both.

IP Address For each application, enter the IP Address o the PC running the speciic application.

Enable Select Enable to enable port orwarding or therelevant application.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Applications & Gaming > Port Triggering

The  Applications & Gaming > Port Triggering screen allowsthe Router to watch outgoing data or speciic portnumbers. The IP address o the computer that sends thematching data is remembered by the Router, so that whenthe requested data returns through the Router, the data ispulled back to the proper computer by way o IP addressand port mapping rules.

Applications and Gaming > Port Triggering

Port Triggering

Application Enter the application name o the trigger.

Triggered Range

For each application, list the triggered port number range.Check with the Internet application documentation orthe port number(s) needed.

Page 20: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 20/41

Chapter 3 Advanced Configuration

18Wireless-G Broadband Router

Start Port Enter the starting port number o the TriggeredRange.

End Port Enter the ending port number o the TriggeredRange.

Forwarded Range

For each application, list the orwarded port numberrange. Check with the Internet application documentationor the port number(s) needed.

Start Port Enter the starting port number o theForwarded Range.

End Port Enter the ending port number o the ForwardedRange.

Enable Select Enable to enable port triggering or theapplicable application.

Click Save Settings to apply your changes, or click Cancel

Changesto cancel your changes.

Applications and Gaming > DMZ

The DMZ eature allows one network computer to beexposed to the Internet or use o a special-purposeservice such as Internet gaming or videoconerencing.DMZ hosting orwards all the ports at the same time toone PC. The Port Range Forward eature is more securebecause it only opens the ports you want to have opened,while DMZ hosting opens all the ports o one computer,exposing the computer to the Internet.

Applications and Gaming > DMZ

DMZ

Any PC whose port is being orwarded must have its DHCP

client unction disabled and should have a new static IPaddress assigned to it because its IP address may changewhen using the DHCP unction.

To expose one PC, select Enable. Then, enter thecomputer’s IP address in the DMZ Host IP Address ield. Thiseature is disabled by deault.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Applications and Gaming > QoS

Quality o Service (QoS) ensures better service tohigh-priority types o network traic, which mayinvolve demanding, real-time applications, such asvideoconerencing.

There are three types o QoS available: Device Priority,Ethernet Port Priority, and Application Priority.

Wired QoS

Enable/Disable To enable QoS, select Enable. Otherwise,select Disable. QoS is disabled by deault.

Upstream Bandwidth Select Auto or Manual romthe drop-down menu. Manual allows you to speciy themaximum outgoing bandwidth that applications canutilize.

Applications and Gaming > QoS

Device Priority

Enter the name o your network device in the Device name

ield, enter its MAC Address, and then select its priorityrom the drop-down menu.

Ethernet Port Priority

Ethernet Port Priority QoS allows you to prioritizeperormance or the Router’s our ports, LAN Ports 1-4. Foreach port, select the priority and low control setting.

Page 21: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 21/41

Chapter 3 Advanced Configuration

19Wireless-G Broadband Router

Priority Select High or Low in the Priority column. TheRouter’s our ports have been assigned low priority bydeault.

Flow Control I you want the Router to control thetransmission o data between network devices, selectEnabled. To disable this eature, select Disabled. Ethernet

Port Priority QoS does not require support rom your ISPbecause the prioritized ports LAN ports 1-4 are in yournetwork. This eature is enabled by deault.

Application Priority

Application Priority QoS manages inormation as it istransmitted and received. Depending on the settings o the QoS screen, this eature will assign inormation a highor low priority or the applications that you speciy.

Optimize Gaming Applications Select this toautomatically allow common game application portsto have a higher priority. These games include, but are

not limited to: Counter-Strike , Half-Life,   Age of Empires,Everquest , Quake2 /Quake3, and Diablo II . The deaultsetting is unselected.

Application Name Enter the name you wish to give theapplication in the Application Name ield.

Priority Select High or Low to assign priority to theapplication. The deault selection is Low.

Specific Port # Enter the port number or theapplication.

Wireless QoS

WMM Support Wi-Fi Multimedia (WMM), ormerlyknown as Wireless Multimedia Extensions (WME), isa Wi-Fi Alliance certiied eature, based on the IEEE802.11e standard. This eature provides QoS to wirelessnetworks. It is especially suitable or voice, music andvideo applications; or example, Voice over IP ( VoIP), videostreaming, and interactive gaming. I you have otherdevices on your wireless network that support WMM,select Enabled. Otherwise, keep the deault, Disabled.

No Acknowledgement This eature prevents the Routerrom re-sending data i an error occurs. To use this eature,select Enabled. Otherwise, keep the deault setting,

Disabled.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Administration > Management

The   Administration > Management screen allows thenetwork’s administrator to manage speciic Routerunctions or access and security.

Administration > Management

Router Password

Local Router Access

Router Password Enter a new Password or the Router.

Re-enter to confirm Enter the Password again to confirm.

Web Access

Access Server HTTP (HyperText Transport Protocol) isthe communications protocol used to connect to serverson the World Wide Web. HTTPS uses SSL (Secured SocketLayer) to encrypt data transmitted or higher security.Select HTTP or HTTPS. The deault selection is HTTP.

Wireless Access Web I you are using the Router ina public domain where you are giving wireless accessto your guests, you can disable wireless access to theRouter’s web-based utility. You will only be able to accessthe web-based utility via a wired connection i you disablethe setting. Keep the deault, Enable, to enable wirelessaccess to the Router’s web-based utility, or select Disable to disable wireless access to the utility.

Remote Router Access

Remote Management To access the Router remotely,rom outside the network, select Enable.

Management Port Enter the port number that will beopen to outside access. You will need to enter the Router’spassword when accessing the Router this way, as usual.

Use https To require the use o HTTPS or remote access,select this eature.

UPnP

UPnP Keep the deault, Enable to enable the UPnPeature; otherwise, select Disable.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Page 22: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 22/41

Chapter 3 Advanced Configuration

20Wireless-G Broadband Router

Administration > Log

The Router can keep logs o all traic or your Internetconnection.

Administration > Log

Log

Log To disable the Log unction, keep the deault setting,

Disable. To monitor traic between the network and theInternet, select Enable.

When you wish to view the logs, click  Incoming Log orOutgoing Log, depending on which you wish to view.

Click Save Settings to apply your changes, or click CancelChanges to cancel your changes.

Administration > Diagnostics

The diagnostic tests (Ping and Traceroute) allow you tocheck the connections o your network components.

Administration > Diagnostics

Ping Test

Ping The Ping test checks the status o a connection.Click Ping to open the Ping Test screen. Enter the addresso the PC whose connection you wish to test and howmany times you wish to test it. Then, click  Ping. The Ping

Test screen will show i the test was successul. To stop thetest, click Stop. Click Clear Log to clear the screen. Click Close to return to the Diagnostics screen.

The Ping Test

Traceroute Test

Traceroute To test the perormance o a connection,click Traceroute to open the Traceroute Test screen. Enterthe address o the PC whose connection you wish to testand click Traceroute. The Traceroute Test screen will show

i the test was successul. To stop the test, click Stop. Click Clear Log to clear the screen. Click Close to return to theDiagnostics screen.

The Traceroute Test

Administration > Factory Deaults

The  Administration > Factory Defaults screen allows youto restore the Router’s coniguration to its actory deaultsettings.

Factory Deaults

Restore Factory Defaults To reset the Router’s settingsto the deault values, select Yes, and then click  SaveSettings. Any settings you have saved will be lost whenthe deault settings are restored.

Administration > Factory Deaults

Page 23: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 23/41

Chapter 3 Advanced Configuration

21Wireless-G Broadband Router

Administration > Firmware Upgrade

 The  Administration > Firmware Upgrade screen allows you

to upgrade the Router’s firmware. Do not upgrade the

firmware unless you are experiencing problems with the

Router or the new firmware has a feature you want to use.

Administration > Firmware Upgrade

Beore upgrading the irmware, download the Router’sirmware upgrade ile rom the Linksys website, www.linksys.com. Then extract the ile.

Upgrade Firmware

Please select a file to upgrade Click Browse and selectthe extracted irmware upgrade ile. Then click Upgrade 

and follow the on-screen instructions.

Administration > Conig Management

This screen is used to back up or restore the Router’s

coniguration ile.

Administration > Conig Management

Backup Coniguration

To back up the Router’s coniguration ile, click  Backup.Then ollow the on-screen instructions.

Restore Coniguration

Please select a file to restore Click  Browse and selectthe coniguration ile. Then click Restore.

Status > Router

The Status > Router  screen displays the Router’s currentstatus.

Administration > Factory Deaults

Router Inormation

Firmware Version This is the Router’s current irmware.

Current Time This shows the time, as you set on theSetup tab.

MAC Address This is the Router’s MAC Address, as seenby your ISP.

Router Name This is the speciic name or the Router,which you set on the Setup tab.

Host Name I required by your ISP, this would have beenentered on the Setup tab.

Domain Name I required by your ISP, this would havebeen entered on the Setup tab.

Internet

Configuration Type

This section shows the current network inormationstored in the Router. The inormation varies depending onthe Internet connection type selected on the Setup > Basic 

Setup screen.

Click Refresh to update the on-screen inormation.

Page 24: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 24/41

Chapter 3 Advanced Configuration

22Wireless-G Broadband Router

Status > Local Network

The Status > Local Network  screen displays the status o your network.

Status > Local Network 

Local NetworkMAC Address This is the Router’s MAC Address, as seenon your local, Ethernet network.

IP Address This shows the Router’s IP Address, as itappears on your local, Ethernet network.

Subnet Mask  This shows the current subnet mask beingconigured or your local network.

DHCP Server I you are using the Router as a DHCP server,that will be displayed here.

Start IP Address For the range o IP Addresses used by

devices on your local, Ethernet network, the beginning o that range is shown here.

End IP Address For the range o IP Addresses used bydevices on your local, Ethernet network, the end o thatrange is shown here.

DHCP Clients Table Clicking this button will open ascreen to show you which PCs are utilizing the Router as aDHCP server. You can delete PCs rom that list, and severtheir connections, by checking a Delete box and clickingthe Delete button.

DHCP Clients Table

Click Refresh to update the on-screen inormation.

Status > Wireless

The Status > Wireless screen displays the status o yourwireless network.

Status > Wireless

Wireless

MAC Address This is the Router’s MAC Address, as seenon your local, wireless network.

Mode As selected rom the Wireless > Basic Wireless

Settings screen, this displays the wireless mode (Mixed, G-Only, or Disabled) used by the network.

SSID As entered on the Wireless > Basic Wireless Settings screen, this displays the wireless network name or SSID.

DHCP Server The status o the DHCP server unction isdisplayed here.

Channel As entered on the Wireless > Basic Wireless

Settings screen, this displays the channel on which your

wireless network is broadcasting.

Encryption Function As selected on the Wireless >

Wireless Security  screen, this displays the status o theRouter’s wireless security.

Click Refresh to update the on-screen inormation.

Page 25: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 25/41

Appendix A Troubleshooting

23Wireless-G Broadband Router

Appendix A:Troubleshooting

Your computer cannot connect to the Internet.

Follow these instructions until your computer can connectto the Internet:

Make sure that the Router is powered on. The Power•

LED should be green and not lashing.

I the Power LED is lashing, then power o all o •

your network devices, including the modem, Router,and computers. Then power on each device in theollowing order:

Cable or DSL modem1.

Router2.

Computer3.Check the cable connections. The computer should•

be connected to one o the ports numbered 1-4 onthe Router, and the modem must be connected to theInternet port on the Router.

The modem does not have an Ethernet port.

The modem is a dial-up modem or traditional dial-upservice. To use the Router, you need a cable/DSL modemand high-speed Internet connection.

You cannot use the DSL service to connect manually to

the Internet.

Ater you have installed the Router, it will automaticallyconnect to your Internet Service Provider (ISP), so you nolonger need to connect manually.

The DSL telephone line does not ft into the Router’s

Internet port.

The Router does not replace your modem. You still needyour DSL modem in order to use the Router. Connectthe telephone line to the DSL modem, insert the setupCD into your computer, and then ollow the on-screeninstructions.

When you double-click the web browser, you are

 prompted or a username and password. I you want to

get rid o the prompt, ollow these instructions.

Launch the web browser and perorm the ollowing steps(these steps are speciic to Internet Explorer but are similaror other browsers):

Select1. Tools > Internet Options.

Click the2. Connections tab.

Select3. Never dial a connection.

Click 4. OK.

The Router does not have a coaxial port or the cable

connection.

The Router does not replace your modem. You still needyour cable modem in order to use the Router. Connect yourcable connection to the cable modem, insert the setup

CD into your computer, and then ollow the on-screeninstructions.

The computer cannot connect wirelessly to the network.

Make sure the wireless network name or SSID is the sameon both the computer and the Router. I you have enabledwireless security, then make WRT54GL User Guide surethe same security method and key are used by both thecomputer and the Router.

You need to modiy the settings on the Router.

Open the web browser (or example, Internet Explorer or

Fireox), and enter the Router’s IP address in the addressield (the deault IP address is 192.168.1.1). Whenprompted, leave the User name ield blank and enter thepassword to the Router (the deault is admin). Click theappropriate tab to change the settings.

WEB: I your questions are not addressed here,reer to the Linksys website, www.linksys.com.

Page 26: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 26/41

Appendix B Specifications

24Wireless-G Broadband Router

Appendix B:

Specifications

Model WRT54GL

Standards IEEE 802.3, IEEE 802.3u,IEEE 802.11g, IEEE 802.11b

Channels 11 Channels (US, Canada)

13 Channels (Europe, Japan)

Ports Internet: One 10/100 RJ-45 Port

LAN: Four 10/100 RJ-45 Switched

Ports

One Power Port

Button Reset, SecureEasySetup

Cabling Type CAT5

LEDs Power, DMZ, WLAN, LAN (1-4),

Internet, SecureEasySetup

RF Power Output 18 dBm

UPnP able/cert Able

Security Features Stateul Packet Inspection (SPI)

Firewall, Internet Policy

Wireless Security Wi-Fi Protected Access™2 (WPA2),

WEP, Wireless MAC Filtering

Environmental

Dimensions 7.32" x 1.89" x 6.06"

(186 x 48 x 154 mm)

Weight 13.8 oz (391 g)

Power External, 12V DC, 0.5A

Certifcations FCC, ICES-003, CE, Wi-Fi (802.11b,

802.11g), WPA2, WMM

Operating Temp. 32 to 104ºF (0 to 40ºC)

Storage Temp. -4 to 158ºF (-20 to 70ºC)

Operating Humidity 10 to 85%, Noncondensing

Storage Humidity 5 to 90%, Noncondensing

Page 27: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 27/41

Appendix C Warranty Information

25Wireless-G Broadband Router

Appendix C:Warranty Information

Limited Warran WRT54GL User Guide ty

Linksys warrants this Linksys hardware product againstdeects in materials and workmanship under normaluse or the Warranty Period, which begins on the date o purchase by the original end-user purchaser and lasts orthe period speciied below:

One (1) year or new product•

Ninety (90) days or reurbished product•

This limited warranty is non-transerable and extends onlyto the original end-user purchaser. Your exclusive remedyand Linksys’ entire liability under this limited warrantywill be or Linksys, at its option, to (a) repair the product

with new or reurbished parts, (b) replace the productwith a reasonably available equivalent new or reurbishedLinksys product, or (c) reund the purchase price o theproduct less any rebates. Any repaired or replacementproducts will be warranted or the remainder o theoriginal Warranty Period or thirty (30) days, whichever islonger. All products and parts that are replaced becomethe property o Linksys.

Exclusions and Limitations

This limited warranty does not apply i: (a) the productassembly seal has been removed or damaged, (b) the

product has been altered or modiied, except by Linksys, (c)the product damage was caused by use with non-Linksysproducts, (d) the product has not been installed, operated,repaired, or maintained in accordance with instructionssupplied by Linksys, (e) the product has been subjected toabnormal physical or electrical stress, misuse, negligence,or accident, () the serial number on the Product has beenaltered, deaced, or removed, or (g) the product is suppliedor licensed or beta, evaluation, testing or demonstrationpurposes or which Linksys does not charge a purchaseprice or license ee.

ALL SOFTWARE PROVIDED BY LINKSYS WITH THE

PRODUCT, WHETHER FACTORY LOADED ON THEPRODUCT OR CONTAINED ON MEDIA ACCOMPANYINGTHE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTYOF ANY KIND. Without limiting the oregoing, Linksys doesnot warrant that the operation o the product or sotwarewill be uninterrupted or error ree. Also, due to thecontinual development o new techniques or intrudingupon and attacking networks, Linksys does not warrantthat the product, sotware or any equipment, system ornetwork on which the product or sotware is used will beree o vulnerability to intrusion or attack. The productmay include or be bundled with third party sotware or

service oerings. This limited warranty shall not apply tosuch third party sotware or service oerings. This limitedwarranty does not guarantee any continued availabilityo a third party’s service or which this product’s use oroperation may require.

TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED

WARRANTIES AND CONDITIONS OF MERCHANTABILITY,SATISFACTORY QUALITY OR FITNESS FOR A PARTICULARPURPOSE ARE LIMITED TO THE DURATION OF THEWARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES,INCLUDING, BUT NOT LIMITED TO, ANY IMPLIEDWARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.Some jurisdictions do not allow limitations on how longan implied warranty lasts, so the above limitation may notapply to you. This limited warranty gives you speciic legalrights, and you may also have other rights which vary by

 jurisdiction.

TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENTWILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THETHEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISINGOUT OF OR RELATED TO THE USE OF OR INABILITY TOUSE THE PRODUCT (INCLUDING ANY SOFTWARE), EVENIF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITYEXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.The oregoing limitations will apply even i any warrantyor remedy provided under this limited warranty ails o its essential purpose. Some jurisdictions do not allow

the exclusion or limitation o incidental or consequentialdamages, so the above limitation or exclusion may notapply to you.

Obtaining Warranty Service

I you have a question about your product or experience aproblem with it, please go to www.linksys.com/support where you will ind a variety o online support tools andinormation to assist you with your product. I the productproves deective during the Warranty Period, contactLinksys Technical Support or instructions on how toobtain warranty service. The telephone number or Linksys

Technical Support in your area can be ound in the productUser Guide and at www.linksys.com. Have your productserial number and proo o purchase on hand when calling.A DATED PROOF OF ORIGINAL PURCHASE IS REQUIREDTO PROCESS WARRANTY CLAIMS. I you are requested toreturn your product, you will be given a Return MaterialsAuthorization (RMA) number. You are responsible orproperly packaging and shipping your product to Linksysat your cost and risk. You must include the RMA numberand a copy o your dated proo o original purchase whenreturning your product. Products received without a RMAnumber and dated proo o original purchase will be

Page 28: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 28/41

Appendix C Warranty Information

26Wireless-G Broadband Router

rejected. Do not include any other items with the productyou are returning to Linksys. Deective product coveredby this limited warranty will be repaired or replaced andreturned to you without charge. Customers outside o the United States o America and Canada are responsibleor all shipping and handling charges, custom duties,

VAT and other associated taxes and charges. Repairs orreplacements not covered under this limited warranty willbe subject to charge at Linksys’ then-current rates.

Technical Support

This limited warranty is neither a service nor a supportcontract. Inormation about Linksys’ current technicalsupport oerings and policies (including any ees orsupport services) can be ound at:www.linksys.com/support.

This limited warranty is governed by the laws o the jurisdiction in which the Product was purchased by you.

Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,CA 92623.

Page 29: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 29/41

Appendix D Regulatory Information

27Wireless-G Broadband Router

Appendix D:Regulatory Information

FCC Statement

This device complies with Part 15 o the FCC Rules.Operation is subject to the ollowing two conditions: (1)This device may not cause harmul intererence, and (2) thisdevice must accept any intererence received, includingintererence that may cause undesired operation.

This product has been tested and complies with thespeciications or a Class B digital device, pursuant to Part15 o the FCC Rules. These limits are designed to providereasonable protection against harmul intererence ina residential installation. This equipment generates,uses, and can radiate radio requency energy and, i notinstalled and used according to the instructions, maycause harmul intererence to radio communications.However, there is no guarantee that intererence will notoccur in a particular installation. I this equipment doescause harmul intererence to radio or television reception,which is ound by turning the equipment o and on, theuser is encouraged to try to correct the intererence byone or more o the ollowing measures:

Reorient or relocate the receiving antenna•

Increase the separation between the equipment or•

devices

Connect the equipment to an outlet other than the•

receiver’s

Consult a dealer or an experienced radio/TV technician•

or assistance

FCC Caution: Any changes or modiications not expresslyapproved by the party responsible or compliance couldvoid the user’s authority to operate this equipment.

FCC Radiation Exposure Statement

This equipment complies with FCC radiation exposurelimits set orth or an uncontrolled environment. Thisequipment should be installed and operated with

minimum distance 20cm between the radiator and yourbody.

This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter. IEEE802.11b or 802.11g operation o this product in the USA isirmware-limited to channels 1 through 11.

Saety Notices

Caution: To reduce the risk o ire, use only No.26 AWG•

or larger telecommunication line cord.

Do not use this product near water, or example, in a•

wet basement or near a swimming pool.

Avoid using this product during an electrical storm.•

There may be a remote risk o electric shock romlightning.

 WARNING: This product contains lead, knownto the State o Caliornia to cause cancer, andbirth deects or other reproductive harm. Washhands ater handling.

Industry Canada Statement

This Class B digital apparatus complies with Canadian

ICES-003 and RSS210.

Operation is subject to the ollowing two conditions:

This device may not cause intererence and1.

This device must accept any intererence, including2.intererence that may cause undesired operation o thedevice. This device has been designed to operate withan antenna having a maximum gain o 2dBi. Antennahaving a higher gain is strictly prohibited per regulationso Industry Canada. The required antenna impedanceis 50 ohms.

To reduce potential radio intererence to other users,the antenna type and its gain should be so chosenthat the EIRP is not more than required or successulcommunication.

Industry Canada Radiation Exposure Statement:

This equipment complies with IC radiation exposure limitsset orth or an uncontrolled environment. This equipmentshould be installed and operated with minimum distance20cm between the radiator & your body.

This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter.

Page 30: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 30/41

Page 31: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 31/41

Appendix D Regulatory Information

29Wireless-G Broadband Router

User Inormation or Consumer Products

Covered by EU Directive 2002/96/EC on

Waste Electric and Electronic Equipment

(WEEE)

This document contains important inormation or userswith regards to the proper disposal and recycling o Linksys products. Consumers are required to comply withthis notice or all electronic products bearing the ollowingsymbol:

English - Environmental Information for Customers inthe European Union

European Directive 2002/96/EC requires that the equipmentbearing this symbol on the product and/or its packaging mustnot be disposed o with unsorted municipal waste. The symbolindicates that this product should be disposed o separatelyrom regular household waste streams. It is your responsibility todispose o this and other electric and electronic equipment viadesignated collection acilities appointed by the government orlocal authorities. Correct disposal and recycling will help preventpotential negative consequences to the environment andhuman health. For more detailed inormation about the disposal

o your old equipment, please contact your local authorities,waste disposal service, or the shop where you purchased theproduct.

Български (Bulgarian) - Информация относноопазването на околната среда за потребители вЕвропейския съюз

Европейска директива 2002/96/EC изисква уредите, носещитози символ върху изделието и/или опаковката му, да несе изхвърля т с несортирани битови отпадъци. Символътобозначава, че изделието трябва да се изхвърля отделно отсметосъбирането на обикновените битови отпадъци. Вашае отговорността този и другите електрически и електронни

уреди да се изхвърлят в предварително определени отдържавните или общински органи специализирани пунктовеза събиране. Правилното изхвърляне и рециклиранеще спомогнат да се предотвратят евентуални вредни заоколната среда и здравето на населението последствия. Запо-подробна информация относно изхвърлянето на вашитестари уреди се обърнете към местните власти, службите засметосъбиране или магазина, от който сте закупили уреда.

Ceština (Czech) - Informace o ochraně životníhoprostředí pro zákazníky v zemích Evropské unie

Evropská směrnice 2002/96/ES zakazuje, aby zařízení označenétímto symbolem na produktu anebo na obalu bylo likvidovános netříděným komunálním odpadem. Tento symbol udává,že daný produkt musí být likvidován odděleně od běžnéhokomunálního odpadu. Odpovídáte za likvidaci tohoto produktu

a dalších elektrických a elektronických zařízení prostřednictvímurčených sběrných míst stanovených vládou nebo místnímiúřady. Správná likvidace a recyklace pomáhá předcházetpotenciálním negativním dopadům na životní prostředí a lidskézdraví. Podrobnější inormace o likvidaci starého vybavení silaskavě vyžádejte od místních úřadů, podniku zabývajícího selikvidací komunálních odpadů nebo obchodu, kde jste produktzakoupili.

Dansk (Danish) - Miljøinformation for kunder i EU

EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbolpå produktet og/eller emballagen ikke må bortskaes som

usorteret kommunalt aald. Symbolet betyder, at dette produkt

skal bortskaes adskilt ra det almindelige husholdningsaald.Det er dit ansvar at bortskae dette og andet elektrisk ogelektronisk udstyr via bestemte indsamlingssteder udpegeta staten eller de lokale myndigheder. Korrekt bortskaelseog genvinding vil hjælpe med til at undgå mulige skader ormiljøet og menneskers sundhed. Kontakt venligst de lokalemyndigheder, renovationstjenesten eller den butik, hvor duhar købt produktet, angående mere detaljeret inormation ombortskaelse a dit gamle udstyr.

Deutsch (German) - Umweltinformation für Kundeninnerhalb der Europäischen Union

Die Europäische Richtlinie 2002/96/EC verlangt, dass technische

Ausrüstung, die direkt am Gerät und/oder an der Verpackung mitdiesem Symbol versehen ist , nicht zusammen mit unsortiertemGemeindeaball entsorgt werden dar. Das Symbol weist darau hin, dass das Produkt von regulärem Haushaltmüll getrenntentsorgt werden sollte. Es liegt in Ihrer Verantwortung, diesesGerät und andere elektrische und elektronische Geräte überdie daür zuständigen und von der Regierung oder örtlichenBehörden dazu bestimmten Sammelstellen zu entsorgen.Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,potentielle negative Folgen ür Umwelt und die menschlicheGesundheit zu vermeiden. Wenn Sie weitere Inormationen zurEntsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte andie örtlichen Behörden oder städtischen Entsorgungsdiensteoder an den Händler, bei dem Sie das Produkt erworben haben.

Page 32: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 32/41

Appendix D Regulatory Information

30Wireless-G Broadband Router

Eesti (Estonian) - Keskkonnaalane informatsioonEuroopa Liidus asuvatele klientidele

Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt onseadmeid, millel on tootel või pakendil käesolev sümbol ,keelatud kõrvaldada koos sorteerimata olmejäätmetega. Seesümbol näitab, et toode tuleks kõrvaldada eraldi tavalistestolmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva

  ja ka muud elektri- ja elektroonikaseadmed riigi või kohalikeametiasutuste poolt ette nähtud kogumispunktide kaudu.Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältidavõimalikke negatiivseid tagajärgi keskkonnale ning inimestetervisele. Vanade seadmete kõrvaldamise kohta täpsemainormatsiooni saamiseks võtke palun ühendust kohalikeametiasutustega, jäätmekäitlusirmaga või kauplusega, kust tetoote ostsite.

Español (Spanish) - Información medioambiental paraclientes de la Unión Europea

La Directiva 2002/96/CE de la UE exige que los equipos quelleven este símbolo en el propio aparato y/o en su embalaje

no deben eliminarse junto con otros residuos urbanos noseleccionados. El símbolo indica que el producto en cuestióndebe separarse de los residuos domésticos convencionales convistas a su eliminación. Es responsabilidad suya desechar este ycualesquiera otros aparatos eléctricos y electrónicos a través delos puntos de recogida que ponen a su disposición el gobierno ylas autoridades locales. Al desechar y reciclar correctamente estosaparatos estará contribuyendo a evitar posibles consecuenciasnegativas para el medio ambiente y la salud de las personas. Sidesea obtener inormación más detallada sobre la eliminaciónsegura de su aparato usado, consulte a las autoridades locales,al servicio de recogida y eliminación de residuos de su zona opregunte en la tienda donde adquirió el producto.

ξλληνικά (Greek) - Στοιχεία περιβαλλοντικήςπροστασίας για πελάτες εντός της ΕυρωπαϊκήςΈνωσης

Η Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίοςφέρει αυτό το σύμβολο στο προϊόν και/ή στη συσκευασία  του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικάαπορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θαπρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακάαπορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντοςκαι άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω τωνκαθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οιοποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές.Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη

πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία.Για περισσότερες πληροφορίες σχετικά με την απόρριψη τουπαλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικέςαρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίοαγοράσατε το προϊόν.

Français (French) - Informations environnementalespour les clients de l’Union européenne

La directive européenne 2002/96/CE exige que l’équipementsur lequel est apposé ce symbole sur le produit et/ou sonemballage ne soit pas jeté avec les autres ordures ménagères. Cesymbole indique que le produit doit être éliminé dans un circuitdistinct de celui pour les déchets des ménages. Il est de votre

responsabilité de jeter ce matériel ainsi que tout autre matérielélectrique ou électronique par les moyens de collecte indiquéspar le gouvernement et les pouvoirs publics des collectivitésterritoriales. L’élimination et le recyclage en bonne et due ormeont pour but de lutter contre l’impact néaste potentiel de cetype de produits sur l’environnement et la santé publique. Pourplus d’inormations sur le mode d’élimination de votre ancienéquipement, veuillez prendre contact avec les pouvoirs publicslocaux, le service de traitement des déchets, ou l’endroit où vousavez acheté le produit.

Italiano (Italian) - Informazioni relative all’ambienteper i clienti residenti nell’Unione Europea

La direttiva europea 2002/96/EC richiede che le apparecchiaturecontrassegnate con questo simbolo sul prodotto e/osull’imballaggio non siano smaltite insieme ai riiuti urbaninon dierenziati. Il simbolo indica che questo prodotto nondeve essere smaltito insieme ai normali riiuti domestici. Èresponsabilità del proprietario smaltire sia questi prodotti siale altre apparecchiature elettriche ed elettroniche mediantele speciiche strutture di raccolta indicate dal governo o daglienti pubblici locali. Il corretto smaltimento ed il riciclaggioaiuteranno a prevenire conseguenze potenzialmente negativeper l’ambiente e per la salute dell’essere umano. Per ricevereinormazioni più dettagliate circa lo smaltimento delle vecchieapparecchiature in Vostro possesso, Vi invitiamo a contattare glienti pubblici di competenza, il servizio di smaltimento riiuti o il

negozio nel quale avete acquistato il prodotto.

Latviešu valoda (Latvian) - Ekoloģiska informācijaklientiem Eiropas Savienības jurisdikcijā

Direktīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienotazīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkstizmest nešķirotā veidā kopā ar komunālajiem atkritumiem(tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmēto, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā arparastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šoun citas elektriskas un elektroniskas ierīces izmest atkritumos,izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, konodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos

un pārstrāde tiek veikta pareizi, tad mazinās iespējamaiskaitējums dabai un cilvēku veselībai. Sīkākas ziņas parnovecojuša aprīkojuma izmešanu atkritumos jūs varat saņemtvietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,kur iegādājāties šo izstrādājumu.

Page 33: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 33/41

Appendix D Regulatory Information

31Wireless-G Broadband Router

Lietuvškai (Lithuanian) - Aplinkosaugos informacija,skirta Europos Sąjungos vartotojams

Europos direktyva 2002/96/EC numato, kad įrangos, kuri irkurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį),negalima šalinti kartu su nerūšiuotomis komunalinėmisatliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirainuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad

ši ir kita elektros ar elektroninė įranga būtų šalinama per tamtikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimosistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengtagalimos žalos aplinkai ir žmonių sveikatai. Daugiau inormacijosapie jūsų senos įrangos šalinimą gali pateikti vietinės valdžiosinstitucijos, atliekų šalinimo tarnybos arba parduotuvės, kurioseįsigijote tą gaminį.

Malti (Maltese) - Informazzjoni Ambjentali għal Klijentifl-Unjoni Ewropea

Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun ih is-simbolu uq il-prodott u/jew uq l-ippakkjar ma jistax jintremama’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika

li dan il-prodott għandu jintrema separatament minn ma’ l-iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmidan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettronikupermezz ta’ aċilitajiet ta’ ġbir appuntati apposta mill-gvern jewmill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin  jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent ugħas-saħħa tal-bniedem. Għal aktar inormazzjoni dettaljatadwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattjalill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jewil-ħanut minn ejn xtrajt il-prodott.

Magyar (Hungarian) - Környezetvédelmi információ azeurópai uniós vásárlók számára

A 2002/96/EC számú európai uniós irányelv megkívánja, hogyazokat a termékeket, amelyeken, és/vagy amelyek csomagolásánaz alábbi címke megjelenik, tilos a többi szelektálatlan lakosságihulladékkal együtt kidobni. A címke azt jelöli, hogy az adotttermék kidobásakor a szokványos háztartási hulladékelszállításirendszerektõl elkülönített eljárást kell alkalmazni. Az Önelelõssége, hogy ezt, és más elektromos és elektronikusberendezéseit a kormányzati vagy a helyi hatóságok általkijelölt gyűjtõredszereken keresztül számolja el. A megelelõhulladékeldolgozás segít a környezetre és az emberi egészségrepotenciálisan ártalmas negatív hatások megelõzésében. Haelavult berendezéseinek elszámolásához további részletesinormációra van szüksége, kérjük, lépjen kapcsolatba a helyihatóságokkal, a hulladékeldolgozási szolgálattal, vagy azzal

üzlettel, ahol a terméket vásárolta.

Nederlands (Dutch) - Milieu-informatie voor klantenin de Europese Unie

De Europese Richtlijn 2002/96/EC schrijt voor dat apparatuur dieis voorzien van dit symbool op het product o de verpakking,niet mag worden ingezameld met niet-gescheiden huishoudelijk aval. Dit symbool geet aan dat het product apart moet wordeningezameld. U bent zel verantwoordelijk voor de vernietiging

van deze en andere elektrische en elektronische apparatuur via dedaarvoor door de landelijke o plaatselijke overheid aangewezeninzamelingskanalen. De juiste vernietiging en recycling vandeze apparatuur voorkomt mogelijke negatieve gevolgen voorhet milieu en de gezondheid. Voor meer inormatie over hetvernietigen van uw oude apparatuur neemt u contact op metde plaatselijke autoriteiten o avalverwerkingsdienst, o met dewinkel waar u het product hebt aangeschat.

Norsk (Norwegian) - Miljøinformasjon for kunder i EU

EU-direktiv 2002/96/EF krever at utstyr med ølgende symbolavbildet på produktet og/eller pakningen, ikke må kastes

sammen med usortert avall. Symbolet indikerer at dette

produktet skal håndteres atskilt ra ordinær avallsinnsamlingor husholdningsavall. Det er ditt ansvar å kvitte deg meddette produktet og annet elektrisk og elektronisk avall via egneinnsamlingsordninger slik myndighetene eller kommunenebestemmer. Korrekt avallshåndtering og gjenvinning vilvære med på å orhindre mulige negative konsekvenser ormiljø og helse. For nærmere inormasjon om håndtering avdet kasserte utstyret ditt, kan du ta kontakt med kommunen,en innsamlingsstasjon or avall eller butikken der du kjøpteproduktet.

Polski (Polish) - Informacja dla klientów w UniiEuropejskiej o przepisach dotyczących ochrony

środowiskaDyrektywa Europejska 2002/96/EC wymaga, aby sprzętoznaczony symbolem znajdującym się na produkcie i/lub jegoopakowaniu nie był wyrzucany razem z innymi niesortowanymiodpadami komunalnymi. Symbol ten wskazuje, że produktnie powinien być usuwany razem ze zwykłymi odpadami zgospodarstw domowych. Na Państwu spoczywa obowiązek wyrzucania tego i innych urządzeń elektrycznych orazelektronicznych w punktach odbioru wyznaczonych przez władzekrajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposóbi jego recykling pomogą zapobiec potencjalnie negatywnymkonsekwencjom dla środowiska i zdrowia ludzkiego. W celuuzyskania szczegółowych inormacji o usuwaniu starego sprzętu,prosimy zwrócić się do lokalnych władz, służb oczyszczania

miasta lub sklepu, w którym produkt został nabyty.

Page 34: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 34/41

Appendix D Regulatory Information

32Wireless-G Broadband Router

Português (Portuguese) - Informação ambiental paraclientes da União Europeia

A Directiva Europeia 2002/96/CE exige que o equipamentoque exibe este símbolo no produto e/ou na sua embalagemnão seja eliminado junto com os resíduos municipais nãoseparados. O símbolo indica que este produto deve sereliminado separadamente dos resíduos domésticos regulares.

É da sua responsabilidade eliminar este e qualquer outroequipamento eléctrico e electrónico através das instalaçõesde recolha designadas pelas autoridades governamentais oulocais. A eliminação e reciclagem correctas ajudarão a preveniras consequências negativas para o ambiente e para a saúdehumana. Para obter inormações mais detalhadas sobre aorma de eliminar o seu equipamento antigo, contacte asautoridades locais, os serviços de eliminação de resíduos ou oestabelecimento comercial onde adquiriu o produto.

Română (Romanian) - Informaţii de mediu pentruclienţii din Uniunea Europeană

Directiva europeană 2002/96/CE impune ca echipamentele care

prezintă acest simbol pe produs şi/sau pe ambalajul acestuia sănu ie casate împreună cu gunoiul menajer municipal. Simbolulindică aptul că acest produs trebuie să ie casat separat degunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţiacest produs şi alte echipamente electrice şi electronice prinintermediul unităţilor de colectare special desemnate de guvernsau de autorităţile locale. Casarea şi reciclarea corecte vor ajutala prevenirea potenţialelor consecinţe negative asupra sănătăţiimediului şi a oamenilor. Pentru mai multe inormaţii detaliatecu privire la casarea acestui echipament vechi, contactaţiautorităţile locale, serviciul de salubrizare sau magazinul de lacare aţi achiziţionat produsul.

Slovenčina (Slovak) - Informácie o ochrane životnéhoprostredia pre zákazníkov v Európskej únii

Podľa európskej smernice 2002/96/ES zariadenie s týmtosymbolom na produkte a/alebo jeho balení nesmie byť likvidované spolu s netriedeným komunálnym odpadom.Symbol znamená, že produkt by sa mal likvidovať oddeleneod bežného odpadu z domácností. Je vašou povinnosťoulikvidovať toto i ostatné elektrické a elektronické zariadeniaprostredníctvom špecializovaných zberných zariadení určenýchvládou alebo miestnymi orgánmi. Správna likvidácia a recykláciapomôže zabrániť prípadným negatívnym dopadom na životnéprostredie a zdravie ľudí. Ak máte záujem o podrobnejšieinormácie o likvidácii starého zariadenia, obráťte sa, prosím, namiestne orgány, organizácie zaoberajúce sa likvidáciou odpadov

alebo obchod, v ktorom ste si produkt zakúpili.

Slovenčina (Slovene) - Okoljske informacije za strankev Evropski uniji

Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,označene s tem simbolom – na izdelku in/ali na embalaži – medobičajne, nerazvrščene odpadke. Ta simbol opozarja, da je trebaizdelek odvreči ločeno od preostalih gospodinjskih odpadkov.Vaša odgovornost je, da to in preostalo električno in elektronsko

opremo odnesete na posebna zbirališča, ki jih določijodržavne ustanove ali lokalna uprava. S pravilnim odlaganjemin recikliranjem boste preprečili morebitne škodljive vplive naokolje in zdravje ljudi. Če želite izvedeti več o odlaganju stareopreme, se obrnite na lokalno upravo, odpad ali trgovino, kjerste izdelek kupili.

Suomi (Finnish) - Ympäristöä koskevia tietoja EU-alueen asiakkaille

EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämäsymboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoaei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään

tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittäätämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteetviemällä tuote tai tuotteet viranomaisten määräämäänkeräyspisteeseen. Laitteiston oikea hävittäminen estäämahdolliset kielteiset vaikutukset ympäristöön ja ihmistenterveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavastasaa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitämyymälästä, josta ostit tuotteen.

Svenska (Swedish) - Miljöinformation för kunder iEuropeiska unionen

Det europeiska direktivet 2002/96/EC kräver att utrustning meddenna symbol på produkten och/eller örpackningen inte år

kastas med osorterat kommunalt avall. Symbolen visar att dennaprodukt bör kastas eter att den avskiljts rån vanligt hushållsavall.Det aller på ditt ansvar att kasta denna och annan elektrisk ochelektronisk utrustning på astställda insamlingsplatser utseddaav regeringen eller lokala myndigheter. Korrekt kassering ochåtervinning skyddar mot eventuella negativa konsekvenserör miljön och personhälsa. För mer detaljerad inormation omkassering av din gamla utrustning kontaktar du dina lokalamyndigheter, avallshanteringen eller butiken där du köpteprodukten.

WEB: For additional inormation, please visitwww.linksys.com

WRT54GL User Guide

Page 35: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 35/41

33

Appendix E Software License Agreement

Wireless-G Broadband Router

Appendix E: SoftwareLicense Agreement

Sotware in Linksys Products

This product rom Cisco-Linksys LLC or rom one o itsailiates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco-Linksys K.K. (“Linksys”) contains sotware (includingirmware) originating rom Linksys and its suppliersand may also contain sotware rom the open sourcecommunity. Any sotware originating rom Linksys and itssuppliers is licensed under the Linksys Sotware LicenseAgreement contained at Schedule 1 below. You may alsobe prompted to review and accept that Linksys SotwareLicense Agreement upon installation o the sotware.

Any sotware rom the open source community is licensedunder the speciic license terms applicable to that sotwaremade available by Linksys at www.linksys.com/gpl or asprovided or in Schedules 2 and 3 below.

Where such speciic license terms entitle you to the sourcecode o such sotware, that source code is upon requestavailable at cost rom Linksys or at least three yearsrom the purchase date o this product and may also beavailable or download rom www.linksys.com/gpl. Fordetailed license terms and additional inormation onopen source sotware in Linksys products please look atthe Linksys public web site at: www.linksys.com/gpl/ orSchedule 2 below as applicable.

BY DOWNLOADING OR INSTALLING THE SOFTWARE,OR USING THE PRODUCT CONTAINING THE SOFTWARE,YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARELICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TOALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD,INSTALL OR USE THE SOFTWARE. YOU MAY RETURNUNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIEDAS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT )FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINALPURCHASE, SUBJECT TO THE RETURN PROCESS ANDPOLICIES OF THE PARTY FROM WHICH YOU PURCHASEDSUCH PRODUCT OR SOFT WARE.

Sotware LicensesThe sotware Licenses applicable to sotware rom Linksysare made available at the Linksys public web site at:www.linksys.com and www.linksys.com/gpl/ respectively. For your convenience o reerence, a copyo the Linksys Sotware License Agreement and the mainopen source code licenses used by Linksys in its productsare contained in the Schedules below.

Schedule 1 - Linksys Sotware License Agreement

THIS LICENSE AGREEMENT IS BETWEEN YOU ANDCISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCOSYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYSK.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OFCISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLINGTHE SOFTWARE, OR USING THE PRODUCT CONTAININGTHE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BYTHIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESETERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USETHE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE(OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHERPRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUNDUP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TOTHE RETURN PROCESS AND POLICIES OF THE PARTY FROMWHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.

License. Subject to the terms and conditions o thisAgreement, Linksys grants the original end user purchaser

o the Linksys product containing the Sotware (“You”)a nonexclusive license to use the Sotware solely asembedded in or (where authorized in the applicabledocumentation) or communication with such product.This license may not be sublicensed, and is not transerableexcept to a person or entity to which you transerownership o the complete Linksys product containingthe Sotware, provided you permanently transer all rightsunder this Agreement and do not retain any ull or partialcopies o the Sotware, and the recipient agrees to theterms o this Agreement.

“Sotware” includes, and this Agreement will apply to (a)

the sotware o Linksys or its suppliers provided in or withthe applicable Linksys product, and (b) any upgrades,updates, bug ixes or modiied versions (“Upgrades”) orbackup copies o the Sotware supplied to You by Linksysor an authorized reseller, provided you already hold avalid license to the original sotware and have paid anyapplicable ee or the Upgrade.

Protection o Inormation. The Sotware anddocumentation contain trade secrets and/or copyrightedmaterials o Linksys or its suppliers. You will not copyor modiy the Sotware or decompile, decrypt, reverseengineer or disassemble the Sotware (except to the

extent expressly permitted by law notwithstanding thisprovision), and You will not disclose or make availablesuch trade secrets or copyrighted material in any ormto any third party. Title to and ownership o the Sotwareand documentation and any portion thereo, will remainsolely with Linksys or its suppliers.

Collection and Processing o Inormation. You agree thatLinksys and/or its ailiates may, rom time to time, collectand process inormation about your Linksys productand/or the Sotware and/or your use o either in order(i) to enable Linksys to oer you Upgrades; (ii) to ensurethat your Linksys product and/or the Sotware is being

Page 36: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 36/41

34

Appendix E Software License Agreement

Wireless-G Broadband Router

used in accordance with the terms o this Agreement;(iii) to provide improvements to the way Linksys deliverstechnology to you and to other Linksys customers; (iv) toenable Linksys to comply with the terms o any agreementsit has with any third parties regarding your Linksysproduct and/or Sotware and/or (v) to enable Linksys to

comply with all applicable laws and/or regulations, or therequirements o any regulatory authority or governmentagency. Linksys and/ or its ailiates may collect andprocess this inormation provided that it does not identiyyou personally. Your use o your Linksys product and/orthe Sotware constitutes this consent by you to Linksysand/or its ailiates’ collection and use o such inormationand, or EEA customers, to the transer o such inormationto a location outside the EEA.

Sotware Upgrades etc . I the Sotware enables you toreceive Upgrades, you may elect at any time to receivethese Upgrades either automatically or manually. I youelect to receive Upgrades manually or you otherwiseelect not to receive or be notiied o any Upgrades, youmay expose your Linksys product and/or the Sotwareto serious security threats and/or some eatures withinyour Linksys product and/or Sotware may becomeinaccessible. There may be circumstances where weapply an Upgrade automatically in order to comply withchanges in legislation, legal or regulatory requirementsor as a result o requirements to comply with the termso any agreements Linksys has with any third partiesregarding your Linksys product and/or the Sotware. Youwill always be notiied o any Upgrades being deliveredto you. The terms o this license will apply to any such

Upgrade unless the Upgrade in question is accompaniedby a separate license, in which event the terms o thatlicense will apply.

Open Source Sotware. The GPL or other open sourcecode incorporated into the Sotware and the open sourcelicense or such source code are available or ree downloadat http://www.linksys.com/gpl. I You would like a copyo the GPL or other open source code in this Sotware on aCD, Linksys will mail to You a CD with such code or $9.99plus the cost o shipping, upon request.

Term and Termination. You may terminate this Licenseat any time by destroying all copies o the Sotware

and documentation. Your rights under this License willterminate immediately without notice rom Linksys i Youail to comply with any provision o this Agreement.

Limited Warranty . The warranty terms and periodspeciied in the applicable Linksys Product User Guideshall also apply to the Sotware.

Disclaimer o Liabilities. IN NO EVENT WILL LINKSYS ORITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUEOR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OFCAUSE (INCLUDING NEGLIGENCE), ARISING OUT OFOR RELATED TO THE USE OF OR INABILITY TO USE THE

SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OFTHE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILLLINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOUFOR THE PRODUCT. The oregoing limitations will applyeven i any warranty or remedy under this Agreement ailso its essential purpose. Some jurisdictions do not allow

the exclusion or limitation o incidental or consequentialdamages, so the above limitation or exclusion may notapply to You.

Export . Sotware, including technical data, may be subjectto U.S. export control laws and regulations and/or exportor import regulations in other countries. You agree tocomply strictly with all such laws and regulations.

U.S. Government Users. The Sotware and documentationqualiy as “commercial items” as deined at 48 C.F.R. 2.101and 48 C.F.R. 12.212. All Government users acquire theSotware and documentation with only those rightsherein that apply to non-governmental customers.

General Terms. This Agreement will be governed by andconstrued in accordance with the laws o the State o Caliornia, without reerence to conlict o laws principles.The United Nations Convention on Contracts or theInternational Sale o Goods will not apply. I any portiono this Agreement is ound to be void or unenorceable,the remaining provisions will remain in ull orce andeect. This Agreement constitutes the entire agreementbetween the parties with respect to the Sotware andsupersedes any conlicting or additional terms containedin any purchase order or elsewhere.

END OF SCHEDULE 1

Schedule 2

I this Linksys product contains open source sotwarelicensed under Version 2 o the “GNU General PublicLicense” then the license terms below in this Schedule 2will apply to that open source sotware. The license termsbelow in this Schedule 2 are rom the public web site athttp://www.gnu.org/copyleft/gpl.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright © 1989, 1991 Free Sotware Foundation, Inc.51 Franklin Street, Fith Floor, Boston, MA 02110-1301,USA

Everyone is permitted to copy and distribute verbatimcopies o this license document, but changing it is notallowed.

Preamble

The licenses or most sotware are designed to take awayyour reedom to share and change it. By contrast, theGNU General Public License is intended to guarantee your

Page 37: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 37/41

Page 38: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 38/41

36

Appendix E Software License Agreement

Wireless-G Broadband Router

I the modiied program normally reads commandsc.interactively when run, you must cause it, whenstarted running or such interactive use in the mostordinary way, to print or display an announcementincluding an appropriate copyright notice anda notice that there is no warranty (or else, saying

that you provide a warranty) and that users mayredistribute the program under these conditions,and telling the user how to view a copy o this License. (Exception: i the Program itsel isinteractive but does not normally print such anannouncement, your work based on the Programis not required to print an announcement.)

These requirements apply to the modiied work asa whole. I identiiable sections o that work are notderived rom the Program, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part o a whole which is a work based onthe Program, the distribution o the whole must be onthe terms o this License, whose permissions or otherlicensees extend to the entire whole, and thus to eachand every part regardless o who wrote it.

Thus, it is not the intent o this section to claim rightsor contest your rights to work written entirely by you;rather, the intent is to exercise the right to control thedistribution o derivative or collective works based onthe Program.

In addition, mere aggregation o another work notbased on the Program with the Program (or with awork based on the Program) on a volume o a storageor distribution medium does not bring the other work under the scope o this License.

You may copy and distribute the Program (or a3.work based on it, under Section 2) in object code orexecutable orm under the terms o Sections 1 and 2above provided that you also do one o the ollowing:

Accompany it with the complete correspondinga.machine-readable source code, which must bedistributed under the terms o Sections 1 and 2above on a medium customarily used or sotwareinterchange; or,

Accompany it with a written oer, valid or at leastb.three years, to give any third party, or a chargeno more than your cost o physically perormingsource distribution, a complete machine-readablecopy o the corresponding source code, to bedistributed under the terms o Sections 1 and 2above on a medium customarily used or sotwareinterchange; or,

Accompany it with the inormation you received asc.to the oer to distribute corresponding source code.(This alternative is allowed only or noncommercialdistribution and only i you received the programin object code or executable orm with such anoer, in accord with Subsection b above.)

The source code or a work means the preerred ormo the work or making modiications to it. For anexecutable work, complete source code means allthe source code or all modules it contains, plus anyassociated interace deinition iles, plus the scriptsused to control compilation and installation o theexecutable. However, as a special exception, the sourcecode distributed need not include anything that isnormally distributed (in either source or binary orm)with the major components (compiler, kernel, and soon) o the operating system on which the executableruns, unless that component itsel accompanies theexecutable.

I distribution o executable or object code is madeby oering access to copy rom a designated place,then oering equivalent access to copy the sourcecode rom the same place counts as distribution o the source code, even though third parties are notcompelled to copy the source along with the objectcode.

You may not copy, modiy, sublicense, or distribute4.the Program except as expressly provided underthis License. Any attempt otherwise to copy, modiy,sublicense or distribute the Program is void, and willautomatically terminate your rights under this License.However, parties who have received copies, or rights,rom you under this License will not have their licensesterminated so long as such parties remain in ullcompliance.

You are not required to accept this License, since you5.have not signed it. However, nothing else grants youpermission to modiy or distribute the Program or itsderivative works. These actions are prohibited by law i you do not accept this License. Thereore, by modiyingor distributing the Program (or any work based on theProgram), you indicate your acceptance o this Licenseto do so, and all its terms and conditions or copying,

distributing or modiying the Program or works basedon it.

Each time you redistribute the Program (or any work 6.based on the Program), the recipient automaticallyreceives a license rom the original licensor to copy,distribute or modiy the Program subject to theseterms and conditions. You may not impose any urtherrestrictions on the recipients’ exercise o the rightsgranted herein. You are not responsible or enorcingcompliance by third parties to this License.

Page 39: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 39/41

37

Appendix E Software License Agreement

Wireless-G Broadband Router

I, as a consequence o a court judgment or allegation7.o patent inringement or or any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions o this License, they donot excuse you rom the conditions o this License. I 

you cannot distribute so as to satisy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence youmay not distribute the Program at all. For example,i a patent license would not permit royalty-reeredistribution o the Program by all those who receivecopies directly or indirectly through you, then the onlyway you could satisy both it and this License would beto rerain entirely rom distribution o the Program.

I any portion o this section is held invalid orunenorceable under any particular circumstance,the balance o the section is intended to apply andthe section as a whole is intended to apply in other

circumstances.

It is not the purpose o this section to induce you toinringe any patents or other property right claims orto contest validity o any such claims; this section hasthe sole purpose o protecting the integrity o the reesotware distribution system, which is implementedby public license practices. Many people havemade generous contributions to the wide range o sotware distributed through that system in relianceon consistent application o that system; it is up tothe author/donor to decide i he or she is willing todistribute sotware through any other system and a

licensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence o the rest o thisLicense.

I the distribution and/or use o the Program is8.restricted in certain countries either by patents or bycopyrighted interaces, the original copyright holderwho places the Program under this License may add anexplicit geographical distribution limitation excludingthose countries, so that distribution is permitted onlyin or among countries not thus excluded. In such case,this License incorporates the limitation as i written in

the body o this License.The Free Sotware Foundation may publish revised9.and/or new versions o the General Public Licenserom time to time. Such new versions will be similar inspirit to the present version, but may dier in detail toaddress new problems or concerns.

Each version is given a distinguishing version number.I the Program speciies a version number o thisLicense which applies to it and “any later version”, youhave the option o ollowing the terms and conditionseither o that version or o any later version publishedby the Free Sotware Foundation. I the Program does

not speciy a version number o this License, youmay choose any version ever published by the FreeSotware Foundation.

I you wish to incorporate parts o the Program into10.other ree programs whose distribution conditions aredierent, write to the author to ask or permission. For

sotware which is copyrighted by the Free SotwareFoundation, write to the Free Sotware Foundation; wesometimes make exceptions or this. Our decision willbe guided by the two goals o preserving the ree statuso all derivatives o our ree sotware and o promotingthe sharing and reuse o sotware generally.

NO WARRANTY 

BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,11.THERE IS NO WARRANTY FOR THE PROGRAM, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPTWHEN OTHERWISE STATED IN WRITING THE COPYRIGHT

HOLDERS AND/OR OTHER PARTIES PROVIDE THEPROGRAM “AS IS” WITHOUT WARRANTY OF ANYKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE PROGRAM IS WITH YOU.SHOULD THE PROGRAM PROVE DEFECTIVE, YOUASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR12.AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,OR ANY OTHER PARTY WHO MAY MODIFY AND/OR

REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANYGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIALDAMAGES ARISING OUT OF THE USE OR INABILITY TOUSE THE PROGRAM (INCLUDING BUT NOT LIMITED TOLOSS OF DATA OR DATA BEING RENDERED INACCURATEOR LOSSES SUSTAINED BY YOU OR THIRD PARTIES ORA FAILURE OF THE PROGRAM TO OPERATE WITH ANYOTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHERPARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.

END OF TERMS AND CONDITIONS

END OF SCHEDULE 2

Schedule 3

I this Linksys product contains open source sotwarelicensed under the OpenSSL license:

This product includes sotware developed by theOpenSSL Project or use in the OpenSSL Toolkit.(http://www.openssl.org/).

This product includes cryptographic sotware written byEric Young ([email protected]).

Page 40: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 40/41

38

Appendix E Software License Agreement

Wireless-G Broadband Router

This product includes sotware written by Tim Hudson([email protected]).

In addition, i this Linksys product contains opensource sotware licensed under the OpenSSL licensethen the license terms below in this Schedule 3 willapply to that open source sotware. The license terms

below in this Schedule 3 are rom the public web site athttp://www.openssl.org/source/license.html.

The OpenSSL toolkit stays under a dual license, i.e. boththe conditions o the OpenSSL License and the originalSSLeay license apply to the toolkit. See below or theactual license texts. Actually both licenses are BSD-styleOpen Source licenses. In case o any license issues relatedto OpenSSL please contact [email protected].

OpenSSL License

Copyright © 1998-2007 The OpenSSL Project. All rightsreserved.

Redistribution and use in source and binary orms, withor without modiication, are permitted provided that theollowing conditions are met:

Redistributions o source code must retain the above1.copyright notice, this list o conditions and theollowing disclaimer.

Redistributions in binary orm must reproduce the2.above copyright notice, this list o conditions and theollowing disclaimer in the documentation and/orother materials provided with the distribution.

All advertising materials mentioning eatures or3.

use o this sotware must display the ollowingacknowledgment: “This product includes sotwaredeveloped by the OpenSSL Project or use in theOpenSSL Toolkit. (http://www.openssl.org/)”

The names “OpenSSL Toolkit” and “OpenSSL Project”4.must not be used to endorse or promote productsderived rom this sotware without prior writtenpermission. For written permission, please [email protected].

Products derived rom this sotware may not be called5.“OpenSSL” nor may “OpenSSL” appear in their nameswithout prior written permission o the OpenSSL

Project.Redistributions o any orm whatsoever must retain6.the ollowing acknowledgment: “This product includessotware developed by the OpenSSL Project or use inthe OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENTSHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BELIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,

EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTEGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR

OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OFTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OFSUCH DAMAGE.

This product includes cryptographic sotware written byEric Young ([email protected]). This product includessotware written by Tim Hudson ([email protected]).

Original SSLeay License

Copyright © 1995-1998 Eric Young ([email protected])Allrights reserved.

This package is an SSL implementation written by EricYoung ([email protected]).

The implementation was written so as to conorm withNetscape’s SSL.

This library is ree or commercial and non-commercialuse as long as the ollowing conditions are adhered to.The ollowing conditions apply to all code ound in thisdistribution, be it the RC4, RSA, lhash, DES, etc., code; not

 just the SSL code. The SSL documentation included withthis distribution is covered by the same copyright termsexcept that the holder is Tim Hudson ([email protected]).

Copyright remains Eric Young’s, and as such any Copyright

notices in the code are not to be removed.I this package is used in a product, Eric Young should begiven attribution as the author o the parts o the libraryused. This can be in the orm o a textual message atprogram startup or in documentation (online or textual)provided with the package.

Redistribution and use in source and binary orms, withor without modiication, are permitted provided that theollowing conditions are met:

Redistributions o source code must retain the1.copyright notice, this list o conditions and the

ollowing disclaimer.Redistributions in binary orm must reproduce the2.above copyright notice, this list o conditions and theollowing disclaimer in the documentation and/orother materials provided with the distribution.

All advertising materials mentioning eatures or3.use o this sotware must display the ollowingacknowledgement:

“This product includes cryptographic sotware writtenby Eric Young ([email protected])”

Page 41: Wireless-g Broadband Router User Guide

8/14/2019 Wireless-g Broadband Router User Guide

http://slidepdf.com/reader/full/wireless-g-broadband-router-user-guide 41/41

Appendix E Software License Agreement

The word ‘cryptographic’ can be let out i the routinesrom the library being used are not cryptographicrelated.

I you include any Windows speciic code (or a derivative4.thereo) rom the apps directory (application code)you must include an acknowledgement: “This product

includes sotware written by Tim Hudson ([email protected])”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THEAUTHOR OR CONTRIBUTORS BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOTLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS ORSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORYOF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms or any publicly availableversion or derivative o this code cannot be changed. i.e.this code cannot simply be copied and put under anotherdistribution license [including the GNU Public License.]

END OF SCHEDULE 3