+ All Categories
Home > Documents > Linksys Wrt54gh User Guide

Linksys Wrt54gh User Guide

Date post: 08-Aug-2018
Category:
Upload: gugulla-sreenath
View: 213 times
Download: 0 times
Share this document with a friend
50
8/22/2019 Linksys Wrt54gh User Guide http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 1/50 USER GUIDE  Wireless-G Home Router  with SpeedBurst Model: WRT54GH loaded from www.Manualslib.com manuals search engine 
Transcript
Page 1: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 1/50

USER GUIDE

 Wireless-G Home Router

 with SpeedBurst

Model:WRT54GH

loaded from www.Manualslib.com manuals search engine 

Page 2: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 2/50

  About This Guide

iWireless-G Home Router with SpeedBurst

About This Guide

Icon Descriptions

While reading through the User Guide you may see

various icons that call attention to speciic items. Below isa description o these icons:

NOTE: This check mark indicates that there isa note o interest and is something that youshould pay special attention to while using theproduct.

 WARNING: This exclamation point indicatesthat there is a caution or warning and it issomething that could damage your property orproduct.

WEB: This globe icon indicates a noteworthywebsite address or e-mail address.

Online Resources

Website addresses in this document are listed withouthttp:// in ront o the address because most current webbrowsers do not require it. I you use an older web browser,you may have to add http:// in ront o the web address.

Resource Website

Linksys www.linksysbycisco.com

Linksys

Internationalwww.linksysbycisco.com/international

Glossary www.linksysbycisco.com/glossary

Network Security www.linksysbycisco.com/security

Copyright and Trademarks

© 2009 Cisco Systems, Inc. All rightsreserved. Cisco, the Cisco logo, and Linksysare trademarks or registered trademarkso Cisco Systems, Inc. and/or its ailiatesin the United States and certain othercountries. All other trademarks mentionedin this document or website are theproperty o their respective owners. Theuse o the word partner does not imply apartnership relationship between Ciscoand any other company.

loaded from www.Manualslib.com manuals search engine 

Page 3: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 3/50

  Table of Contents

iiWireless-G Home Router with SpeedBurst

Chapter 1: Product Overview 1

Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Side Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2: Wireless Security Checklist 3General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Chapter 3: Advanced Confguration 4

Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Setup > DDNS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Setup > MAC Address Clone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Wireless > Wireless MAC Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

Applications and Gaming > Single Port Forwarding. . . . . . . . . . . . . . . . . . . . . . . .15

Applications and Gaming > Port Range Forwarding . . . . . . . . . . . . . . . . . . . . . . .16

Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .16

Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17

Administration > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18

Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19

Administration > Factory Deaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20

Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21

Status > Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Appendix A: Troubleshooting 23

Appendix B: Specifcations 24

Appendix C: Warranty Inormation 25Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

loaded from www.Manualslib.com manuals search engine 

Page 4: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 4/50

  Table of Contents

iiiWireless-G Home Router with SpeedBurst

Appendix D: Regulatory Inormation 27

FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Saety Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28

Avis de non-responsabilité concernant les appareils sans fl . . . . . . . . . . . . . . . . . .28

User Inormation or Consumer Products Covered by EU Directive 2002/96/EC on WasteElectric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29

Appendix E: Sotware End User License Agreement 33

Cisco Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Sotware Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

loaded from www.Manualslib.com manuals search engine 

Page 5: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 5/50

Chapter 1 Product Overview

1Wireless-G Home Router with SpeedBurst

Chapter 1:Product OverviewThank you or choosing the Linksys by Cisco Wireless-GHome Router with SpeedBurst. The Router lets you access

the Internet via a wireless connection or through one o itsour switched ports. You can also use the Router to shareresources such as computers, printers and iles. A varietyo security eatures help to protect your data and yourprivacy while you are online. Security eatures includeWPA2 security, a Stateul Packet Inspection (SPI) irewall,and NAT technology. Coniguring the Router is easy usingthe provided browser–based utility.

Front Panel

1, 2, 3, 4 (Green) These numbered LEDs,corresponding with the numbered ports on theRouter’s back panel, serve two purposes. I theLED is continuously lit, the Router is successullyconnected to a device through that port. Alashing LED indicates network activity over

that port.Wireless (Green) The Wireless LED lights upwhen the wireless eature is enabled. I the LEDis lashing, the Router is sending or receivingdata over the network.

Internet (Green) The Internet LED lights upwhen there is a connection made through theInternet port. It lashes to indicate network activity over the Internet port.

Power (Green) The Power LED lights upand will stay on while the Router is poweredon. When the Router goes through its sel-diagnostic mode during every boot-up, thisLED will lash. When the diagnostic is complete,the LED will be solidly lit.

Back Panel

Internet The Internet port is where you willconnect your cable or DSL Internet connection.

4, 3, 2, 1 These Ethernet ports (4, 3, 2, 1)connect the Router to computers on your wirednetwork and other Ethernet network devices.

On/Off  Push the On/O button to power on oro the Router.

Power The Power port connects to the includedpower adapter.

Side Panel

Reset There are two ways to reset the Routerto its actory deaults. Either press and hold theReset button or approximately ive seconds, orrestore the deaults rom the  Administration >

Factory Defaults screen o the Router’sbrowser-based utility. (Reer to Administration> Factory Defaults, page 20.)

Horizontal Placement

The Router has our rubber eet on its bottom panel. Placethe Router on a level surace near an electrical outlet.

loaded from www.Manualslib.com manuals search engine 

Page 6: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 6/50

Chapter 1 Product Overview

2Wireless-G Home Router with SpeedBurst

Wall-Mounting Placement

The Router has two wall-mount slots on its bottompanel. The distance between the slots is 51.3 mm(2.02 inches).

Two screws are needed to mount the Router.

Suggested Mounting Hardware

    2 .    5  -    3 .    0   m   m

4-5 mm 1-1.5 mm

 †Note: Mounting hardware illustrations are nottrue to scale.

NOTE: Linksys is not responsible or damagesincurred by insecure wall-mounting hardware.

Follow these instructions:

1. Determine where you want to mount the Router. Makesure that the wall you use is smooth, lat, dry, andsturdy. Also make sure the location is within reach o an electrical outlet.

2. Drill two holes into the wall. Make sure the holes are51.3 mm (2.02 inches) apart.

3. Insert a screw into each hole and leave 3 mm(0.12 inches) o its head exposed.

4. Maneuver the Router so the wall-mount slots line upwith the two screws.

5. Place the wall-mount slots over the screws and slidethe Router down until the screws it snugly into thewall-mount slots.

51.3 mm

Wall-Mounting Template

Print this page at 100% size.

Cut along the dotted line, and place on the wall to drillprecise spacing.

loaded from www.Manualslib.com manuals search engine 

Page 7: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 7/50

Chapter 2 Wireless Security Checklist

3Wireless-G Home Router with SpeedBurst

Chapter 2:Wireless Security ChecklistWireless networks are convenient and easy to install, sohomes with high-speed Internet access are adopting them

at a rapid pace. Because wireless networking operates bysending inormation over radio waves, it can be morevulnerable to intruders than a traditional wired network.Like signals rom your cellular or cordless phones, signalsrom your wireless network can also be intercepted. Sinceyou cannot physically prevent someone rom connectingto your wireless network, you need to take some additionalsteps to keep your network secure.

1. Change the default wirelessnetwork name or SSID

Wireless devices have a deault wireless network nameor Service Set Identiier (SSID) set by the actory. Thisis the name o your wireless network, and can be upto 32 characters in length. Linksys wireless productsuse linksys as the deault wireless network name. Youshould change the wireless network name to somethingunique to distinguish your wireless network rom otherwireless networks that may exist around you, but do notuse personal inormation (such as your Social Securitynumber) because this inormation may be available oranyone to see when browsing or wireless networks.

2. Change the default password

For wireless products such as access points and routers,you will be asked or a password when you want to changetheir settings. These devices have a deault password setby the actory. The Linksys deault password is admin.Hackers know these deaults and may try to use themto access your wireless device and change your network settings. To thwart any unauthorized changes, customizethe device’s password so it will be hard to guess.

3. Enable MAC address filteringLinksys routers give you the ability to enable Media AccessControl (MAC) address iltering. The MAC address is aunique series o numbers and letters assigned to everynetworking device. With MAC address iltering enabled,wireless network access is provided solely or wirelessdevices with speciic MAC addresses. For example, you canspeciy the MAC address o each computer in your homeso that only those computers can access your wirelessnetwork.

4. Enable encryption

Encryption protects data transmitted over a wirelessnetwork. Wi-Fi Protected Access (WPA/WPA2) and WiredEquivalent Privacy (WEP) oer dierent levels o security

or wireless communication.A network encrypted with WPA/WPA2 is more securethan a network encrypted with WEP, because WPA/WPA2uses dynamic key encryption. To protect the inormationas it passes over the airwaves, you should enable thehighest level o encryption supported by your network equipment.

WEP is an older encryption standard and may be theonly option available on some older devices that do notsupport WPA.

General Network Security GuidelinesWireless network security is useless i the underlyingnetwork is not secure.

• Password protect all computers on the network andindividually password protect sensitive iles.

 • Change passwords on a regular basis.

 • Install anti-virus sotware and personal irewallsotware.

 • Disable ile sharing (peer-to-peer). Some applicationsmay open ile sharing without your consent and/or

knowledge.

Additional Security Tips

 • Keep wireless routers, access points, or gateways awayrom exterior walls and windows.

 • Turn wireless routers, access points, or gatewayso when they are not being used (at night, duringvacations).

 • Use strong passphrases that are at least eight charactersin length. Combine letters and numbers to avoid usingstandard words that can be ound in the dictionary.

WEB: For more inormation on wireless security,visit www.linksysbycisco.com/security

loaded from www.Manualslib.com manuals search engine 

Page 8: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 8/50

Chapter 3 Advanced Configuration

4Wireless-G Home Router with SpeedBurst

Chapter 3:Advanced ConfigurationAter setting up the Router with the Setup Wizard (locatedon the CD-ROM), the Router will be ready or use. However,

i you want to change its advanced settings, use theRouter’s browser-based utility. This chapter describes eachweb page o the utility and each page’s key unctions. Youcan access the utility via a web browser on a computerconnected to the Router.

The browser-based utility has these main tabs: Setup,Wireless, Security, Access Restrictions, Applications &Gaming, Administration, and Status. Additional tabs willbe available ater you click one o the main tabs.

NOTE: When irst installing the Router, youshould use the Setup Wizard on the Setup

CD-ROM. I you want to conigure advancedsettings, use this chapter to learn about thebrowser-based utility.

Access the Browser-Based Utility

To access the browser-based utility, launch the webbrowser on your computer, and enter the Router’s deaultIP address, 192.168.1.1, in the  Address ield. Then pressEnter.

A login screen will appear. (Non-Windows XP users will

see a similar screen.) Leave the User name ield blank.The irst time you open the browser-based utility, use thedeault password admin. (You can set a new passwordrom the  Administration > Management screen.) Click OK to continue.

Login Screen

Setup > Basic Setup

The irst screen that appears is the Basic Setup screen. Thisallows you to change the Router’s general settings.

Setup > Basic Setup

Internet Setup

The Internet Setup section conigures the Router to yourInternet connection. Most o this inormation can beobtained through your Internet Service Provider (ISP).

Internet Connection Type

Select the type o Internet connection your ISP providesrom the drop-down menu. These are the available types:

 • Automatic Coniguration - DHCP

 • Static IP

 • PPPoE

 • PPTP

 • L2TP

 • Telstra Cable

Automatic Configuration - DHCP

By deault, the Router’s Internet Connection Type is setto Automatic Configuration - DHCP, which should be

kept only i your ISP supports DHCP or you are connectingthrough a dynamic IP address. (This option usually appliesto cable connections.)

Internet Connection Type > Automatic Coniguration - DHCP

loaded from www.Manualslib.com manuals search engine 

Page 9: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 9/50

Chapter 3 Advanced Configuration

5Wireless-G Home Router with SpeedBurst

Static IP

I you are required to use a permanent IP address toconnect to the Internet, select Static IP.

Internet Connection Type > Static IP

Internet IP Address This is the Router’s IP address, whenseen rom the Internet. Your ISP will provide you with theIP Address you need to speciy here.

Subnet Mask  This is the Router’s Subnet Mask, as seenby users on the Internet (including your ISP). Your ISP will

provide you with the Subnet Mask.

Default Gateway Your ISP will provide you with the IPaddress o the ISP server.

DNS 1-3 Your ISP will provide you with at least one DNS(Domain Name System) server IP address.

PPPoE

Some DSL-based ISPs use PPPoE (Point-to-Point Protocolover Ethernet) to establish Internet connections. I you areconnected to the Internet through a DSL line, check withyour ISP to see i they use PPPoE. I they do, you will have

to enable PPPoE.

Internet Connection Type > PPPoE

Username and Password Enter the Username andPassword provided by your ISP.

Service Name (Optional) I provided by your ISP, enterthe Service Name.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsed

beore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period I you select this option,the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To use

this option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check the Internet connection. The deault Redial Period is30 seconds.

PPTP

Point-to-Point Tunneling Protocol (PPTP) is a service thatapplies to connections in Europe only.

Internet Connection Type > PPTP

I your ISP supports DHCP or you are connecting througha dynamic IP address, then select Obtain an IP Address

Automatically. I you are required to use a permanent IPaddress to connect to the Internet, then select Specify anIP Address. Then conigure the ollowing:

 • Specify an IP Address This is the Router’s IP address,as seen rom the Internet. Your ISP will provide youwith the IP Address you need to speciy here.

 • Subnet Mask  This is the Router’s Subnet Mask, asseen by users on the Internet (including your ISP). YourISP will provide you with the Subnet Mask.

 • Default Gateway Your ISP will provide you with theIP address o the ISP server.

 • DNS 1-3 Your ISP will provide you with at least oneDNS (Domain Name System) server IP address.

PPTP Server IP Address Your ISP will provide you withthe IP address o the PPTP server.

Username and Password Enter the Username andPassword provided by your ISP.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router to

loaded from www.Manualslib.com manuals search engine 

Page 10: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 10/50

Chapter 3 Advanced Configuration

6Wireless-G Home Router with SpeedBurst

automatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period If you select this option, theRouter will periodically check your Internet connection. If 

you are disconnected, then the Router will automatically

re-establish your connection. To use this option, selectKeep Alive. In the Redial Period field, you specify how often

you want the Router to check the Internet connection. The

default value is 30 seconds.

L2TP

L2TP is a service that applies to connections in Israel only.

Internet Connection Type > L2TP

Server IP Address This is the IP address o the L2TPServer. Your ISP will provide you with the IP Address youneed to speciy here.

Username and Password Enter the Username andPassword provided by your ISP.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router toautomatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period I you select this option,

the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check the Internet connection. The deault Redial Period is30 seconds.

Telstra Cable

Telstra Cable is a service that applies to connections inAustralia only.

Internet Connection Type > Telstra Cable

Server IP Address This is the IP address o the HeartbeatServer. Your ISP will provide you with the IP Address youneed to speciy here.

Username and Password Enter the Username andPassword provided by your ISP.

Connect on Demand: Max Idle Time You can conigurethe Router to cut the Internet connection ater it has beeninactive or a speciied period o time (Max Idle Time). I your Internet connection has been terminated due toinactivity, Connect on Demand enables the Router to

automatically re-establish your connection as soon as youattempt to access the Internet again. To use this option,select Connect on Demand. In the Max Idle Time ield,enter the number o minutes you want to have elapsedbeore your Internet connection terminates. The deaultMax Idle Time is 5 minutes.

Keep Alive: Redial Period I you select this option,the Router will periodically check your Internetconnection. I you are disconnected, then the Routerwill automatically re-establish your connection. To usethis option, select Keep Alive. In the Redial Period  ield,you speciy how oten you want the Router to check 

the Internet connection. The deault Redial Period is30 seconds.

Optional Settings

Some o these settings may be required by your ISP. Veriywith your ISP beore making any changes.

Optional Settings

Host Name and Domain Name These ields allow you tosupply a host and domain name or the Router. Some ISPs,usually cable ISPs, require these names as identiication.You may have to check with your ISP to see i yourbroadband Internet service has been conigured with ahost and domain name. In most cases, leaving these ieldsblank will work.

MTU MTU is the Maximum Transmission Unit. It speciiesthe largest packet size permitted or Internet transmission.Select Manual i you want to manually enter the largestpacket size that is transmitted. To have the Router select

loaded from www.Manualslib.com manuals search engine 

Page 11: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 11/50

Chapter 3 Advanced Configuration

7Wireless-G Home Router with SpeedBurst

the best MTU or your Internet connection, keep thedeault, Auto.

Size When Manual is selected in the MTU ield, this optionis enabled. Leave this value in the 1200 to 1500 range. Thedeault size depends on the Internet Connection Type:

 •

DHCP, Static IP, or Telstra: 1500 • PPPoE: 1492

 • PPTP or L2TP: 1460

Network Setup

The Network Setup section changes the settings o thelocal network. Wireless setup is perormed through theWireless tab.

Router IP

This presents both the Router’s Local IP Address and

Subnet Mask as seen by your network.

Router IP

DHCP Server Setting

The settings allow you to conigure the Router’s DynamicHost Coniguration Protocol (DHCP) server unction. TheRouter can be used as a DHCP server or your network. ADHCP server automatically assigns an IP address to eachcomputer on your network. I you choose to enable the

Router’s DHCP server option, make sure there is no otherDHCP server on your network.

DHCP Server Setting

DHCP Server DHCP is enabled by actory deault. I youalready have a DHCP server on your network, or you donot want a DHCP server, then select Disabled (no otherDHCP eatures will be available).

DHCP Reservation Click this button i you want to assigna ixed local IP address to a MAC address.

DHCP Reservation

You will see a list o DHCP clients with the ollowinginormation: Client Name, Interace, IP Address, andMAC Address.

DHCP Reservation

 • Select Clients from DHCP Table Click the Select check box to reserve a client’s IP address. Then click 

Add Clients.

 • Manually Adding Client To manually assign an IPaddress, enter the client’s name in the Enter Client 

Name ield. Enter the IP address you want it to have inthe Assign IP Address ield. Enter its MAC address in theTo This MAC Address ield. Then click Add.

Clients Already Reserved

A list o DHCP clients and their ixed local IP addresseswill be displayed at the bottom o the screen. I youwant to remove a client rom this list, click Remove.

Click  Save Settings to apply your changes, or click Cancel Changes to clear your changes. To update theon-screen inormation, click Refresh. To exit this screenand return to the Basic Setup screen, click Close.

Start IP Address Enter a value or the DHCP server tostart with when issuing IP addresses. Because the Router’s

default IP address is 192.168.1.1, the Start IP Address must

be 192.168.1.2 or greater, but smaller than 192.168.1.253.

 The default is 192.168.1.100.

Maximum Number of Users Enter the maximum numbero computers that you want the DHCP server to assign IPaddresses to. This number cannot be greater than 253.

The deault is 50.IP Address Range The range o available IP addresses. isdisplayed.

Client Lease Time The Client Lease Time is the amounto time a network user will be allowed connection to theRouter with their current dynamic IP address. Enter theamount o time, in minutes, that the user will be “leased”this dynamic IP address. Ater the time has expired, theuser will be automatically assigned a new dynamic IPaddress, or the lease will be renewed. The deault is 0 minutes, which means one day.

loaded from www.Manualslib.com manuals search engine 

Page 12: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 12/50

Chapter 3 Advanced Configuration

8Wireless-G Home Router with SpeedBurst

Static DNS 1-3  The Domain Name System (DNS) is how

the Internet translates domain or website names into

Internet addresses or URLs. Your ISP will provide you with at

least one DNS Server IP Address. If you wish to use another,

enter that IP Address in one of these fields. You can enter up

to three DNS Server IP Addresses here. The Router will use

these for quicker access to functioning DNS servers.WINS The Windows Internet Naming Service (WINS)manages each computer’s interaction with the Internet. I you use a WINS server, enter that server’s IP Address here.Otherwise, leave this blank.

Time Settings

Time Settings

Time Zone Select the time zone in which your network 

unctions rom this drop-down menu.

Automatically adjust clock for daylight savingchanges Select this option to have the Routerautomatically adjust or daylight saving time.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Setup > DDNS

The Router oers a Dynamic Domain Name System (DDNS)eature. DDNS lets you assign a ixed host and domainname to a dynamic Internet IP address. It is useul when

you are hosting your own website, FTP server, or otherserver behind the Router.

Beore you can use this eature, you need to signup or DDNS service with a DDNS service provider,www.dyndns.org or www.TZO.com. I you do not wantto use this eature, keep the deault, Disabled.

DDNS

DDNS Service

I your DDNS service is provided by DynDNS.org, thenselect DynDNS.org rom the drop-down menu. I yourDDNS service is provided by TZO, then select TZO.com.The eatures available on the DDNS screen will vary,depending on which DDNS service provider you use.

DynDNS.org

Setup > DDNS > DynDNS

Username Enter the Username or your DDNS account.

Password Enter the Password or your DDNS account.Host Name The is the DDNS URL assigned by the DDNSservice.

System Select the DynDNS service you use: Dynamic,Static, or Custom. The deault selection is Dynamic.

Mail Exchange (Optional) Enter the address o your mailexchange server, so e-mails to your DynDNS address go toyour mail server.

Backup MX This eature allows the mail exchange serverto be a backup. To disable this eature, keep the deault,Disabled. To enable the eature, select Enabled. I you

are not sure which setting to select, keep the deault,Disabled.

Wildcard This setting enables or disables wildcardsor your host. For example, i your DDNS address ismyplace.dyndns.org and you enable wildcards, then x.myplace.dyndns.org will work as well (x is the wildcard).To disable wildcards, keep the deault, Disabled. To enablewildcards, select Enabled. I you are not sure which settingto select, keep the deault, Disabled.

Internet IP Address The Router’s Internet IP address isdisplayed here. Because it is dynamic, it will change.

Status The status o the DDNS service connection is

displayed here.

Update To manually trigger an update, click this button.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 13: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 13/50

Chapter 3 Advanced Configuration

9Wireless-G Home Router with SpeedBurst

TZO.com

Setup > DDNS > TZO

E-mail Address, TZO Key, and Domain Name Enter thesettings o the account you set up with TZO.

Internet IP Address The Router’s Internet IP address isdisplayed here. Because it is dynamic, it will change.

Status The status o the DDNS service connection isdisplayed here.

Update To manually trigger an update, click this button.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Setup > MAC Address Clone

A MAC address is a 12-digit code assigned to a uniquepiece o hardware or identiication. Some ISPs will requireyou to register a MAC address in order to access the

Internet. I you do not wish to re-register the MAC addresswith your ISP, you may assign the MAC address you havecurrently registered with your ISP to the Router with theMAC Address Clone eature.

Setup > MAC Address Clone

MAC Address Clone

Enabled/Disabled To have the MAC address cloned,select Enabled.

MAC Address Enter the MAC address registered withyour ISP here.

Clone My PC’s MAC Click this button to clone the MACaddress o the computer you are using.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Wireless > Basic Wireless Settings

The basic settings or wireless networking are set on thisscreen.

Basic Wireless Settings

Wireless > Basic Wireless Settings

Network Mode From this drop-down menu, you canselect the wireless standards running on your network.I you have Wireless-G and Wireless-B devices in yournetwork, keep the deault, Mixed. I you have onlyWireless-G devices, select Wireless-G Only. I you haveonly Wireless-B devices, select Wireless-B Only. I youdo not have any wireless devices in your network, selectDisabled.

Network Name (SSID) The SSID is the network nameshared among all points in a wireless network. TheSSID must be identical or all devices in the wirelessnetwork. It is case-sensitive and must not exceed32 characters (use any o the characters on the keyboard).Make sure this setting is the same or all points in yourwireless network. For added security, you should changethe deault SSID (linksys) to a unique name.

Standard Channel Select the appropriate channel oryour wireless network. I you are not sure which channelto select, then keep the deault, Auto.

SSID Broadcast When wireless clients survey the localarea or wireless networks to associate with, they willdetect the SSID broadcast by the Router. To broadcast the

Router’s SSID, keep the deault, Enabled. I you do notwant to broadcast the Router’s SSID, then select Disabled.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 14: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 14/50

Chapter 3 Advanced Configuration

10Wireless-G Home Router with SpeedBurst

Wireless > Wireless Security

The Wireless Security  screen conigures the security o your wireless network. The Router supports the ollowingwireless security mode options: WPA2 Personal, WPAPersonal, and WEP. (WPA stands or Wi-Fi Protected Access,

which is a security standard stronger than WEP encryption.WEP stands or Wired Equivalent Privacy.)

Wireless Security

Security Mode

Select the security method or your wireless network. I you do not want to use wireless security, keep the deault,Disabled.

WPA2 Personal

NOTE: I you are using WPA2, then each devicein your wireless network MUST use the sameWPA2 method and shared key, or else thenetwork will not unction properly.

Security Mode > WPA2 Personal

Encryption WPA2 supports two encryption methods,TKIP and AES, with dynamic encryption keys. Select thetype o algorithm, AES or WPA-TKIP or WPA2-AES. Thedeault is WPA-TKIP or WPA2-AES.

Passphrase Enter a Passphrase o 8-63 characters.

Key Renewal Enter a Key Renewal period, which instructsthe Router how oten it should change the encryption

keys. The deault is 3600 seconds.

WPA Personal

NOTE: I you are using WPA, then each device inyour wireless network MUST use the same WPAmethod and shared key, or else the network willnot unction properly.

Security Mode > WPA Personal

Passphrase Enter a Passphrase o 8-63 characters.

Key Renewal Enter a Key Renewal period, which instructsthe Router how oten it should change the encryptionkeys. The deault is 3600 seconds.

WEP

WEP is a basic encryption method, which is not as secureas WPA.

IMPORTANT: If you are using WEP encryption,

then each device in your wireless network MUST

use the same WEP encryption method and key,

or else the network will not function properly.

Security Mode > WEP

Encryption Select a level o WEP encryption,40/64 bits (10 hex digits) or 104/128 bits (26 hex digits).The deault is 40/64 bits (10 hex digits).

Passphrase Enter a Passphrase to automatically generateWEP keys. Then click Generate.

Key 1 I you did not enter a Passphrase, enter the WEPkey manually.

Transmit Key Transmit Key 1 is used.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 15: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 15/50

Chapter 3 Advanced Configuration

11Wireless-G Home Router with SpeedBurst

Wireless > Wireless MAC Filter

Wireless access can be filtered by using the MAC addresses of 

the wireless devices transmitting within your network’s radius. 

Wireless > Wireless MAC Filter

Wireless MAC Filter

Enabled/Disabled  To filter wireless users by MAC address,

either permitting or blocking access, select Enabled. If you

do not wish to filter users by MAC address, keep the default,

Disabled.

Access Restriction

Prevent Select this option  to block wireless access byMAC address. This button is selected by deault.

Permit Select this option to allow wireless access by MACaddress. This button is not selected by deault.

MAC Address Filter List

Wireless Client List Click this button to open the Wireless

Client List screen.

Wireless Client List

Wireless Client List

This screen shows computers and other devices onthe wireless network. The list can be sorted by ClientName, IP Address, MAC Address, and Status.

Select Save to MAC Address Filter List or any device

you want to add to the MAC Address Filter List. Thenclick Add.

To update the on-screen inormation, click  Refresh.To exit this screen and return to the Wireless MAC Filter  screen, click Close.

MAC 01-32 Enter the MAC addresses o the deviceswhose wireless access you want to block or allow.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Wireless > Advanced Wireless Settings

The  Advanced Wireless Settings screen is used to set upthe Router’s advanced wireless unctions. These settingsshould only be adjusted by an expert administrator asincorrect settings can reduce wireless perormance.

Wireless > Advanced Wireless Settings

Advanced Wireless

AP Isolation This option isolates all wireless clients andwireless devices on your network rom each other. Wirelessdevices will be able to communicate with the Router butnot with each other. To use this option, select Enable. APIsolation is disabled by deault.

Frame Burst Enabling this option should provide yournetwork with greater perormance, depending on themanuacturer o your wireless products. To use the FrameBurst option, keep the deault, Enabled.

Authentication Type The Authentication Type settingis available i the Security Mode is WEP. The deaultis Auto, which allows either Open System or SharedKey authentication to be used. With Open System

loaded from www.Manualslib.com manuals search engine 

Page 16: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 16/50

Chapter 3 Advanced Configuration

12Wireless-G Home Router with SpeedBurst

authentication, the sender and the recipient do NOTuse a WEP key or authentication. With Shared Keyauthentication, the sender and recipient use a WEP key orauthentication. Select Shared Key to only use Shared Keyauthentication.

Basic Rate The Basic Rate setting is not actually one

rate o transmission but a series o rates at which theRouter can transmit. (The Basic Rate is not the actual rateo data transmission. I you want to speciy the Router’srate o data transmission, conigure the TransmissionRate setting.) The Router will advertise its Basic Rate tothe other wireless devices in your network, so they knowwhich rates will be used. The Router will also advertise thatit will automatically select the best rate or transmission.The deault setting is Default, when the Router cantransmit at all standard wireless rates (1-2 Mbps, 5.5 Mbps,11 Mbps, 18 Mbps, and 24Mbps). Select 1-2 Mbps oruse with older wireless technology. Select All, when theRouter can transmit at all wireless rates.

Transmission Rate The Transmission setting is availablei the Network Mode is Mixed, Wireless-G Only, orWireless-B Only. The rate o data transmission should beset depending on the speed o your wireless network.Select rom a range o transmission speeds, or keep thedeault, Auto, to have the Router automatically use theastest possible data rate and enable the Auto-Fallback eature. Auto-Fallback will negotiate the best possibleconnection speed between the Router and a wirelessclient.

CTS Protection Mode The Router automatically uses CTS(Clear-To-Send) Protection Mode when your Wireless-Gdevices are experiencing severe problems and are not ableto transmit to the Router in an environment with heavy802.11b traic. This option boosts the Router’s ability tocatch all Wireless-G transmissions but severely decreasesperormance. To use this option, keep the deault, Auto.To disable this option, select Disabled.

Beacon Interval Enter a value between 1 and 65,535milliseconds. The Beacon Interval value indicates therequency interval o the beacon. A beacon is a packetbroadcast by the Router to synchronize the wirelessnetwork. The deault is 100 milliseconds.

DTIM Interval This value, between 1 and 255, indicatesthe interval o the Delivery Traic Indication Message(DTIM). A DTIM ield is a countdown ield inormingclients o the next window or listening to broadcastand multicast messages. When the Router has bueredbroadcast or multicast messages or associated clients, itsends the next DTIM with a DTIM Interval value. Its clientshear the beacons and awaken to receive the broadcastand multicast messages. The deault value is 1.

Fragmentation Threshold This value speciies themaximum size or a packet beore data is ragmentedinto multiple packets. I you experience a high packet

error rate, you may slightly increase the FragmentationThreshold. Setting the Fragmentation Threshold too lowmay result in poor network perormance. Only minorreduction o the deault value is recommended. In mostcases, it should remain at its deault value o 2346.

RTS Threshold Should you encounter inconsistent data

low, only minor reduction o the deault value, 2347, isrecommended. I a network packet is smaller than thepreset RTS threshold size, the RTS/CTS mechanism willnot be enabled. The Router sends Request to Send (RTS)rames to a particular receiving station and negotiatesthe sending o a data rame. Ater receiving an RTS, thewireless station responds with a Clear to Send (CTS) rameto acknowledge the right to begin transmission. The RTSThreshold value should remain at its deault value o 2347.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Security > Firewall

The Firewall screen is used to conigure a irewall that canilter out various types o unwanted traic on the Router’slocal network.

Security > Firewall

Firewall

SPI Firewall Protection To use irewall protection,keep the deault selection, Enabled. To turn o irewallprotection, select Disabled.

Internet Filter

For the ollowing options, select the option to enable it, ordeselect the option to disable it.

Filter Anonymous Internet Requests This eature makesit more diicult or outside users to work their way intoyour network. This eature is enabled by deault. Deselectthis option to allow anonymous Internet requests.

loaded from www.Manualslib.com manuals search engine 

Page 17: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 17/50

Chapter 3 Advanced Configuration

13Wireless-G Home Router with SpeedBurst

Filter Multicast Multicasting allows or multipletransmissions to speciic recipients at the same time. I multicasting is permitted, then the Router will allow IPmulticast packets to be orwarded to the appropriatecomputers. Select this option to ilter multicasting. Thisoption is disabled by deault.

Filter Internet NAT Redirection This eature uses portorwarding to block access to local servers rom localnetworked computers. Select this option to ilter InternetNAT redirection. This option is disabled by deault.

Filter IDENT (Port 113) This eature keeps port 113 rombeing scanned by devices outside o your local network.This eature is enabled by deault. Deselect this option todisable it.

Web Filter

For the ollowing options, select the option to enable it, ordeselect the option to disable it.

Proxy Use o WAN proxy servers may compromise theGateway’s security. Denying Proxy will disable access toany WAN proxy servers. Select this option to enable proxyiltering. This option is disabled by deault.

Java Java is a programming language or websites. I youdeny Java, you run the risk o not having access to Internetsites created using this programming language. Selectthis option to enable Java iltering. This option is disabledby deault.

ActiveX ActiveX is a programming language or websites.I you deny ActiveX, you run the risk o not having access to

Internet sites created using this programming language.Select this option to enable ActiveX iltering. This optionis disabled by deault.

Cookies A cookie is data stored on your computer andused by Internet sites when you interact with them. Selectthis option to ilter cookies. This option is disabled bydeault.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Security > VPN Passthrough

 The VPN Passthrough screen allows you to enable VPN

tunnels using IPSec, PPTP, or L2TP protocols to pass through

the Router’s firewall.

Security > VPN Passthrough

VPN Passthrough

IPSec Passthrough Internet Protocol Security (IPSec) isa suite o protocols used to implement secure exchangeo packets at the IP layer. To allow IPSec tunnels to passthrough the Router, keep the deault, Enabled.

PPTP Passthrough Point-to-Point Tunneling Protocol(PPTP) allows the Point-to-Point Protocol (PPP) to betunneled through an IP network. To allow PPTP tunnels to

pass through the Router, keep the deault, Enabled.L2TP Passthrough Layer 2 Tunneling Protocol is themethod used to enable Point-to-Point sessions via theInternet on the Layer 2 level. To allow L2TP tunnels to passthrough the Router, keep the deault, Enabled.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 18: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 18/50

Chapter 3 Advanced Configuration

14Wireless-G Home Router with SpeedBurst

Access Restrictions > Internet Access

The Internet Access screen allows you to block or allowspeciic kinds o Internet usage and traic, such as Internetaccess, designated services, and websites during speciicdays and times.

Access Restrictions > Internet Access

Internet Access Policy

Access Policy Access can be managed by a policy. Usethe settings on this screen to establish an access policy(ater Save Settings is clicked). Selecting a policy romthe drop-down menu will display that policy’s settings. Todelete a policy, select that policy’s number and click DeleteThis Entry. To view all the policies, click Summary.

SummaryThe policies are listed with the ollowing inormation: No.,Policy Name, Days, and Time o Day. To delete a policy,select the policy’s Delete option, and then click  Delete.To return to the Internet Access Policy screen, click Close.

Summary

Status Policies are disabled by deault. To enable a policy,select the policy number rom the drop-down menu, andselect Enabled.

To create a policy, ollow steps 1-11. Repeat these steps tocreate additional policies, one at a time.

1. Select a number rom the  Access Policy  drop-downmenu.

2. Enter a Policy Name in the ield provided.

3. To enable this policy, select Enabled.

4. Click  Edit List to select which computers will be

affected by the policy. The Internet Access PC List screen

appears. You can select a computer by MAC address or

IP address. You can also enter a range of IP addresses

if you want this policy to affect a group of computers.

After making your changes, click  Save Settings toapply your changes, or click  Cancel Changes to clear

your changes. Then click Close. 

Internet Access PC List

loaded from www.Manualslib.com manuals search engine 

Page 19: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 19/50

Chapter 3 Advanced Configuration

15Wireless-G Home Router with SpeedBurst

5. Select the appropriate option, Deny or Allow,depending on whether you want to block or allowInternet access or the computers you listed on theInternet Access PC List screen.

6. Decide which days and what times you want this policyto be enorced. Select the individual days during which

the policy will be in eect, or select Everyday. Thenenter a range o hours and minutes during which thepolicy will be in eect, or select 24 Hours.

7. You can block websites with speciic URL addresses.Enter each URL in a separate Website Blocking by URL

 Address ield.

8. You can also block websites using speciic keywords.Enter each keyword in a separate Website Blocking by 

Keyword ield.

9. You can ilter access to various services accessedover the Internet, such as FTP or telnet. (Youcan block up to three applications per policy.)

From the Applications list, select the application youwant to block. Then click the >> button to move it tothe Blocked List. To remove an application rom theBlocked List, select it and click the << button.

10. I the application you want to block is not listed or youwant to edit a service’s settings, enter the application’sname in the Application Name ield. Enter its rangein the Port Range ields. Select its protocol rom theProtocol drop-down menu. Then click Add.

To modiy a service, select it rom the Application list.Change its name, port range, and/or protocol setting.

Then click Modify.To delete a service, select it rom the Application list.Then click Delete.

11. Click  Save Settings to save the policy’s settings, orclick Cancel Changes to clear the changes.

Applications and Gaming > Single Port

Forwarding

 The Single Port Forwarding screen allows you to customize

port services for common applications on this screen.

When users send these types of requests to your network viathe Internet, the Router will forward those requests to the

appropriate servers (computers). Before using forwarding,

you should assign static IP addresses to the designated

servers (use the DHCP Reservation feature on the Basic Setup 

screen; refer to DHCP Reservation, page 7).

Applications and Gaming > Single Port Forwarding

Single Port Forwarding

Common applications are available or the irst iveentries. Select the appropriate application. Then enter theIP address o the server that should receive these requests.Select Enabled to activate this entry.

For additional applications, complete the ollowing ields:

Application Name Enter the name you wish to give theapplication. Each name can be up to 12 characters.

External Port Enter the external port number used by

the server or Internet application. Check with the Internetapplication documentation or more inormation.

Internal Port Enter the internal port number used bythe server or Internet application. Check with the Internetapplication documentation or more inormation.

Protocol Select the protocol(s) used or this application,TCP, UDP, or Both.

To IP Address For each application, enter the IP addresso the computer that should receive the requests. I youassigned a static IP address to the computer, then youcan look up its IP address; click DHCP Reservation on theBasic Setup screen (refer to DHCP Reservation, page 7).

Enabled For each application, select Enabled to enableport orwarding.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 20: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 20/50

Chapter 3 Advanced Configuration

16Wireless-G Home Router with SpeedBurst

Applications and Gaming > Port Range

Forwarding

 The Port Range Forwarding screen allows you to set up

public services on your network, such as web servers,

ftp servers, e-mail servers, or other specialized Internet

applications. (Specialized Internet applications are anyapplications that use Internet access to perform functions

such as videoconferencing or online gaming. Some Internet

applications may not require any forwarding.)

When users send these types of requests to your network via

the Internet, the Router will forward those requests to the

appropriate servers (computers). Before using forwarding,

you should assign static IP addresses to the designated

servers (use the DHCP Reservation feature on the Basic Setup 

screen; refer to DHCP Reservation, page 7).

If you need to forward all ports to one computer, click the

DMZ tab.

Applications and Gaming > Port Range Forwarding

Port Range Forwarding

To orward a port, enter the inormation on each line orthe criteria required.

Application Name In this ield, enter the name youwish to give the application. Each name can be up to 12characters.

Start~End Port Enter the number or range o port(s)used by the server or Internet applications. Check with theInternet application documentation or more inormation.

Protocol Select the protocol(s) used or this application,TCP, UDP, or Both.

To IP Address For each application, enter the IP addresso the computer that should receive the requests. I youassigned a static IP address to the computer, then youcan look up its IP address; click DHCP Reservation on theBasic Setup screen (refer to DHCP Reservation, page 7).

Enabled Select Enabled to enable port orwarding orthe applications you have deined.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Applications & Gaming > Port Range

Triggering

The Port Range Triggering screen allows the Router towatch outgoing data or speciic port numbers. The IPaddress o the computer that sends the matching data isremembered by the Router, so that when the requesteddata returns through the Router, the data is pulled back to the proper computer by way o IP address and portmapping rules.

Applications and Gaming > Port Range Triggering

Port Range Triggering

Application Name Enter the application name o thetrigger.

Triggered Range For each application, enter the startingand ending port numbers o the triggered port numberrange. Check with the Internet application documentationor the port number(s) needed.

Forwarded Range For each application, enter thestarting and ending port numbers o the orwardedport number range. Check with the Internet applicationdocumentation or the port number(s) needed.

Enabled Select Enabled to enable port triggering or theapplications you have deined.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 21: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 21/50

Chapter 3 Advanced Configuration

17Wireless-G Home Router with SpeedBurst

Applications and Gaming > DMZ

The DMZ eature allows one network computer to beexposed to the Internet or use o a special-purposeservice such as Internet gaming or videoconerencing.DMZ hosting orwards all the ports at the same time to

one computer. The Port Range Forwarding eature is moresecure because it only opens the ports you want to haveopened, while DMZ hosting opens all the ports o onecomputer, exposing the computer to the Internet.

Applications and Gaming > DMZ

DMZ

Any computer whose port is being orwarded must haveits DHCP client unction disabled and should have a newstatic IP address assigned to it because its IP address maychange when using the DHCP unction.

Enabled/Disabled To disable DMZ hosting, selectDisabled. To expose one computer, select Enabled. Thenconigure the ollowing settings:

Source IP Address I you want any IP address to be thesource, select Any IP Address. I you want to speciy an IPaddress or range o IP addresses as the designated source,select and complete the IP address range ields.

Destination I you want to speciy the DMZ host by IP

address, select IP Address and enter the IP address inthe ield provided. I you want to speciy the DMZ hostby MAC address, select MAC Address and enter the MACaddress in the ield provided. To retrieve this inormation,click DHCP Client Table.

DMZ > DHCP Client Table

DHCP Client Table

The DHCP Client Table lists computers and otherdevices that have been assigned IP addresses by theRouter. The list can be sorted by Client Name, Interace,IP Address, MAC Address, and Expires time (howmuch time is let or the current IP address). To selecta DHCP client, click  Select. To update the on-screen

inormation, click  Refresh. To exit this screen andreturn to the DMZ screen, click Close.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 22: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 22/50

Chapter 3 Advanced Configuration

18Wireless-G Home Router with SpeedBurst

Administration > Management

The  Administration > Management  screen allows thenetwork’s administrator to manage speciic Routerunctions or access and security.

Administration > Management

Management

Router Access

To ensure the Router’s security, you will be asked or yourpassword when you access the Router’s browser-basedutility. The deault is admin.

Router Password Enter a new password or the Router.

Re-enter to Confirm Enter the password again to confirm.

Local Management Access

Access via Wireless I you are using the Router in a publicdomain where you are giving wireless access to yourguests, you can disable wireless access to the Router’sbrowser-based utility. You will only be able to access theutility via a wired connection i you disable the setting.Keep the deault, Enabled, to allow wireless access to the

utility, or select Disabled to block wireless access to theutility.

Remote Management Access

Remote Management To permit remote access o theRouter, rom outside the local network, select Enabled.Otherwise, keep the deault, Disabled.

Remote Upgrade I you want to be able to upgrade theRouter remotely, rom outside the local network, selectEnabled. (You must have the Remote Management

eature enabled as well.) Otherwise, keep the deault,Disabled.

Allowed Remote IP Address I you want to be able toaccess the Router rom any external IP address, select AnyIP Address. I you want to speciy an external IP address orrange o IP addresses, then select the second option and

complete the ields provided.

Remote Management Port Enter the port number thatwill be open to outside access.

NOTE: When you are in a remote locationand wish to manage the Router, enterhttp://xxx.xxx.xxx.xxx:yyyy orhttps://xxx.xxx.xxx.xxx:yyyy , dependingon whether you use HTTP or HTTPS. Enter theRouter’s speciic Internet IP address in placeo xxx.xxx.xxx.xxx, and enter the RemoteManagement Port number in place o yyyy.

UPnP

Universal Plug and Play (UPnP) allows the appropriateWindows operating system to automatically conigure theRouter or various Internet applications, such as gamingand videoconerencing.

UPnP To use UPnP, keep the deault, Enabled. Otherwise,select Disabled.

Allow Users to Configure Keep the deault, Enabled,i you want to be able to make manual changes to theRouter while using the UPnP eature. Otherwise, select

Disabled.

Allow Users to Disable Internet Access Select Enabled,i you want to be able to prohibit any and all Internetconnections. Otherwise, keep the deault, Disabled.

Backup and Restore

Backup Configuration To back up the Router’sconiguration settings, click this button and ollow theon-screen instructions.

Restore Configuration To restore the Router’sconiguration settings, click this button and ollow the

on-screen instructions. ( You must have previously backedup the Router’s coniguration settings.)

System Reboot

Start to Reboot I you need to restart the Router, click this button.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

loaded from www.Manualslib.com manuals search engine 

Page 23: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 23/50

Chapter 3 Advanced Configuration

19Wireless-G Home Router with SpeedBurst

Administration > Log

The Router can keep logs o all traic or your Internetconnection.

Administration > Log

Log

Enabled/Disabled To disable the Log unction, selectDisabled. To monitor traic between the network and theInternet, keep the deault, Enabled. With logging enabled,you can choose to view temporary logs.

View Log To view the logs, click View Log.

Log > View Log

Log

 • Type Select Incoming Log, Outgoing Log, SecurityLog, or DHCP Client Log.

• <Type> Log The Incoming Log displays a temporarylog o the source IP addresses and destinationport numbers or the incoming Internet traic. TheOutgoing Log displays a temporary log o the local IPaddresses, destination URLs/IP addresses, and service/port numbers or the outgoing Internet traic. The

Security log displays the login inormation or thebrowser-based utility. The DHCP Client Log displaysthe LAN DHCP server status inormation.

Click Save the Log to save this inormation to a ile onyour computer’s hard drive. Click  Refresh to updatethe log. Click Clear to clear all the inormation that isdisplayed.

Click Save Settings to apply your changes, or click CancelChanges to clear your changes.

Administration > Diagnostics

The diagnostic tests (Ping and Traceroute) allow you tocheck the connections o your network devices, includingconnection to the Internet.

Administration > Diagnostics

Diagnostics

Ping Test

Ping checks the status o a connection.

IP or URL Address Enter the address o the computerwhose connection you wish to test.

Packet Size Enter the packet size you want to use. Thedeault is 32 bytes.

Number to Ping Enter the number o times you wish totest the connection. The deault is 5.

Start to Ping To run the test, click this button. The Ping

screen shows i the test is successul. Click Close to returnto the Diagnostics screen.

Diagnostics > Ping

Traceroute Test

Traceroute checks the perormance o a connection.

IP or URL Address Enter the address o the computerwhose connection you wish to test.

loaded from www.Manualslib.com manuals search engine 

Page 24: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 24/50

Chapter 3 Advanced Configuration

20Wireless-G Home Router with SpeedBurst

Start to Traceroute To run the test, click this button.The Traceroute screen shows i the test is successul. Click Close to return to the Diagnostics screen.

Diagnostics > Traceroute

Administration > Factory DeaultsRestore the Router to its actory deault settings.

Administration > Factory Deaults

NOTE: Do not restore the actory deaults unlessyou are having diiculties with the Router andhave exhausted all other troubleshootingmeasures. Once the Router is reset, you will haveto re-enter all o your coniguration settings.

Factory Deaults

Restore All Settings To reset the Router’s settings to thedeaults, click this button and then ollow the on-screeninstructions. Any custom settings you have saved will belost when the deault settings are restored.

Administration > Firmware Upgrade

 The Firmware Upgrade screen allows you to upgrade the

Router’s firmware. Do not upgrade the firmware unless

you are experiencing problems with the Router or the new

firmware has a feature you want to use.

Administration > Firmware Upgrade

NOTE: The Router may lose the settings youhave customized. Beore you upgrade itsirmware, write down all o your custom settings.Ater you upgrade its irmware, you may have tore-enter all o your coniguration settings.

Firmware Upgrade

Beore upgrading the irmware, download the Router’sirmware upgrade ile rom the Linksys website,www.linksysbycisco.com.

Please select a file to upgrade To select the irmwareupgrade ile, click  Browse and ollow the on-screeninstructions.

Start to Upgrade Ater you have selected theappropriate ile, click this button, and  ollow the on-screen

instructions.

 WARNING: The irmware upgrade must not

be interrupted; do not reboot or power o theRouter during the irmware upgrade.

loaded from www.Manualslib.com manuals search engine 

Page 25: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 25/50

Chapter 3 Advanced Configuration

21Wireless-G Home Router with SpeedBurst

Status > Router

The Router screen displays inormation about the Routerand its current settings.

Status > Router

Router Inormation

Firmware Version The version number o the Router’scurrent irmware is displayed.

Firmware Verification The unique identiier o theirmware is displayed.

Current Time The time set on the Router is displayed.

Internet MAC Address The Router’s MAC Address, as

seen by your ISP, is displayed.Host Name The Host Name o the Router is displayed (i itwas entered on the Setup > Basic Setup screen).

Domain Name The Domain Name o the Router isdisplayed (i it was entered on the Setup > Basic Setup screen).

Internet Connection

This section shows the current network inormationstored in the Router. The inormation varies depending onthe Internet connection type selected on the Setup > Basic 

Setup screen.

For a DHCP connection, select Release IP Address orRenew IP Address as appropriate to release or renewa DHCP lease. For a PPPoE or similar connection, selectConnect or Disconnect as appropriate to connect to ordisconnect rom the Internet.

Click Refresh to update the on-screen inormation.

Status > Local Network

The Local Network  screen displays inormation about thelocal, wired network.

Status > Local Network 

Local NetworkLocal MAC Address The MAC address o the Router’slocal, wired interace is displayed.

Router IP Address The Router’s IP address, as it appearson your local network, is displayed.

Subnet Mask  The Subnet Mask o the Router isdisplayed.

DHCP Server

DHCP Server The status o the Router’s DHCP serverunction is displayed.

Start IP Address For the range o IP addresses that canbe used by devices on your local network, the starting IPaddress is displayed.

End IP Address For the range o IP addresses that canbe used by devices on your local network, the ending IPaddress is displayed.

DHCP Clients Table Click this button to view a list o computers or other devices that are using the Router asa DHCP server.

loaded from www.Manualslib.com manuals search engine 

Page 26: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 26/50

Chapter 3 Advanced Configuration

22Wireless-G Home Router with SpeedBurst

DHCP Clients Table

DHCP Client Table

The DHCP Client Table lists computers and otherdevices that have been assigned IP addresses by theRouter. The list can be sorted by IP Address, MACAddress, Interace, and Client Name. To remove aDHCP client, click  Delete. To update the on-screeninormation, click  Refresh. To exit this screen and

return to the Local Network screen, click Close.

Status > Wireless Network

The Wireless Network  screen displays inormation aboutyour wireless network.

Status > Wireless

Wireless Network

MAC Address The MAC address o the Router’s local,wireless interace is displayed.

Mode The wireless mode used by the network isdisplayed.

Network Name (SSID) The name o the wireless network,which is also called the SSID, is displayed.

Standard Channel The Standard Channel setting(selected on the Wireless > Basic Wireless Settings screen)is displayed.

Security The wireless security method used by theRouter is displayed.

SSID Broadcast The status o the SSID Broadcast eatureis displayed.

loaded from www.Manualslib.com manuals search engine 

Page 27: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 27/50

Appendix A Troubleshooting

23Wireless-G Home Router with SpeedBurst

Appendix A:Troubleshooting

Your computer cannot connect to the Internet.

Follow these instructions until your computer can connectto the Internet:

 • Make sure that the Router is powered on. The PowerLED should be lit and not lashing.

 • I the Power LED is lashing, then power o all o your network devices, including the modem, Router,and computers. Then power on each device in theollowing order:

1. Cable or DSL modem

2. Router

3. Computer • Check the cable connections. The computer should

be connected to one o the ports numbered 1-4 onthe Router, and the modem must be connected to theInternet port on the Router.

The modem does not have an Ethernet port.

The modem is a dial-up modem or traditional dial-upservice. To use the Router, you need a cable/DSL modemand high-speed Internet connection.

You cannot use the DSL service to connect manually to

the Internet.

Ater you have installed the Router, it will automaticallyconnect to your Internet Service Provider (ISP), so you nolonger need to connect manually.

The DSL telephone line does not ft into the Router’s

Internet port.

The Router does not replace your modem. You still needyour DSL modem in order to use the Router. Connect thetelephone line to the DSL modem, and then insert thesetup CD into your computer. Click Setup and ollow theon-screen instructions.

When you double-click the web browser, you are

 prompted or a username and password. I you want to

get rid o the prompt, ollow these instructions.

Launch the web browser and perorm the ollowing steps(these steps are speciic to Internet Explorer but are similaror other browsers):

1. Select Tools > Internet Options.

2. Click the Connections tab.

3. Select Never dial a connection.

4. Click OK.

The Router does not have a coaxial port or the cable

connection.

The Router does not replace your modem. You still needyour cable modem in order to use the Router. Connect

your cable connection to the cable modem, and theninsert the setup CD into your computer. Click  Setup andollow the on-screen instructions.

The computer cannot connect wirelessly to the network.

Make sure the wireless network name or SSID is the sameon both the computer and the Router. I you have enabledwireless security, then make sure the same securitymethod and key are used by both the computer and theRouter.

You need to modiy the settings on the Router.

Open the web browser (or example, Internet Explorer orFireox), and enter the Router’s IP address in the addressield (the deault IP address is 192.168.1.1). Whenprompted, enter the password to the Router (the deault isadmin). Click the appropriate tab to change the settings.

WEB: I your questions are not addressedhere, reer to the Linksys website,www.linksysbycisco.com

loaded from www.Manualslib.com manuals search engine 

Page 28: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 28/50

Appendix B Specifications

24Wireless-G Home Router with SpeedBurst

Appendix B:SpecificationsModel WRT54GH

Standards IEEE 802.3, IEEE 802.3u,IEEE 802.11g, IEEE 802.11b

Ports Power, Internet, Ethernet (1-4)

Buttons Power, Reset

LEDs Power, Internet, Wireless,Ethernet (1-4)

Modulations 802.11b: CCK, QPSK, BPSK 802.11g: OFDM

RF Pwr (EIRP) in dBm 802.11g: Typ. 14 +/- 1.5 dBm @Normal Temp802.11b: Typ: 17.5 +/- 1.5 dBm @Normal Temp

Receive Sensitivityin dBm 1 Mbps: -93 Typical @ 8% PER

11 Mbps: -82 dBm Typical @8% PER54 Mbps: -68 dBm Typical @10% PER

# o Antennas One Internal PIFA Antenna

Antenna Gain in dBi PIFA<= 3 dBi

UPnP Supported

Security Features WEP (64 and 128), WPA-Personal,WPA2-Personal

Security Key Bits Up to 128-Bit Encryption

Environmental

Dimensions 4.33" x 1.26" x 4.33"(110 x 32 x 110 mm)

Unit Weight 6.0 oz (170 g)

Power 12V, 0.5A

Certifcations FCC, IC, CE, Wi-Fi b/g

Operating Temp. 0 to 40°C (32 to 104°F)

Storage Temp. -20 to 60°C (-4 to 140°F)

Operating Humidity 10 to 80%, Noncondensing

Storage Humidity 5 to 90% Noncondensing

Specifcations are subject to change without notice.

loaded from www.Manualslib.com manuals search engine 

Page 29: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 29/50

Appendix C Warranty Information

25Wireless-G Home Router with SpeedBurst

Appendix C:Warranty Information

Limited Warranty

FOR CONSUMERS WHO ARE COVERED BY CONSUMERPROTECTION LAWS OR REGULATIONS IN THEIR COUNTRYOF PURCHASE OR, IF DIFFERENT, THEIR COUNTRY OFRESIDENCE, THE BENEFITS CONFERRED BY THIS WARRANTYARE IN ADDITION TO ALL RIGHTS AND REMEDIESCONVEYED BY SUCH CONSUMER PROTECTION LAWS ANDREGULATIONS. THIS WARRANTY DOES NOT EXCLUDE,LIMIT OR SUSPEND ANY RIGHTS OF CONSUMERS ARISINGOUT OF NONCONFORMITY WITH A SALES CONTRACT.SOME COUNTRIES, STATES AND PROVINCES DO NOTALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL ORCONSEQUENTIAL DAMAGES OR ALLOW LIMITATIONS ON

HOW LONG AN IMPLIED WARRANTY OR CONDITION MAYLAST, SO THE LIMITATIONS OR EXCLUSIONS DESCRIBEDBELOW MAY NOT APPLY TO YOU. THIS WARRANTY GIVESYOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSOHAVE OTHER RIGHTS THAT VARY BY COUNTRY, STATE ORPROVINCE. THIS LIMITED WARRANTY IS GOVERNED BYAND CONSTRUED UNDER THE LAWS OF THE COUNTRY INWHICH THE PRODUCT PURCHASE TOOK PLACE.

Linksys warrants the hardware in this Linksys productagainst deects in materials and workmanship undernormal use or the Warranty Period, which begins on thedate o purchase by the original end-user purchaser and

lasts or the period speciied below: • One (1) year or new product

 • Ninety (90) days or reurbished product

Your exclusive remedy and Linksys’ entire liability underthis limited warranty will be or Linksys, at its option, to(a) repair the product with new or reurbished parts,(b) replace the product with a reasonably availableequivalent new or reurbished Linksys product, or (c)reund the purchase price o the product less any rebates.Any repaired or replacement products will be warrantedor the remainder o the original Warranty Period or thirty(30) days, whichever is longer. All products and parts that

are replaced become the property o Linksys.

Linksys additionally warrants that any media on whichthe sotware may be provided will be ree rom deects inmaterials and workmanship under normal use or a periodo ninety (90) days rom the date o original purchase.Your exclusive remedy and Linksys’ entire liability underthis limited warranty will be or Linksys, at its option, to(a) replace the sotware media, or (b) reund the purchaseprice o the sotware media.

Exclusions and Limitations

This limited warranty does not apply i: (a) the productassembly seal has been removed or damaged, (b) theproduct has been altered or modiied, except by Linksys,(c) the product damage was caused by use with non-Linksys products, (d) the product has not been installed,operated, repaired, or maintained in accordance withinstructions supplied by Linksys, (e) the product hasbeen subjected to abnormal physical or electrical stress,misuse, negligence, or accident, () the serial number onthe Product has been altered, deaced, or removed, or (g)the product is supplied or licensed or beta, evaluation,testing or demonstration purposes or which Linksys doesnot charge a purchase price or license ee.

EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SETFORTH ABOVE AND TO THE MAXIMUM EXTENT PERMITTEDBY APPLICABLE LAW, ALL SOFTWARE AND SERVICESPROVIDED BY LINKSYS WITH THE PRODUCT, WHETHER

FACTORY LOADED ON THE PRODUCT OR CONTAINED ONMEDIA ACCOMPANYING THE PRODUCT, IS PROVIDED “ASIS” WITHOUT WARRANTY OF ANY KIND. Without limitingthe oregoing, Linksys does not warrant that the operationo the product, sotware or services will be uninterruptedor error ree. Also, due to the continual developmento new techniques or intruding upon and attackingnetworks, Linksys does not warrant that the product,sotware or services, or any equipment, system or network on which the product, sotware or services are used willbe ree o vulnerability to intrusion or attack. The productmay include or be bundled with third party sotware orservice oerings. This limited warranty shall not apply tosuch third party sotware or service oerings. This limitedwarranty does not guarantee any continued availabilityo a third party’s service or which this product’s use oroperation may require.

TO THE EXTENT NOT PROHIBITED BY APPLICABLELAW, ALL IMPLIED WARRANTIES AND CONDITIONSOF MERCHANTABILITY, SATISFACTORY QUALITY ORFITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TOTHE DURATION OF THE WARRANTY PERIOD. ALL OTHEREXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONSAND WARRANTIES, INCLUDING BUT NOT LIMITED TOANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE

DISCLAIMED.

TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, INNO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA,REVENUE OR PROFIT, LOSS OF THE ABILITY TO USE ANYTHIRD PARTY PRODUCTS, SOFTWARE OR SERVICES, ORFOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTALOR PUNITIVE DAMAGES, REGARDLESS OF THE THEORYOF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUTOF OR RELATED TO THE USE OF OR INABILITY TO USETHE PRODUCT, SOFTWARE OR ANY SERVICES PROVIDEDIN RESPECT OF SUCH PRODUCT, SOFTWARE OR SERVICE,EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY

loaded from www.Manualslib.com manuals search engine 

Page 30: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 30/50

Appendix C Warranty Information

26Wireless-G Home Router with SpeedBurst

OF SUCH DAMAGES. TO THE EXTENT NOT PROHIBITED BYAPPLICABLE LAW, IN NO EVENT WILL LINKSYS’ LIABILITYEXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.The oregoing limitations will apply even i any warrantyor remedy provided under this limited warranty ails o itsessential purpose.

No Linksys employee, agent or reseller is authorized tomake any verbal or written modiication, extension oraddition to this warranty, and Linksys expressly disclaimsany such change to this warranty. I any portion o thislimited warranty is ound to be void or unenorceable, itsremaining provisions shall remain in ull orce and eect.

Obtaining Warranty Service

I you have a question about your productor experience a problem with it, please go towww.linksysbycisco.com/support where you will ind avariety o online support tools and inormation to assist

you with your product. I the product proves deectiveduring the Warranty Period, contact Linksys TechnicalSupport (or, i you purchased your product rom a serviceprovider, contact the service provider) or instructions onhow to obtain warranty service. The telephone numberor Linksys Technical Support in your area can be oundby clicking the “Contact Us” link on the home page o www.linksysbycisco.com. Have your product serialnumber and proo o purchase on hand when calling. ADATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TOPROCESS WARRANTY CLAIMS. I you are requested toreturn your product, you will be given a Return MaterialsAuthorization (RMA) number. You are responsible or

properly packaging and shipping your product at yourcost and risk. You must include the RMA number anda copy o your dated proo o original purchase whenreturning your product. Products received without aRMA number and dated proo o original purchase willbe rejected. Do not include any other items with theproduct you are returning. Deective product coveredby this limited warranty will be repaired or replaced andreturned to you without charge. Customers outside o the United States o America and Canada are responsibleor all shipping and handling charges, custom duties,VAT and other associated taxes and charges. Repairs orreplacements not covered under this limited warranty willbe subject to charge at Linksys’ then-current rates.

Technical Support

This limited warranty is neither a service nor asupport contract. Inormation about Linksys’ currenttechnical support oerings and policies (includingany ees or support services) can be ound atwww.linksysbycisco.com/support.

Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,CA 92623.

loaded from www.Manualslib.com manuals search engine 

Page 31: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 31/50

Appendix D Regulatory Information

27Wireless-G Home Router with SpeedBurst

Appendix D:Regulatory Information

FCC Statement

This device complies with Part 15 o the FCC Rules.Operation is subject to the ollowing two conditions: (1)This device may not cause harmul intererence, and (2) thisdevice must accept any intererence received, includingintererence that may cause undesired operation.

This product has been tested and complies with thespeciications or a Class B digital device, pursuant to Part15 o the FCC Rules. These limits are designed to providereasonable protection against harmul intererence ina residential installation. This equipment generates,uses, and can radiate radio requency energy and, i notinstalled and used according to the instructions, maycause harmul intererence to radio communications.However, there is no guarantee that intererence will notoccur in a particular installation. I this equipment doescause harmul intererence to radio or television reception,which is ound by turning the equipment o and on, theuser is encouraged to try to correct the intererence byone or more o the ollowing measures:

 • Reorient or relocate the receiving antenna

 • Increase the separation between the equipment ordevices

 • Connect the equipment to an outlet other than the

receiver’s

 • Consult a dealer or an experienced radio/TV technicianor assistance

FCC Caution: Any changes or modiications not expresslyapproved by the party responsible or compliance couldvoid the user’s authority to operate this equipment.

FCC Radiation Exposure Statement

This equipment complies with FCC radiation exposurelimits set orth or an uncontrolled environment. Thisequipment should be installed and operated with

minimum distance 20 cm between the radiator and yourbody.

This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter. IEEE802.11b or 802.11g operation o this product in the USA isirmware-limited to channels 1 through 11.

Saety Notices

 WARNING: Do not use this product near water,or example, in a wet basement or near aswimming pool.

 WARNING: Avoid using this product during anelectrical storm. There may be a remote risk o electric shock rom lightning.

 WARNING: This product contains lead, knownto the State o Caliornia to cause cancer, andbirth deects or other reproductive harm. Washhands ater handling.

Industry Canada StatementThis Class B digital apparatus complies with CanadianICES-003 and RSS210.

Operation is subject to the ollowing two conditions:

1. This device may not cause intererence and

2. This device must accept any intererence, includingintererence that may cause undesired operation o the device.

Industry Canada Radiation Exposure Statement:

This equipment complies with IC radiation exposure limits

set orth or an uncontrolled environment. This equipmentshould be installed and operated with minimum distance20 cm between the radiator & your body.

This transmitter must not be co-located or operating inconjunction with any other antenna or transmitter.

loaded from www.Manualslib.com manuals search engine 

Page 32: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 32/50

Appendix D Regulatory Information

28Wireless-G Home Router with SpeedBurst

Avis d’Industrie Canada

Cet appareil numérique de la classe B est conorme auxnormes NMB-003 et RSS210 du Canada.

L’utilisation de ce dispositi est autorisée seulement auxconditions suivantes :

1. il ne doit pas produire de brouillage et

2. il doit accepter tout brouillage radioélectrique reçu,même si ce brouillage est susceptible de compromettrele onctionnement du dispositi.

Avis d’Industrie Canada concernant l’exposition

aux radioréquences :

Ce matériel est conorme aux limites établies par ICen matière d’exposition aux radioréquences dans unenvironnement non contrôlé. Ce matériel doit être installéet utilisé à une distance d’au moins 20 cm entre l’antenne

et le corps de l’utilisateur.L’émetteur ne doit pas être placé près d’une autre antenneou d’un autre émetteur, ou onctionner avec une autreantenne ou un autre émetteur.

Wireless Disclaimer

The maximum perormance or wireless is derived romIEEE Standard 802.11 speciications. Actual perormancecan vary, including lower wireless network capacity,data throughput rate, range and coverage. Perormance

depends on many actors, conditions and variables,including distance rom the access point, volume o network traic, building materials and construction,operating system used, mix o wireless products used,intererence and other adverse conditions.

Avis de non-responsabilité concernant les

appareils sans il

Les perormances maximales pour les réseaux sans ilsont tirées des spéciications de la norme IEEE 802.11.Les perormances réelles peuvent varier, notammenten onction de la capacité du réseau sans il, du débit

de la transmission de données, de la portée et de lacouverture. Les perormances dépendent de acteurs,conditions et variables multiples, en particulier de ladistance par rapport au point d’accès, du volume du traicréseau, des matériaux utilisés dans le bâtiment et dutype de construction, du système d’exploitation et de lacombinaison de produits sans il utilisés, des interérenceset de toute autre condition déavorable.

loaded from www.Manualslib.com manuals search engine 

Page 33: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 33/50

Appendix D Regulatory Information

29Wireless-G Home Router with SpeedBurst

User Inormation or Consumer Products

Covered by EU Directive 2002/96/EC on

Waste Electric and Electronic Equipment

(WEEE)

This document contains important inormation or userswith regards to the proper disposal and recycling o Linksys products. Consumers are required to comply withthis notice or all electronic products bearing the ollowingsymbol:

English - Environmental Information for Customers inthe European UnionEuropean Directive 2002/96/EC requires that the equipmentbearing this symbol on the product and/or its packaging mustnot be disposed o with unsorted municipal waste. The symbolindicates that this product should be disposed o separatelyrom regular household waste streams. It is your responsibility todispose o this and other electric and electronic equipment viadesignated collection acilities appointed by the government orlocal authorities. Correct disposal and recycling will help preventpotential negative consequences to the environment andhuman health. For more detailed inormation about the disposal

o your old equipment, please contact your local authorities,waste disposal service, or the shop where you purchased theproduct.

Български (Bulgarian) - Информация относноопазването на околната среда за потребители вЕвропейския съюзЕвропейска директива 2002/96/EC изисква уредите, носещитози символ върху изделието и/или опаковката му, да несе изхвърля т с несортирани битови отпадъци. Символътобозначава, че изделието трябва да се изхвърля отделно отсметосъбирането на обикновените битови отпадъци. Вашае отговорността този и другите електрически и електронни

уреди да се изхвърлят в предварително определени отдържавните или общински органи специализирани пунктовеза събиране. Правилното изхвърляне и рециклиранеще спомогнат да се предотвратят евентуални вредни заоколната среда и здравето на населението последствия. Запо-подробна информация относно изхвърлянето на вашитестари уреди се обърнете към местните власти, службите засметосъбиране или магазина, от който сте закупили уреда.

Čeština (Czech) - Informace o ochraně životníhoprostředí pro zákazníky v zemích Evropské unieEvropská směrnice 2002/96/ES zakazuje, aby zařízení označenétímto symbolem na produktu anebo na obalu bylo likvidovános netříděným komunálním odpadem. Tento symbol udává,že daný produkt musí být likvidován odděleně od běžnéhokomunálního odpadu. Odpovídáte za likvidaci tohoto produktu

a dalších elektrických a elektronických zařízení prostřednictvímurčených sběrných míst stanovených vládou nebo místnímiúřady. Správná likvidace a recyklace pomáhá předcházetpotenciálním negativním dopadům na životní prostředí a lidskézdraví. Podrobnější inormace o likvidaci starého vybavení silaskavě vyžádejte od místních úřadů, podniku zabývajícího selikvidací komunálních odpadů nebo obchodu, kde jste produktzakoupili.

Dansk (Danish) - Miljøinformation for kunder i EUEU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol

på produktet og/eller emballagen ikke må bortskaes somusorteret kommunalt aald. Symbolet betyder, at dette produkt

skal bortskaes adskilt ra det almindelige husholdningsaald.Det er dit ansvar at bortskae dette og andet elektrisk ogelektronisk udstyr via bestemte indsamlingssteder udpegeta staten eller de lokale myndigheder. Korrekt bortskaelseog genvinding vil hjælpe med til at undgå mulige skader ormiljøet og menneskers sundhed. Kontakt venligst de lokalemyndigheder, renovationstjenesten eller den butik, hvor duhar købt produktet, angående mere detaljeret inormation ombortskaelse a dit gamle udstyr.

Deutsch (German) - Umweltinformation für Kundeninnerhalb der Europäischen UnionDie Europäische Richtlinie 2002/96/EC verlangt, dass technische

Ausrüstung, die direkt am Gerät und/oder an der Verpackung mitdiesem Symbol versehen ist , nicht zusammen mit unsortiertemGemeindeaball entsorgt werden dar. Das Symbol weist darau hin, dass das Produkt von regulärem Haushaltmüll getrenntentsorgt werden sollte. Es liegt in Ihrer Verantwortung, diesesGerät und andere elektrische und elektronische Geräte überdie daür zuständigen und von der Regierung oder örtlichenBehörden dazu bestimmten Sammelstellen zu entsorgen.Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,potentielle negative Folgen ür Umwelt und die menschlicheGesundheit zu vermeiden. Wenn Sie weitere Inormationen zurEntsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte andie örtlichen Behörden oder städtischen Entsorgungsdiensteoder an den Händler, bei dem Sie das Produkt erworben haben.

loaded from www.Manualslib.com manuals search engine 

Page 34: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 34/50

Appendix D Regulatory Information

30Wireless-G Home Router with SpeedBurst

Eesti (Estonian) - Keskkonnaalane informatsioonEuroopa Liidus asuvatele klientideleEuroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt onseadmeid, millel on tootel või pakendil käesolev sümbol ,keelatud kõrvaldada koos sorteerimata olmejäätmetega. Seesümbol näitab, et toode tuleks kõrvaldada eraldi tavalistestolmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva

 ja ka muud elektri- ja elektroonikaseadmed riigi või kohalikeametiasutuste poolt ette nähtud kogumispunktide kaudu.Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältidavõimalikke negatiivseid tagajärgi keskkonnale ning inimestetervisele. Vanade seadmete kõrvaldamise kohta täpsemainormatsiooni saamiseks võtke palun ühendust kohalikeametiasutustega, jäätmekäitlusirmaga või kauplusega, kust tetoote ostsite.

Español (Spanish) - Información medioambiental paraclientes de la Unión EuropeaLa Directiva 2002/96/CE de la UE exige que los equipos quelleven este símbolo en el propio aparato y/o en su embalaje

no deben eliminarse junto con otros residuos urbanos noseleccionados. El símbolo indica que el producto en cuestióndebe separarse de los residuos domésticos convencionales convistas a su eliminación. Es responsabilidad suya desechar este ycualesquiera otros aparatos eléctricos y electrónicos a través delos puntos de recogida que ponen a su disposición el gobierno ylas autoridades locales. Al desechar y reciclar correctamente estosaparatos estará contribuyendo a evitar posibles consecuenciasnegativas para el medio ambiente y la salud de las personas. Sidesea obtener inormación más detallada sobre la eliminaciónsegura de su aparato usado, consulte a las autoridades locales,al servicio de recogida y eliminación de residuos de su zona opregunte en la tienda donde adquirió el producto.

Ελληνικά (Greek) - Στοιχεία περιβαλλοντικήςπροστασίας για πελάτες εντός της ΕυρωπαϊκήςΈνωσηςΣύμφωνα με την Κοινοτική Οδηγία 2002/96/EC, ο εξοπλισμός πουφέρει αυτό το σύμβολο στο προϊόν ή/και τη συσκευασία τουδεν πρέπει να απορρίπτεται μαζί με τα μη διαχωρισμένα αστικάαπορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θαπρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακάαπορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντοςκαι άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω τωνκαθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων,οι οποίες ορίζονται από το κράτος ή τις αρμόδιες τοπικές αρχές.Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη

ενδεχόμενων αρνητικών επιπτώσεων στο περιβάλλον και τηνυγεία. Για περισσότερες πληροφορίες σχετικά με την απόρριψη του παλαιού σας εξοπλισμού, επικοινωνήστε με τις τοπικές αρχές, τις υπηρεσίες αποκομιδής απορριμμάτων ή το κατάστημα από το οποίο αγοράσατε το προϊόν.

Français (French) - Informations environnementalespour les clients de l’Union européenneLa directive européenne 2002/96/CE exige que l’équipementsur lequel est apposé ce symbole sur le produit et/ou sonemballage ne soit pas jeté avec les autres ordures ménagères. Cesymbole indique que le produit doit être éliminé dans un circuitdistinct de celui pour les déchets des ménages. Il est de votre

responsabilité de jeter ce matériel ainsi que tout autre matérielélectrique ou électronique par les moyens de collecte indiquéspar le gouvernement et les pouvoirs publics des collectivitésterritoriales. L’élimination et le recyclage en bonne et due ormeont pour but de lutter contre l’impact néaste potentiel de cetype de produits sur l’environnement et la santé publique. Pourplus d’inormations sur le mode d’élimination de votre ancienéquipement, veuillez prendre contact avec les pouvoirs publicslocaux, le service de traitement des déchets, ou l’endroit où vousavez acheté le produit.

Italiano (Italian) - Informazioni relative all’ambienteper i clienti residenti nell’Unione Europea

La direttiva europea 2002/96/EC richiede che le apparecchiaturecontrassegnate con questo simbolo sul prodotto e/osull’imballaggio non siano smaltite insieme ai riiuti urbaninon dierenziati. Il simbolo indica che questo prodotto nondeve essere smaltito insieme ai normali riiuti domestici. Èresponsabilità del proprietario smaltire sia questi prodotti siale altre apparecchiature elettriche ed elettroniche mediantele speciiche strutture di raccolta indicate dal governo o daglienti pubblici locali. Il corretto smaltimento ed il riciclaggioaiuteranno a prevenire conseguenze potenzialmente negativeper l’ambiente e per la salute dell’essere umano. Per ricevereinormazioni più dettagliate circa lo smaltimento delle vecchieapparecchiature in Vostro possesso, Vi invitiamo a contattare glienti pubblici di competenza, il servizio di smaltimento riiuti o il

negozio nel quale avete acquistato il prodotto.

Latviešu valoda (Latvian) - Ekoloģiska informācijaklientiem Eiropas Savienības jurisdikcijāDirektīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienotazīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkstizmest nešķirotā veidā kopā ar komunālajiem atkritumiem(tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmēto, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā arparastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šoun citas elektriskas un elektroniskas ierīces izmest atkritumos,izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, konodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos

un pārstrāde tiek veikta pareizi, tad mazinās iespējamaiskaitējums dabai un cilvēku veselībai. Sīkākas ziņas parnovecojuša aprīkojuma izmešanu atkritumos jūs varat saņemtvietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,kur iegādājāties šo izstrādājumu.

loaded from www.Manualslib.com manuals search engine 

Page 35: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 35/50

Appendix D Regulatory Information

31Wireless-G Home Router with SpeedBurst

Lietuvškai (Lithuanian) - Aplinkosaugos informacija,skirta Europos Sąjungos vartotojamsEuropos direktyva 2002/96/EC numato, kad įrangos, kuri irkurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį),negalima šalinti kartu su nerūšiuotomis komunalinėmisatliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirainuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad

ši ir kita elektros ar elektroninė įranga būtų šalinama per tamtikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimosistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengtagalimos žalos aplinkai ir žmonių sveikatai. Daugiau inormacijosapie jūsų senos įrangos šalinimą gali pateikti vietinės valdžiosinstitucijos, atliekų šalinimo tarnybos arba parduotuvės, kurioseįsigijote tą gaminį.

Malti (Maltese) - Informazzjoni Ambjentali għal Klijentifl-Unjoni EwropeaId-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun ih is-simbolu uq il-prodott u/jew uq l-ippakkjar ma jistax jintremama’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika

li dan il-prodott għandu jintrema separatament minn ma’ l-iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmidan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettronikupermezz ta’ aċilitajiet ta’ ġbir appuntati apposta mill-gvern jewmill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent ugħas-saħħa tal-bniedem. Għal aktar inormazzjoni dettaljatadwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattjalill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jewil-ħanut minn ejn xtrajt il-prodott.

Magyar (Hungarian) - Környezetvédelmi információ azeurópai uniós vásárlók számára

A 2002/96/EC számú európai uniós irányelv megkívánja, hogyazokat a termékeket, amelyeken, és/vagy amelyek csomagolásánaz alábbi címke megjelenik, tilos a többi szelektálatlan lakosságihulladékkal együtt kidobni. A címke azt jelöli, hogy az adotttermék kidobásakor a szokványos háztartási hulladékelszállításirendszerektõl elkülönített eljárást kell alkalmazni. Az Önelelõssége, hogy ezt, és más elektromos és elektronikusberendezéseit a kormányzati vagy a helyi hatóságok általkijelölt gyűjtõredszereken keresztül számolja el. A megelelõhulladékeldolgozás segít a környezetre és az emberi egészségrepotenciálisan ártalmas negatív hatások megelõzésében. Haelavult berendezéseinek elszámolásához további részletesinormációra van szüksége, kérjük, lépjen kapcsolatba a helyihatóságokkal, a hulladékeldolgozási szolgálattal, vagy azzal

üzlettel, ahol a terméket vásárolta.

Nederlands (Dutch) - Milieu-informatie voor klantenin de Europese UnieDe Europese Richtlijn 2002/96/EC schrijt voor dat apparatuur dieis voorzien van dit symbool op het product o de verpakking,niet mag worden ingezameld met niet-gescheiden huishoudelijk aval. Dit symbool geet aan dat het product apart moet wordeningezameld. U bent zel verantwoordelijk voor de vernietiging

van deze en andere elektrische en elektronische apparatuur via dedaarvoor door de landelijke o plaatselijke overheid aangewezeninzamelingskanalen. De juiste vernietiging en recycling vandeze apparatuur voorkomt mogelijke negatieve gevolgen voorhet milieu en de gezondheid. Voor meer inormatie over hetvernietigen van uw oude apparatuur neemt u contact op metde plaatselijke autoriteiten o avalverwerkingsdienst, o met dewinkel waar u het product hebt aangeschat.

Norsk (Norwegian) - Miljøinformasjon for kunder i EUEU-direktiv 2002/96/EF krever at utstyr med ølgende symbol

avbildet på produktet og/eller pakningen, ikke må kastessammen med usortert avall. Symbolet indikerer at dette

produktet skal håndteres atskilt ra ordinær avallsinnsamlingor husholdningsavall. Det er ditt ansvar å kvitte deg meddette produktet og annet elektrisk og elektronisk avall via egneinnsamlingsordninger slik myndighetene eller kommunenebestemmer. Korrekt avallshåndtering og gjenvinning vilvære med på å orhindre mulige negative konsekvenser ormiljø og helse. For nærmere inormasjon om håndtering avdet kasserte utstyret ditt, kan du ta kontakt med kommunen,en innsamlingsstasjon or avall eller butikken der du kjøpteproduktet.

Polski (Polish) - Informacja dla klientów w UniiEuropejskiej o przepisach dotyczących ochrony

środowiskaDyrektywa Europejska 2002/96/EC wymaga, aby sprzętoznaczony symbolem znajdującym się na produkcie i/lub jegoopakowaniu nie był wyrzucany razem z innymi niesortowanymiodpadami komunalnymi. Symbol ten wskazuje, że produktnie powinien być usuwany razem ze zwykłymi odpadami zgospodarstw domowych. Na Państwu spoczywa obowiązek wyrzucania tego i innych urządzeń elektrycznych orazelektronicznych w punktach odbioru wyznaczonych przez władzekrajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposóbi jego recykling pomogą zapobiec potencjalnie negatywnymkonsekwencjom dla środowiska i zdrowia ludzkiego. W celuuzyskania szczegółowych inormacji o usuwaniu starego sprzętu,prosimy zwrócić się do lokalnych władz, służb oczyszczania

miasta lub sklepu, w którym produkt został nabyty.

loaded from www.Manualslib.com manuals search engine 

Page 36: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 36/50

Appendix D Regulatory Information

32Wireless-G Home Router with SpeedBurst

Português (Portuguese) - Informação ambiental paraclientes da União EuropeiaA Directiva Europeia 2002/96/CE exige que o equipamentoque exibe este símbolo no produto e/ou na sua embalagemnão seja eliminado junto com os resíduos municipais nãoseparados. O símbolo indica que este produto deve sereliminado separadamente dos resíduos domésticos regulares.

É da sua responsabilidade eliminar este e qualquer outroequipamento eléctrico e electrónico através das instalaçõesde recolha designadas pelas autoridades governamentais oulocais. A eliminação e reciclagem correctas ajudarão a preveniras consequências negativas para o ambiente e para a saúdehumana. Para obter inormações mais detalhadas sobre aorma de eliminar o seu equipamento antigo, contacte asautoridades locais, os serviços de eliminação de resíduos ou oestabelecimento comercial onde adquiriu o produto.

Română (Romanian) - Informaţii de mediu pentruclienţii din Uniunea EuropeanăDirectiva europeană 2002/96/CE impune ca echipamentele care

prezintă acest simbol pe produs şi/sau pe ambalajul acestuia sănu ie casate împreună cu gunoiul menajer municipal. Simbolulindică aptul că acest produs trebuie să ie casat separat degunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţiacest produs şi alte echipamente electrice şi electronice prinintermediul unităţilor de colectare special desemnate de guvernsau de autorităţile locale. Casarea şi reciclarea corecte vor ajutala prevenirea potenţialelor consecinţe negative asupra sănătăţiimediului şi a oamenilor. Pentru mai multe inormaţii detaliatecu privire la casarea acestui echipament vechi, contactaţiautorităţile locale, serviciul de salubrizare sau magazinul de lacare aţi achiziţionat produsul.

Slovenčina (Slovak) - Informácie o ochrane životnéhoprostredia pre zákazníkov v Európskej úniiPodľa európskej smernice 2002/96/ES zariadenie s týmtosymbolom na produkte a/alebo jeho balení nesmie byť likvidované spolu s netriedeným komunálnym odpadom.Symbol znamená, že produkt by sa mal likvidovať oddeleneod bežného odpadu z domácností. Je vašou povinnosťoulikvidovať toto i ostatné elektrické a elektronické zariadeniaprostredníctvom špecializovaných zberných zariadení určenýchvládou alebo miestnymi orgánmi. Správna likvidácia a recykláciapomôže zabrániť prípadným negatívnym dopadom na životnéprostredie a zdravie ľudí. Ak máte záujem o podrobnejšieinormácie o likvidácii starého zariadenia, obráťte sa, prosím, namiestne orgány, organizácie zaoberajúce sa likvidáciou odpadov

alebo obchod, v ktorom ste si produkt zakúpili.

Slovenščina (Slovene) - Okoljske informacije za strankev Evropski unijiEvropska direktiva 2002/96/ES prepoveduje odlaganje opreme stem simbolom – na izdelku in/ali na embalaži z nesortiranimikomunalnimi odpadki. Ta simbol opozarja, da je treba izdelek zavreči ločeno od preostalih gospodinjskih odpadkov. Vašaodgovornost je, da to in preostalo električno in elektronsko

opremo oddate na posebna zbirališča, ki jih določijo državneustanove ali lokalne oblasti. S pravilnim odlaganjem inrecikliranjem boste preprečili morebitne škodljive vplive naokolje in zdravje ljudi. Če želite izvedeti več o odlaganju stareopreme, se obrnite na lokalne oblasti, odlagališče odpadkov alitrgovino, kjer ste izdelek kupili.

Suomi (Finnish) - Ympäristöä koskevia tietoja EU-alueen asiakkailleEU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämäsymboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoaei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään

tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittäätämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteetviemällä tuote tai tuotteet viranomaisten määräämäänkeräyspisteeseen. Laitteiston oikea hävittäminen estäämahdolliset kielteiset vaikutukset ympäristöön ja ihmistenterveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavastasaa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitämyymälästä, josta ostit tuotteen.

Svenska (Swedish) - Miljöinformation för kunder iEuropeiska unionenDet europeiska direktivet 2002/96/EC kräver att utrustning meddenna symbol på produkten och/eller örpackningen inte år

kastas med osorterat kommunalt avall. Symbolen visar att dennaprodukt bör kastas eter att den avskiljts rån vanligt hushållsavall.Det aller på ditt ansvar att kasta denna och annan elektrisk ochelektronisk utrustning på astställda insamlingsplatser utseddaav regeringen eller lokala myndigheter. Korrekt kassering ochåtervinning skyddar mot eventuella negativa konsekvenserör miljön och personhälsa. För mer detaljerad inormation omkassering av din gamla utrustning kontaktar du dina lokalamyndigheter, avallshanteringen eller butiken där du köpteprodukten.

WEB: For additional inormation, please visitwww.linksysbycisco.com

loaded from www.Manualslib.com manuals search engine 

Page 37: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 37/50

33

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

Appendix E: Software EndUser License Agreement

Cisco Products

This product rom Cisco Systems, Inc. or its subsidiarylicensing the Sotware instead o Cisco Systems, Inc.(“Cisco”) contains sotware (including irmware) originatingrom Cisco and its suppliers and may also contain sotwarerom the open source community.

Any sotware originating rom Cisco and its suppliers islicensed under the Cisco Sotware License Agreementcontained at Schedule 1 below. You may also be promptedto review and accept the Cisco Sotware License Agreementupon installation o the sotware. Separate terms andeatures o Network Magic, a Cisco Sotware product, areset orth in Schedule 2 below.

Any sotware rom the open source community is licensedunder the speciic license terms applicable to that sotwaremade available by Cisco at www.linksysbycisco.com/gpl or as provided or in Schedule 3 below. By using the Sotware,you acknowledge that you have reviewed such licenseterms and that you agree to be bound by the terms o such licenses. Where such speciic license terms entitleyou to the source code o such sotware, that sourcecode is available upon request at cost rom Cisco orat least three years rom the purchase date o thisproduct and may also be available or download romwww.linksysbycisco.com/gpl. For detailed license terms

and additional inormation on open source sotware inCisco products please look at the Cisco public web site at:www.linksysbycisco.com/gpl/ or Schedule 3 below asapplicable. I you would like a copy o the GPL or certainother open source code in this Sotware on a CD, Cisco willmail to you a CD with such code or $9.99 plus the cost o shipping, upon request.

THIS SOFTWARE END USER LICENSE AGREEMENT ISA LEGAL AGREEMENT BETWEEN YOU AND CISCO.READ IT CAREFULLY BEFORE INSTALLING AND USINGTHE SOFTWARE. IT PROVIDES A LICENSE TO USE THESOFTWARE AND CONTAINS WARRANTY INFORMATION

AND LIABILITY DISCLAIMERS. BY CHECKING THE “NEXT”BOX, DOWNLOADING, INSTALLING OR USING THESOFTWARE, OR USING THE PRODUCT CONTAINING THESOFTWARE, YOU ARE CONFIRMING YOUR ACCEPTANCEOF THE SOFTWARE AND CONSENTING TO BE BOUNDBY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALLOF THESE TERMS, THEN DO NOT CLICK ON THE “NEXT”BUTTON AND DO NOT DOWNLOAD, INSTALL OR USE THESOFTWARE. YOU MAY RETURN UNUSED SOFTWARE (OR,IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHERPRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUNDUP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO

THE RETURN PROCESS AND POLICIES OF THE PARTY FROMWHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.

IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN ASUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER,YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMSOF SERVICE” SET FORTH IN SCHEDULE 2 IF APPLICABLE.

Sotware Licenses

The sotware licenses applicable to sotwarerom Cisco are made available at the Cisco publicweb site at: www.linksysbycisco.com andwww.linksysbycisco.com/gpl/ respectively. For yourconvenience o reerence, a copy o the Cisco SotwareLicense Agreement and the main open source codelicenses used by Cisco in its products are contained in theSchedules below.

Schedule 1

Cisco Sotware License Agreement

License. Subject to the terms and conditions o thisAgreement, Cisco grants the original end user purchaser o the Sotware a nonexclusive license to (i) use the Sotwaresolely as embedded in, as a stand-alone application or(where authorized in the applicable documentation) orcommunication with such product, each solely at Cisco’sdiscretion; (ii) i the Sotware is purchased separatelyrom any Cisco Product, install the Sotware on personalcomputers within a single household or businesslocation according to the maximum number o licensesyou have purchased; and (iii) make one copy o theSotware in machine-readable orm and one copy o theDocumentation, solely or backup purposes. This licensemay not be sublicensed, and is not transerable exceptto a person or entity to which you transer ownership o the complete Cisco product containing the Sotware orcomplete Sotware product, provided you permanentlytranser all rights under this Agreement and do not retainany ull or partial copies o the Sotware, and the recipientagrees to the terms o this Agreement.

“Sotware” includes, and this Agreement will apply to (a)the sotware o Cisco or its suppliers purchased separatelyor provided in or with the applicable Cisco product, and

(b) any upgrades, updates, bug ixes or modiied versions(“Upgrades”) or backup copies o the Sotware suppliedto you by Cisco or an authorized reseller (whether or notor a ee), provided you already hold a valid license to theoriginal sotware and have paid any applicable ee or theUpgrade.

“Documentation” means all documentation and otherrelated materials supplied by Cisco to you pursuant to thisAgreement.

loaded from www.Manualslib.com manuals search engine 

Page 38: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 38/50

34

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

License Restrictions. Other than as set orth in thisAgreement, you may not (i) make or distribute copieso the Sotware or its related Documentation, orelectronically transer the Sotware or Documentationrom one computer to another or over a network; (ii) alter,merge, modiy, adapt, decrypt or translate the Sotware or

related Documentation, or decompile, reverse engineer,disassemble, or otherwise reduce the Sotware to ahuman-perceivable orm (except to the extent expresslypermitted by law notwithstanding this provision); (iii)share, sell, rent, lease, or sublicense the Sotware orrelated Documentation; (iv) modiy the Sotware or createderivative works based upon the Sotware; (v) i youmake a backup copy o the Sotware and Documentation,you must reproduce all copyright notices and any otherproprietary legends ound on the original Sotware andDocumentation; (vi) use the Sotware or managemento a business network with more than 8 computers; (vii)use the Sotware under any circumstances or competitive

evaluation, including developing competing sotware;(ix) to the extent permitted under applicable law, assign,sublicense or otherwise transer the Sotware unlessthe prospective assignee, sublicensee or transereeexpressly agrees to all the terms and conditions under thisAgreement.

The Sotware and Documentation contain trade secretsand/or copyrighted materials o Cisco or its suppliers. Youwill not disclose or make available such trade secrets orcopyrighted material in any orm to any third party.

In the event that you ail to comply with this Agreement,the license granted to you will automatically terminate,

at which time you must immediately (i) stop using theCisco Product in which the Sotware is embedded, or(ii) uninstall the Sotware and destroy all copies o theSotware and Documentation where the Sotware ispurchased separately. All other rights o both parties andall other provisions o this Agreement will survive thistermination.

Ownership. The Sotware and Documentation arelicensed and not sold to you by Cisco and the relevantthird parties set orth in Schedule 3. Cisco and its licensorsretain all right, title and interest, including all copyrightand intellectual property rights, in and to, the Sotware

and Documentation and all copies and portions thereo.All rights not speciically granted to you in this Agreementare reserved by Cisco and its licensors. Your use o anysotware product rom an entity other than Cisco that mayhave been recommended by Cisco is governed by suchsotware product’s end user license agreement.

Third Party Services, Links and Advertising. Cisco mayprovide rom within the Sotware links to websites orthird party sotware products. In addition, third partyservices may be provided with the Sotware which may besubject to terms and conditions rom the provider o theservice. Cisco makes no representations as to the quality,

suitability, unctionality, or legality o any sites or productsto which links may be provided or third party services, andyou hereby waive any claim you might have against Ciscowith respect to such sites or third party sotware productsor services. Your correspondence or business dealingswith, or participation in promotions o third parties ound

through the Sotware and any other terms, conditions,warranties, or representations associated with suchdealings, are solely between you and such third party. Youagree that Cisco is not responsible or liable or any lossor damage o any sort incurred as the result o any suchdealings or as the result o the presence o such third partylinks, products or services in the Cisco Sotware, and Ciscomay discontinue or modiy the services or links oered atany time.

Collection and Processing o Inormation. You agreethat Cisco and/or its ailiates may, rom time to time,collect and process inormation about your Cisco productand/or the Sotware and/or your use o either in order(i) to enable Cisco to oer you Upgrades; (ii) to providesupport and assistance with your product and/or theSotware; (iii) to ensure that your Cisco product and/orthe Sotware is being used in accordance with the termso this Agreement; (iv) to provide improvements to theway Cisco delivers technology to you and to other Ciscocustomers; (v) to provide reports regarding the statusand health o the network, including network traic andapplication usage; (vi) to enable Cisco to comply withthe terms o any agreements it has with any third partiesregarding your Cisco product and/or Sotware; and/or(vii) to enable Cisco to comply with all applicable laws

and/or regulations, or the requirements o any regulatoryauthority or government agency. Cisco and/ or its ailiatesmay collect and process this inormation provided that itdoes not identiy you personally. You agree that Cisco hasno responsibility or liability or the deletion o or ailure tostore any data or other inormation related to your Ciscoproduct, Sotware or related Services.

The reports eature o certain Sotware allows you tomonitor the activity o computers running the Sotware inyour home or small oice. You must activate this eature inorder to receive reports. I you activate the reports eature,you agree to the ollowing: (a) the Sotware tracks andmonitors the ollowing components and activities in yourhome or oice: network traic (e.g. megabytes per hour),application usage (the oreground window is tracked andthe time each application is in the oreground duringactive usage o the computer) and internet history. (b)For all computers on which reports eature is enabled, theabove inormation is transmitted to servers at Cisco and/or a third party at periodic intervals while the computeris online. This inormation is associated and stored withthe email address supplied by you when you activatedthe reports eature. This inormation is summarized intoa ormal report and is emailed to the identiied emailaddress. © Any computer on the network running the

loaded from www.Manualslib.com manuals search engine 

Page 39: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 39/50

35

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

Sotware can enable any other computer (on the sameprimary network) to generate reports. When a computeris enabled, that computer shows a notiication that it isbeing monitored. As long as that computer is enabled,each time the Sotware is started the user o that particularcomputer will see a notiication that it is being monitored

by the reports eature. Any computer on the network withthe Sotware installed can enable or disable any othercomputer rom the reports eature.

In addition, Cisco may collect and store detailedinormation regarding your network conigurationand usage or the purpose o providing you technicalnetworking support. The inormation is associated withyou only when you provide a unique ID number to thesupport representative while you are receiving help. Theunique ID is generated randomly on your computer uponinstallation and is completely under your control.

Your use o your Cisco product and/or the Sotware

constitutes consent by you to Cisco’s and/or its ailiates’collection and use o such inormation and, or EuropeanEconomic Area (EEA) customers, to the transer o suchinormation to a location outside the EEA. Any inormationcollected by your Cisco product and/or the Sotware isdone and utilized in accordance with our Privacy Policyavailable at Privacy Statement. Your election to use theCisco product and/or Sotware indicates your acceptanceo the terms o the Cisco Privacy Policy, so please reviewthe policy careully and check the Web site above toreview updates to it.

Sotware Upgrades etc . I the Sotware enables you toreceive Upgrades, you may elect at any time to receivethese Upgrades either automatically or manually. I youelect to receive Upgrades manually or you otherwiseelect not to receive or be notiied o any Upgrades, youmay expose your Cisco product and/or the Sotware toserious security threats and/or some eatures within yourCisco product and/or Sotware may become inaccessible.There may be circumstances where we apply an Upgradeautomatically in order to comply with changes inlegislation, legal, security or regulatory requirements oras a result o requirements to comply with the terms o any agreements Cisco has with any third parties regardingyour Cisco product and/or the Sotware. You will always

be notiied o any Upgrades being delivered to you. Theterms o this license will apply to any such Upgrade unlessthe Upgrade in question is accompanied by a separatelicense, in which event the terms o that license willapply.

Changes to Browser Settings and Error Processing. Byinstalling the Sotware, you acknowledge and agree thatthe Sotware may change certain settings in your Internetbrowser sotware, including the deault settings or searchprovider and source o DNS error pages and may directerroneous URLs to an error landing page hosted by Cisco.You may opt out o these settings by not accepting them as

part o the installation process or by requesting a changeto your sotware settings in the error process. Installingthe sotware and changing these sotware settings mayconlict with license agreements you have entered intowith other entities, such as your Internet service provider.Error queries that are libelous, slanderous, deamatory or

that may violate the intellectual property rights o othersmay not be processed by Cisco or its suppliers.

Term and Termination. You may terminate this Licenseat any time by destroying all copies o the Sotwareand documentation. Your rights under this License willterminate immediately without notice rom Cisco i youail to comply with any provision o this Agreement.

Limited Warranty . Cisco additionally warrants that anymedia on which the Sotware may be provided will beree rom deects in materials and workmanship undernormal use or a period o ninety (90) days rom the dateo original purchase. Your exclusive remedy and Cisco’s

entire liability under this limited warranty will be or Cisco,at its option, to (a) replace the Sotware media, or (b)reund the purchase price o the Sotware media.

EXCEPT FOR THE LIMITED WARRANTY ON MEDIASET FORTH ABOVE AND TO THE MAXIMUM EXTENTPERMITTED BY APPLICABLE LAW, ALL SOFTWARE ANDSERVICES PROVIDED BY CISCO ARE PROVIDED “AS IS” WITHALL FAULTS AND WITHOUT WARRANTY OF ANY KIND.Without limiting the oregoing, Cisco does not warrantthat the operation o the product, sotware or services willbe uninterrupted or error ree. Also, due to the continualdevelopment o new techniques or intruding upon andattacking networks, Cisco does not warrant that theproduct, sotware or services, or any equipment, systemor network on which the product, sotware or servicesare used will be ree o vulnerability to intrusion or attack.The product may include or be bundled with third partysotware or service oerings. This limited warranty shallnot apply to such third party sotware or service oerings.This limited warranty does not guarantee any continuedavailability o a third party’s service or which this product’suse or operation may require.

TO THE EXTENT NOT PROHIBITED BY APPLICABLELAW, ALL IMPLIED WARRANTIES AND CONDITIONSOF MERCHANTABILITY, SATISFACTORY QUALITY,

NONINFRINGEMENT OR FITNESS FOR A PARTICULARPURPOSE ARE LIMITED TO THE DURATION OF THEWARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES AREDISCLAIMED. Some jurisdictions do not allow limitationson how long an implied warranty lasts, so the abovelimitation may not apply to you. This limited warrantygives you speciic legal rights, and you may also haveother rights which vary by jurisdiction.

loaded from www.Manualslib.com manuals search engine 

Page 40: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 40/50

36

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

Disclaimer o Liabilities. TO THE EXTENT NOT PROHIBITEDBY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLEFOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVEDAMAGES, REGARDLESS OF THE THEORY OF LIABILITY(INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED

TO THE USE OF OR INABILITY TO USE THE PRODUCT,SOFTWARE OR ANY SERVICES PROVIDED IN RESPECTOF SUCH PRODUCT OR SOFTWARE, EVEN IF CISCO HASBEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW,IN NO EVENT WILL CISCO’S LIABILITY EXCEED THEAMOUNT PAID BY YOU FOR THE PRODUCT. IF YOU LIVEIN THE EUROPEAN UNION, REFERENCES TO “SPECIAL,INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTALDAMAGES” SHALL MEAN ANY LOSSES WHICH (i) WERE NOTREASONABLY FORESEEABLE BY BOTH PARTIES, AND/OR (ii)WERE KNOWN TO YOU BUT NOT TO US AND/OR (iii) WEREREASONABLY FORESEEABLE BY BOTH PARTIES BUT COULD

HAVE BEEN PREVENTED BY YOU SUCH AS, FOR EXAMPLE(BUT WITHOUT LIMITATION), LOSSES CAUSED BY VIRUSES,TROJANS OR OTHER MALICIOUS PROGRAMS, OR LOSS OFOR DAMAGE TO YOUR DATA. The oregoing limitations willapply even i any warranty or remedy provided under thislimited warranty ails o its essential purpose.

Technical Support . This limited warranty is neithera service nor a support contract. Inormation aboutCisco’s current technical support oerings and policies(including any ees or support services) can be ound atwww.linksysbycisco.com/support.

Export . Sotware, including technical data, may be subject

to U.S. export control laws and regulations and/or exportor import regulations in other countries. You agree tocomply strictly with all such laws and regulations.

U.S. Government Users. The Sotware and Documentationqualiy as “commercial items” as deined at 48 C.F.R. 2.101and 48 C.F.R. 12.212. All Government users acquire theSotware and Documentation with only those rightsherein that apply to non-governmental customers. Use o either the Sotware or Documentation or both constitutesagreement by the Government that the Sotware andDocumentation are “commercial computer sotware”and “commercial computer sotware documentation,”

and constitutes acceptance o the rights and restrictionsherein.

General Terms. This Agreement will be governed by andconstrued in accordance with the laws o the State o Caliornia, without reerence to conlict o laws principles.The United Nations Convention on Contracts or theInternational Sale o Goods will not apply. I any portiono this Agreement is ound to be void or unenorceable,the remaining provisions will remain in ull orce andeect. This Agreement constitutes the entire agreementbetween the parties with respect to the Sotware and

supersedes any conlicting or additional terms containedin any purchase order or elsewhere.

Linksys, Cisco and the Cisco Logo and other trademarkscontained in the Sotware and Documentation aretrademarks or registered trademarks o Linksys, Cisco,its licensors and third parties, as the case may be. You

may not remove or alter any trademark, trade names,product names, logo, copyright or other proprietarynotices, legends, symbols or labels in the Sotware andDocumentation. This Agreement does not authorizeyou to use Cisco’s or its licensors’ names or respectivetrademarks.

END OF SCHEDULE 1

Schedule 2

Network Magic Features

Network Magic License Restrictions. Other than as

set orth in this Agreement or as otherwise permittedby Cisco, you may not install or execute the Network Magic Sotware on any non-personal computer product,including, but not limited to, a Web appliance, set top box,handheld device, phone, Web pad device, or any devicerunning the Microsot Windows CE operating system.

Terms o Service or Subscription Licenses. These Termso Service only apply i you have obtained a subscriptionlicense to Network Magic as speciied in your order. Suchsubscription licenses may subject you to ees which youare responsible or paying in order to continue to subscribeto the Services.

1. Network Magic Cancellation. You may cancel theServices at any time. I you cancel the Services, Ciscowill not be obligated to provide you any Network Magicproduct Upgrades. I you cancel the Services, Cisco maydelete data relating to you or your use o the Servicesrom Cisco or its suppliers’ servers. To the extent notprohibited by applicable law, you understand and agreethat cancellation o your Services is your sole remedy withrespect to any dispute with Cisco.

2. Modifications. Cisco may modiy or cancel the termso this Agreement or the price, content, or nature o theServices (including discontinuing the Services program),

upon notice to you. I Cisco modiies any o theseterms, you may cancel the Service by providing writtennotice to Cisco via www.networkmagic.com/supporto such cancellation and uninstalling the Sotware anddiscontinuing your use o the Service. Cisco may providenotice by e-mail, via Network Magic, or by publishing thechanges on its Web site.

3. Email Notification. Cisco may send you email romtime to time to let you know about new products andservices that are available to you. You will be able to opt-out o receiving these emails using the link providedwithin the email. Cisco reserves the right, however, to

loaded from www.Manualslib.com manuals search engine 

Page 41: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 41/50

37

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

send you Service related email messages as long as youare a subscriber to the Service. I you wish to opt-outo receiving Service related email messages, you maycancel the Service by providing written notice via www.networkmagic.com/support to Cisco o such cancellationand uninstalling the Sotware and discontinuing your use

o the Service.END OF SCHEDULE 2

Schedule 3

Open Source and Third Party Licenses

Schedule 3-A

I this Cisco product contains open source sotwarelicensed under Version 2 o the “GNU General PublicLicense” then the license terms below in this Schedule 3-Awill apply to that open source sotware. The license termsbelow in this Schedule 3-A are rom the public web site at

http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright © 1989, 1991 Free Sotware Foundation, Inc.51 Franklin Street, Fith Floor, Boston, MA 02110-1301,USA

Everyone is permitted to copy and distribute verbatimcopies o this license document, but changing it is notallowed.

Preamble

The licenses or most sotware are designed to take awayyour reedom to share and change it. By contrast, theGNU General Public License is intended to guarantee yourreedom to share and change ree sotware—to makesure the sotware is ree or all its users. This General PublicLicense applies to most o the Free Sotware Foundation’ssotware and to any other program whose authorscommit to using it. (Some other Free Sotware Foundationsotware is covered by the GNU Lesser General PublicLicense instead.) You can apply it to your programs, too.

When we speak o ree sotware, we are reerring to

reedom, not price. Our General Public Licenses aredesigned to make sure that you have the reedom todistribute copies o ree sotware (and charge or thisservice i you wish), that you receive source code or canget it i you want it, that you can change the sotware oruse pieces o it in new ree programs; and that you knowyou can do these things.

To protect your rights, we need to make restrictions thatorbid anyone to deny you these rights or to ask you tosurrender the rights. These restrictions translate to certainresponsibilities or you i you distribute copies o thesotware, or i you modiy it.

For example, i you distribute copies o such a program,whether gratis or or a ee, you must give the recipientsall the rights that you have. You must make sure that they,too, receive or can get the source code. And you mustshow them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the

sotware, and (2) oer you this license which gives youlegal permission to copy, distribute and/or modiy thesotware.

Also, or each author’s protection and ours, we want tomake certain that everyone understands that there is nowarranty or this ree sotware. I the sotware is modiiedby someone else and passed on, we want its recipientsto know that what they have is not the original, so thatany problems introduced by others will not relect on theoriginal authors’ reputations.

Finally, any ree program is threatened constantly bysotware patents. We wish to avoid the danger that

redistributors o a ree program will individually obtainpatent licenses, in eect making the program proprietary.To prevent this, we have made it clear that any patent mustbe licensed or everyone’s ree use or not licensed at all.

The precise terms and conditions or copying, distributionand modiication ollow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND

MODIFICATION

0. This License applies to any program or other work which contains a notice placed by the copyrightholder saying it may be distributed under the termso this General Public License. The “Program”, below,reers to any such program or work, and a “work based on the Program” means either the Programor any derivative work under copyright law: that isto say, a work containing the Program or a portiono it, either verbatim or with modiications and/or translated into another language. (Hereinater,translation is included without limitation in the term“modiication”.) Each licensee is addressed as “you”.

Activities other than copying, distribution andmodiication are not covered by this License; they

are outside its scope. The act o running the Programis not restricted, and the output rom the Program iscovered only i its contents constitute a work based onthe Program (independent o having been made byrunning the Program). Whether that is true dependson what the Program does.

loaded from www.Manualslib.com manuals search engine 

Page 42: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 42/50

38

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

1. You may copy and distribute verbatim copies o theProgram’s source code as you receive it, in any medium,provided that you conspicuously and appropriatelypublish on each copy an appropriate copyright noticeand disclaimer o warranty; keep intact all the noticesthat reer to this License and to the absence o any

warranty; and give any other recipients o the Programa copy o this License along with the Program.

You may charge a ee or the physical act o transerringa copy, and you may at your option oer warrantyprotection in exchange or a ee. .

2. You may modiy your copy or copies o the Programor any portion o it, thus orming a work based on theProgram, and copy and distribute such modiicationsor work under the terms o Section 1 above, providedthat you also meet all o these conditions:

a) You must cause the modiied iles to carryprominent notices stating that you changed theiles and the date o any change.

b) You must cause any work that you distribute orpublish, that in whole or in part contains or isderived rom the Program or any part thereo, to belicensed as a whole at no charge to all third partiesunder the terms o this License.

c) I the modiied program normally reads commandsinteractively when run, you must cause it, whenstarted running or such interactive use in the mostordinary way, to print or display an announcementincluding an appropriate copyright notice and

a notice that there is no warranty (or else, sayingthat you provide a warranty) and that users mayredistribute the program under these conditions,and telling the user how to view a copy o this License. (Exception: i the Program itsel isinteractive but does not normally print such anannouncement, your work based on the Programis not required to print an announcement.)

These requirements apply to the modiied work asa whole. I identiiable sections o that work are notderived rom the Program, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part o a whole which is a work based onthe Program, the distribution o the whole must be onthe terms o this License, whose permissions or otherlicensees extend to the entire whole, and thus to eachand every part regardless o who wrote it.

Thus, it is not the intent o this section to claim rightsor contest your rights to work written entirely by you;rather, the intent is to exercise the right to control the

distribution o derivative or collective works based onthe Program.

In addition, mere aggregation o another work notbased on the Program with the Program (or with awork based on the Program) on a volume o a storageor distribution medium does not bring the other work 

under the scope o this License.3. You may copy and distribute the Program (or a

work based on it, under Section 2) in object code orexecutable orm under the terms o Sections 1 and 2above provided that you also do one o the ollowing:

a) Accompany it with the complete correspondingmachine-readable source code, which must bedistributed under the terms o Sections 1 and 2above on a medium customarily used or sotwareinterchange; or,

b) Accompany it with a written oer, valid or at leastthree years, to give any third party, or a chargeno more than your cost o physically perormingsource distribution, a complete machine-readablecopy o the corresponding source code, to bedistributed under the terms o Sections 1 and 2above on a medium customarily used or sotwareinterchange; or,

c) Accompany it with the inormation you received asto the oer to distribute corresponding source code.(This alternative is allowed only or noncommercialdistribution and only i you received the programin object code or executable orm with such anoer, in accord with Subsection b above.)

The source code or a work means the preerred ormo the work or making modiications to it. For anexecutable work, complete source code means allthe source code or all modules it contains, plus anyassociated interace deinition iles, plus the scriptsused to control compilation and installation o theexecutable. However, as a special exception, the sourcecode distributed need not include anything that isnormally distributed (in either source or binary orm)with the major components (compiler, kernel, and soon) o the operating system on which the executableruns, unless that component itsel accompanies the

executable.I distribution o executable or object code is madeby oering access to copy rom a designated place,then oering equivalent access to copy the sourcecode rom the same place counts as distribution o the source code, even though third parties are notcompelled to copy the source along with the objectcode.

loaded from www.Manualslib.com manuals search engine 

Page 43: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 43/50

39

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

4. You may not copy, modiy, sublicense, or distributethe Program except as expressly provided underthis License. Any attempt otherwise to copy, modiy,sublicense or distribute the Program is void, and willautomatically terminate your rights under this License.However, parties who have received copies, or rights,

rom you under this License will not have their licensesterminated so long as such parties remain in ullcompliance.

5. You are not required to accept this License, since youhave not signed it. However, nothing else grants youpermission to modiy or distribute the Program or itsderivative works. These actions are prohibited by law i you do not accept this License. Thereore, by modiyingor distributing the Program (or any work based on theProgram), you indicate your acceptance o this Licenseto do so, and all its terms and conditions or copying,distributing or modiying the Program or works basedon it.

6. Each time you redistribute the Program (or any work based on the Program), the recipient automaticallyreceives a license rom the original licensor to copy,distribute or modiy the Program subject to theseterms and conditions. You may not impose any urtherrestrictions on the recipients’ exercise o the rightsgranted herein. You are not responsible or enorcingcompliance by third parties to this License.

7. I, as a consequence o a court judgment or allegationo patent inringement or or any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)

that contradict the conditions o this License, they donot excuse you rom the conditions o this License. I you cannot distribute so as to satisy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence youmay not distribute the Program at all. For example,i a patent license would not permit royalty-reeredistribution o the Program by all those who receivecopies directly or indirectly through you, then the onlyway you could satisy both it and this License would beto rerain entirely rom distribution o the Program.

I any portion o this section is held invalid or

unenorceable under any particular circumstance,the balance o the section is intended to apply andthe section as a whole is intended to apply in othercircumstances.

It is not the purpose o this section to induce you toinringe any patents or other property right claims orto contest validity o any such claims; this section hasthe sole purpose o protecting the integrity o the reesotware distribution system, which is implementedby public license practices. Many people havemade generous contributions to the wide range o sotware distributed through that system in reliance

on consistent application o that system; it is up tothe author/donor to decide i he or she is willing todistribute sotware through any other system and alicensee cannot impose that choice.

This section is intended to make thoroughly clearwhat is believed to be a consequence o the rest o this

License.8. I the distribution and/or use o the Program is

restricted in certain countries either by patents or bycopyrighted interaces, the original copyright holderwho places the Program under this License may add anexplicit geographical distribution limitation excludingthose countries, so that distribution is permitted onlyin or among countries not thus excluded. In such case,this License incorporates the limitation as i written inthe body o this License.

9. The Free Sotware Foundation may publish revisedand/or new versions o the General Public License

rom time to time. Such new versions will be similar inspirit to the present version, but may dier in detail toaddress new problems or concerns.

Each version is given a distinguishing version number.I the Program speciies a version number o thisLicense which applies to it and “any later version”, youhave the option o ollowing the terms and conditionseither o that version or o any later version publishedby the Free Sotware Foundation. I the Program doesnot speciy a version number o this License, youmay choose any version ever published by the FreeSotware Foundation.

10. I you wish to incorporate parts o the Program intoother ree programs whose distribution conditions aredierent, write to the author to ask or permission. Forsotware which is copyrighted by the Free SotwareFoundation, write to the Free Sotware Foundation; wesometimes make exceptions or this. Our decision willbe guided by the two goals o preserving the ree statuso all derivatives o our ree sotware and o promotingthe sharing and reuse o sotware generally.

NO WARRANTY 

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,THERE IS NO WARRANTY FOR THE PROGRAM, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPTWHEN OTHERWISE STATED IN WRITING THE COPYRIGHTHOLDERS AND/OR OTHER PARTIES PROVIDE THEPROGRAM “AS IS” WITHOUT WARRANTY OF ANYKIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE PROGRAM IS WITH YOU.SHOULD THE PROGRAM PROVE DEFECTIVE, YOUASSUME THE COST OF ALL NECESSARY SERVICING,REPAIR OR CORRECTION.

loaded from www.Manualslib.com manuals search engine 

Page 44: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 44/50

40

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW ORAGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,OR ANY OTHER PARTY WHO MAY MODIFY AND/ORREDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANYGENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL

DAMAGES ARISING OUT OF THE USE OR INABILITY TOUSE THE PROGRAM (INCLUDING BUT NOT LIMITED TOLOSS OF DATA OR DATA BEING RENDERED INACCURATEOR LOSSES SUSTAINED BY YOU OR THIRD PARTIES ORA FAILURE OF THE PROGRAM TO OPERATE WITH ANYOTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHERPARTY HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES

END OF TERMS AND CONDITIONS

END OF SCHEDULE 3-A

Schedule 3-B

I this Cisco product contains open source sotware licensedunder Version 2.1 o the “GNU Lesser General PublicLicense” then the license terms below in this Schedule 3-Bwill apply to that open source sotware. The license termsbelow in this Schedule 3-B are rom the public web site athttp://www.gnu.org/licenses/old-licenses/lgpl-2.1.html

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright © 1991, 1999 Free Sotware Foundation, Inc.51 Franklin Street, Fith Floor, Boston, MA 02110-1301USA

Everyone is permitted to copy and distribute verbatimcopies o this license document, but changing it is notallowed.

[This is the irst released version o the Lesser GPL. It alsocounts as the successor o the GNU Library Public License,version 2, hence the version number 2.1.]

Preamble

The licenses or most sotware are designed to take awayyour reedom to share and change it. By contrast, the GNUGeneral Public Licenses are intended to guarantee your

reedom to share and change ree sotware—to makesure the sotware is ree or all its users.

This license, the Lesser General Public License, applies tosome specially designated sotware packages—typicallylibraries—o the Free Sotware Foundation and otherauthors who decide to use it. You can use it too, but wesuggest you irst think careully about whether this licenseor the ordinary General Public License is the better strategyto use in any particular case, based on the explanationsbelow.

When we speak o ree sotware, we are reerring toreedom o use, not price. Our General Public Licensesare designed to make sure that you have the reedomto distribute copies o ree sotware (and charge or thisservice i you wish); that you receive source code or canget it i you want it; that you can change the sotware and

use pieces o it in new ree programs; and that you areinormed that you can do these things.

To protect your rights, we need to make restrictions thatorbid distributors to deny you these rights or to ask youto surrender these rights. These restrictions translate tocertain responsibilities or you i you distribute copies o the library or i you modiy it.

For example, i you distribute copies o the library,whether gratis or or a ee, you must give the recipientsall the rights that we gave you. You must make sure thatthey, too, receive or can get the source code. I you link other code with the library, you must provide complete

object iles to the recipients, so that they can relink themwith the library ater making changes to the library andrecompiling it. And you must show them these terms sothey know their rights.

We protect your rights with a two-step method: (1) wecopyright the library, and (2) we oer you this license,which gives you legal permission to copy, distribute and/or modiy the library.

To protect each distributor, we want to make it very clearthat there is no warranty or the ree library. Also, i thelibrary is modiied by someone else and passed on, therecipients should know that what they have is not the

original version, so that the original author’s reputationwill not be aected by problems that might be introducedby others.

Finally, sotware patents pose a constant threat to theexistence o any ree program. We wish to make surethat a company cannot eectively restrict the users o a ree program by obtaining a restrictive license rom apatent holder. Thereore, we insist that any patent licenseobtained or a version o the library must be consistentwith the ull reedom o use speciied in this license.

Most GNU sotware, including some libraries, is coveredby the ordinary GNU General Public License. This license,

the GNU Lesser General Public License, applies to certaindesignated libraries, and is quite dierent rom theordinary General Public License. We use this license orcertain libraries in order to permit linking those librariesinto non-ree programs.

When a program is linked with a library, whetherstatically or using a shared library, the combination o the two is legally speaking a combined work, a derivativeo the original library. The ordinary General PublicLicense thereore permits such linking only i the entirecombination its its criteria o reedom. The Lesser General

loaded from www.Manualslib.com manuals search engine 

Page 45: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 45/50

41

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

Public License permits more lax criteria or linking othercode with the library.

We call this license the “Lesser” General Public Licensebecause it does Less to protect the user’s reedom thanthe ordinary General Public License. It also providesother ree sotware developers Less o an advantage over

competing non-ree programs. These disadvantages arethe reason we use the ordinary General Public Licenseor many libraries. However, the Lesser license providesadvantages in certain special circumstances.

For example, on rare occasions, there may be a specialneed to encourage the widest possible use o a certainlibrary, so that it becomes a de-acto standard. To achievethis, non-ree programs must be allowed to use the library.A more requent case is that a ree library does the same

 job as widely used non-ree libraries. In this case, there islittle to gain by limiting the ree library to ree sotwareonly, so we use the Lesser General Public License.

In other cases, permission to use a particular library in non-ree programs enables a greater number o people to usea large body o ree sotware. For example, permission touse the GNU C Library in non-ree programs enables manymore people to use the whole GNU operating system, aswell as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Lessprotective o the users’ reedom, it does ensure that theuser o a program that is linked with the Library has thereedom and the wherewithal to run that program using amodiied version o the Library.

The precise terms and conditions or copying, distributionand modiication ollow. Pay close attention to thedierence between a “work based on the library” and a“work that uses the library”. The ormer contains codederived rom the library, whereas the latter must becombined with the library in order to run.

GNU LESSER GENERAL PUBLIC LICENSE

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTIONAND MODIFICATION

0. This License Agreement applies to any sotware libraryor other program which contains a notice placed bythe copyright holder or other authorized party saying

it may be distributed under the terms o this LesserGeneral Public License (also called “this License”). Eachlicensee is addressed as “you”.

A “library” means a collection o sotware unctionsand/or data prepared so as to be conveniently linkedwith application programs (which use some o thoseunctions and data) to orm executables.

The “Library”, below, reers to any such sotware libraryor work which has been distributed under these terms.A “work based on the Library” means either the Libraryor any derivative work under copyright law: that is tosay, a work containing the Library or a portion o it,

either verbatim or with modiications and/or translatedstraightorwardly into another language. (Hereinater,translation is included without limitation in the term“modiication”.)

“Source code” or a work means the preerred orm o the work or making modiications to it. For a library,

complete source code means all the source code orall modules it contains, plus any associated interacedeinition iles, plus the scripts used to controlcompilation and installation o the library.

Activities other than copying, distribution andmodiication are not covered by this License; they areoutside its scope. The act o running a program usingthe Library is not restricted, and output rom such aprogram is covered only i its contents constitute awork based on the Library (independent o the useo the Library in a tool or writing it). Whether that istrue depends on what the Library does and what the

program that uses the Library does.1. You may copy and distribute verbatim copies o the

Library’s complete source code as you receive it, inany medium, provided that you conspicuously andappropriately publish on each copy an appropriatecopyright notice and disclaimer o warranty; keepintact all the notices that reer to this License and tothe absence o any warranty; and distribute a copy o this License along with the Library.

You may charge a ee or the physical act o transerringa copy, and you may at your option oer warrantyprotection in exchange or a ee.

2. You may modiy your copy or copies o the Library orany portion o it, thus orming a work based on theLibrary, and copy and distribute such modiicationsor work under the terms o Section 1 above, providedthat you also meet all o these conditions:

a) The modiied work must itsel be a sotwarelibrary.

b) You must cause the iles modiied to carryprominent notices stating that you changed theiles and the date o any change.

c) You must cause the whole o the work to be

licensed at no charge to all third parties under theterms o this License.

d) I a acility in the modiied Library reers to a unctionor a table o data to be supplied by an applicationprogram that uses the acility, other than as anargument passed when the acility is invoked, thenyou must make a good aith eort to ensure that,in the event an application does not supply suchunction or table, the acility still operates, andperorms whatever part o its purpose remainsmeaningul.

loaded from www.Manualslib.com manuals search engine 

Page 46: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 46/50

42

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

(For example, a unction in a library to compute squareroots has a purpose that is entirely well-deinedindependent o the application. Thereore, Subsection2d requires that any application-supplied unction ortable used by this unction must be optional: i theapplication does not supply it, the square root unction

must still compute square roots.)These requirements apply to the modiied work asa whole. I identiiable sections o that work are notderived rom the Library, and can be reasonablyconsidered independent and separate works inthemselves, then this License, and its terms, do notapply to those sections when you distribute them asseparate works. But when you distribute the samesections as part o a whole which is a work based onthe Library, the distribution o the whole must be onthe terms o this License, whose permissions or otherlicensees extend to the entire whole, and thus to eachand every part regardless o who wrote it.

Thus, it is not the intent o this section to claim rightsor contest your rights to work written entirely by you;rather, the intent is to exercise the right to control thedistribution o derivative or collective works based onthe Library.

In addition, mere aggregation o another work notbased on the Library with the Library (or with a work based on the Library) on a volume o a storage ordistribution medium does not bring the other work under the scope o this License.

3. You may opt to apply the terms o the ordinary GNU

General Public License instead o this License to agiven copy o the Library. To do this, you must alter allthe notices that reer to this License, so that they reerto the ordinary GNU General Public License, version2, instead o to this License. (I a newer version thanversion 2 o the ordinary GNU General Public Licensehas appeared, then you can speciy that versioninstead i you wish.) Do not make any other change inthese notices.

Once this change is made in a given copy, it isirreversible or that copy, so the ordinary GNU GeneralPublic License applies to all subsequent copies andderivative works made rom that copy.

This option is useul when you wish to copy part o thecode o the Library into a program that is not a library.

4. You may copy and distribute the Library (or a portionor derivative o it, under Section 2) in object code orexecutable orm under the terms o Sections 1 and2 above provided that you accompany it with thecomplete corresponding machine-readable sourcecode, which must be distributed under the terms o Sections 1 and 2 above on a medium customarily usedor sotware interchange.

I distribution o object code is made by oeringaccess to copy rom a designated place, then oeringequivalent access to copy the source code rom thesame place satisies the requirement to distributethe source code, even though third parties are notcompelled to copy the source along with the object

code.5. A program that contains no derivative o any portion

o the Library, but is designed to work with the Libraryby being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is nota derivative work o the Library, and thereore allsoutside the scope o this License.

However, linking a “work that uses the Library” withthe Library creates an executable that is a derivativeo the Library (because it contains portions o theLibrary), rather than a “work that uses the library”. Theexecutable is thereore covered by this License. Section

6 states terms or distribution o such executables.When a “work that uses the Library” uses material roma header ile that is part o the Library, the object codeor the work may be a derivative work o the Libraryeven though the source code is not. Whether this istrue is especially signiicant i the work can be linkedwithout the Library, or i the work is itsel a library. Thethreshold or this to be true is not precisely deined bylaw.

I such an object ile uses only numerical parameters,data structure layouts and accessors, and small macrosand small inline unctions (ten lines or less in length),

then the use o the object ile is unrestricted, regardlesso whether it is legally a derivative work. (Executablescontaining this object code plus portions o the Librarywill still all under Section 6.)

Otherwise, i the work is a derivative o the Library, youmay distribute the object code or the work under theterms o Section 6. Any executables containing thatwork also all under Section 6, whether or not they arelinked directly with the Library itsel.

6. As an exception to the Sections above, you may alsocombine or link a “work that uses the Library” with theLibrary to produce a work containing portions o the

Library, and distribute that work under terms o yourchoice, provided that the terms permit modiicationo the work or the customer’s own use and reverseengineering or debugging such modiications.

You must give prominent notice with each copy o the work that the Library is used in it and that theLibrary and its use are covered by this License. Youmust supply a copy o this License. I the work duringexecution displays copyright notices, you must includethe copyright notice or the Library among them, aswell as a reerence directing the user to the copy o thisLicense. Also, you must do one o these things:

loaded from www.Manualslib.com manuals search engine 

Page 47: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 47/50

43

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

a) Accompany the work with the completecorresponding machine-readable source codeor the Library including whatever changes wereused in the work (which must be distributedunder Sections 1 and 2 above); and, i the work is an executable linked with the Library, with the

complete machine-readable “work that uses theLibrary”, as object code and/or source code, so thatthe user can modiy the Library and then relink to produce a modiied executable containing themodiied Library. (It is understood that the userwho changes the contents o deinitions iles in theLibrary will not necessarily be able to recompile theapplication to use the modiied deinitions.)

b) Use a suitable shared library mechanism or linkingwith the Library. A suitable mechanism is one that(1) uses at run time a copy o the library alreadypresent on the user ’s computer system, rather thancopying library unctions into the executable, and(2) will operate properly with a modiied version o the library, i the user installs one, as long as themodiied version is interace-compatible with theversion that the work was made with.

c) Accompany the work with a written oer, validor at least three years, to give the same user thematerials speciied in Subsection 6a, above, or acharge no more than the cost o perorming thisdistribution.

d) I distribution o the work is made by oering accessto copy rom a designated place, oer equivalentaccess to copy the above speciied materials romthe same place.

e) Veriy that the user has already received a copy o these materials or that you have already sent thisuser a copy.

For an executable, the required orm o the “work thatuses the Library” must include any data and utilityprograms needed or reproducing the executable romit. However, as a special exception, the materials to bedistributed need not include anything that is normallydistributed (in either source or binary orm) with themajor components (compiler, kernel, and so on) o the

operating system on which the executable runs, unlessthat component itsel accompanies the executable.

It may happen that this requirement contradicts thelicense restrictions o other proprietary libraries thatdo not normally accompany the operating system.Such a contradiction means you cannot use boththem and the Library together in an executable thatyou distribute.

7. You may place library acilities that are a work basedon the Library side-by-side in a single library togetherwith other library acilities not covered by this License,and distribute such a combined library, provided thatthe separate distribution o the work based on theLibrary and o the other library acilities is otherwise

permitted, and provided that you do these two things:a) Accompany the combined library with a copy o the

same work based on the Library, uncombined withany other library acilities. This must be distributedunder the terms o the Sections above.

b) Give prominent notice with the combined library o the act that part o it is a work based on the Library,and explaining where to ind the accompanyinguncombined orm o the same work.

8. You may not copy, modiy, sublicense, link with, ordistribute the Library except as expressly providedunder this License. Any attempt otherwise to copy,

modiy, sublicense, link with, or distribute the Libraryis void, and will automatically terminate your rightsunder this License. However, parties who have receivedcopies, or rights, rom you under this License will nothave their licenses terminated so long as such partiesremain in ull compliance.

9. You are not required to accept this License, since youhave not signed it. However, nothing else grants youpermission to modiy or distribute the Library or itsderivative works. These actions are prohibited by law i you do not accept this License. Thereore, by modiyingor distributing the Library (or any work based on the

Library), you indicate your acceptance o this Licenseto do so, and all its terms and conditions or copying,distributing or modiying the Library or works basedon it.

10. Each time you redistribute the Library (or any work based on the Library), the recipient automaticallyreceives a license rom the original licensor to copy,distribute, link with or modiy the Library subjectto these terms and conditions. You may not imposeany urther restrictions on the recipients’ exercise o the rights granted herein. You are not responsibleor enorcing compliance by third parties with thisLicense.

loaded from www.Manualslib.com manuals search engine 

Page 48: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 48/50

44

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

11. I, as a consequence o a court judgment or allegationo patent inringement or or any other reason (notlimited to patent issues), conditions are imposed onyou (whether by court order, agreement or otherwise)that contradict the conditions o this License, they donot excuse you rom the conditions o this License. I 

you cannot distribute so as to satisy simultaneouslyyour obligations under this License and any otherpertinent obligations, then as a consequence you maynot distribute the Library at all. For example, i a patentlicense would not permit royalty-ree redistribution o the Library by all those who receive copies directly orindirectly through you, then the only way you couldsatisy both it and this License would be to rerainentirely rom distribution o the Library.

I any portion o this section is held invalid orunenorceable under any particular circumstance,the balance o the section is intended to apply, andthe section as a whole is intended to apply in other

circumstances.

It is not the purpose o this section to induce you toinringe any patents or other property right claims orto contest validity o any such claims; this section hasthe sole purpose o protecting the integrity o the reesotware distribution system which is implementedby public license practices. Many people havemade generous contributions to the wide range o sotware distributed through that system in relianceon consistent application o that system; it is up tothe author/donor to decide i he or she is willing todistribute sotware through any other system and a

licensee cannot impose that choice.This section is intended to make thoroughly clearwhat is believed to be a consequence o the rest o thisLicense.

12. I the distribution and/or use o the Library is restrictedin certain countries either by patents or by copyrightedinteraces, the original copyright holder who placesthe Library under this License may add an explicitgeographical distribution limitation excluding thosecountries, so that distribution is permitted only in oramong countries not thus excluded. In such case, thisLicense incorporates the limitation as i written in the

body o this License.13. The Free Sotware Foundation may publish revised

and/or new versions o the Lesser General PublicLicense rom time to time. Such new versions will besimilar in spirit to the present version, but may dier indetail to address new problems or concerns.

Each version is given a distinguishing version number.I the Library speciies a version number o this Licensewhich applies to it and “any later version”, you have theoption o ollowing the terms and conditions either o that version or o any later version published by the FreeSotware Foundation. I the Library does not speciy a

license version number, you may choose any versionever published by the Free Sotware Foundation.

14. I you wish to incorporate parts o the Library intoother ree programs whose distribution conditions areincompatible with these, write to the author to ask orpermission. For sotware which is copyrighted by the

Free Sotware Foundation, write to the Free SotwareFoundation; we sometimes make exceptions orthis. Our decision will be guided by the two goals o preserving the ree status o all derivatives o our reesotware and o promoting the sharing and reuse o sotware generally.

NO WARRANTY

15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE,THERE IS NO WARRANTY FOR THE LIBRARY, TO THEEXTENT PERMITTED BY APPLICABLE LAW. EXCEPTWHEN OTHERWISE STATED IN WRITING THE COPYRIGHTHOLDERS AND/OR OTHER PARTIES PROVIDE THE

LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND,EITHER EXPRESSED OR IMPLIED, INCLUDING, BUTNOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE. THE ENTIRE RISK AS TO THE QUALITY ANDPERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULDTHE LIBRARY PROVE DEFECTIVE, YOU ASSUME THECOST OF ALL NECESSARY SERVICING, REPAIR ORCORRECTION.

16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAWOR AGREED TO IN WRITING WILL ANY COPYRIGHTHOLDER, OR ANY OTHER PARTY WHO MAY MODIFY

AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTEDABOVE, BE LIABLE TO YOU FOR DAMAGES,INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL ORCONSEQUENTIAL DAMAGES ARISING OUT OF THEUSE OR INABILITY TO USE THE LIBRARY (INCLUDINGBUT NOT LIMITED TO LOSS OF DATA OR DATA BEINGRENDERED INACCURATE OR LOSSES SUSTAINED BYYOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARYTO OPERATE WITH ANY OTHER SOFTWARE), EVEN IFSUCH HOLDER OR OTHER PARTY HAS BEEN ADVISEDOF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

END OF SCHEDULE 3-B

loaded from www.Manualslib.com manuals search engine 

Page 49: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 49/50

45

Appendix E Software End User License Agreement

Wireless-G Home Router with SpeedBurst

Schedule 3-C

OPENSSL LICENSE

I this Cisco product contains open source sotwarelicensed under the OpenSSL license:

This product includes sotware developed by the

OpenSSL Project or use in the OpenSSL Toolkit.(http://www.openssl.org/).

This product includes cryptographic sotware writtenby Eric Young ([email protected]).

This product includes sotware written by Tim Hudson([email protected]).

In addition, i this Cisco product contains open sourcesotware licensed under the OpenSSL license then thelicense terms below in this Schedule 3-C will apply tothat open source sotware. The license terms belowin this Schedule 3-C are rom the public web site at

http://www.openssl.org/source/license.html.The OpenSSL toolkit stays under a dual license, i.e. boththe conditions o the OpenSSL License and the originalSSLeay license apply to the toolkit. See below or theactual license texts. Actually both licenses are BSD-styleOpen Source licenses. In case o any license issues relatedto OpenSSL please contact [email protected].

OpenSSL License

Copyright © 1998-2007 The OpenSSL Project. All rightsreserved.

Redistribution and use in source and binary orms, with

or without modiication, are permitted provided that theollowing conditions are met:

1. Redistributions o source code must retain the abovecopyright notice, this list o conditions and theollowing disclaimer.

2. Redistributions in binary orm must reproduce theabove copyright notice, this list o conditions and theollowing disclaimer in the documentation and/orother materials provided with the distribution.

3. All advertising materials mentioning eatures oruse o this sotware must display the ollowingacknowledgment: “This product includes sotwaredeveloped by the OpenSSL Project or use in theOpenSSL Toolkit. (http://www.openssl.org/)”

4. The names “OpenSSL Toolkit” and “OpenSSL Project”must not be used to endorse or promote productsderived rom this sotware without prior writtenpermission. For written permission, please [email protected].

5. Products derived rom this sotware may not be called“OpenSSL” nor may “OpenSSL” appear in their nameswithout prior written permission o the OpenSSLProject.

6. Redistributions o any orm whatsoever must retainthe ollowing acknowledgment: “This product includessotware developed by the OpenSSL Project or use inthe OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES,

INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF MERCHANTABILITY AND FITNESS FORA PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENTSHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BELIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTEGOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER CAUSED ANDON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OROTHERWISE) ARISING IN ANY WAY OUT OF THE USE OFTHIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF

SUCH DAMAGE

This product includes cryptographic sotware written byEric Young ([email protected]). This product includessotware written by Tim Hudson ([email protected]).

Original SSLeay License

Copyright © 1995-1998 Eric Young ([email protected])All rights reserved.

This package is an SSL implementation written by EricYoung ([email protected]).

The implementation was written so as to conorm with

Netscape’s SSL.

This library is ree or commercial and non-commercialuse as long as the ollowing conditions are adhered to.The ollowing conditions apply to all code ound in thisdistribution, be it the RC4, RSA, lhash, DES, etc., code; not

 just the SSL code. The SSL documentation included withthis distribution is covered by the same copyright termsexcept that the holder is Tim Hudson ([email protected]).

Copyright remains Eric Young’s, and as such any Copyrightnotices in the code are not to be removed.

I this package is used in a product, Eric Young should begiven attribution as the author o the parts o the libraryused. This can be in the orm o a textual message atprogram startup or in documentation (online or textual)provided with the package.

Redistribution and use in source and binary orms, withor without modiication, are permitted provided that theollowing conditions are met:

1. Redistributions o source code must retain thecopyright notice, this list o conditions and theollowing disclaimer.

loaded from www.Manualslib.com manuals search engine 

Page 50: Linksys Wrt54gh User Guide

8/22/2019 Linksys Wrt54gh User Guide

http://slidepdf.com/reader/full/linksys-wrt54gh-user-guide 50/50

Appendix E Software End User License Agreement

2. Redistributions in binary orm must reproduce theabove copyright notice, this list o conditions and theollowing disclaimer in the documentation and/orother materials provided with the distribution.

3. All advertising materials mentioning eatures oruse o this sotware must display the ollowing

acknowledgement:“This product includes cryptographic sotware writtenby Eric Young ([email protected])”

The word ‘cryptographic’ can be let out i the routinesrom the library being used are not cryptographicrelated.

4. I you include any Windows speciic code (or a derivativethereo) rom the apps directory (application code)you must include an acknowledgement: “This productincludes sotware written by Tim Hudson ([email protected])”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULARPURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THEAUTHOR OR CONTRIBUTORS BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOTLIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS ORSERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESSINTERRUPTION) HOWEVER CAUSED AND ON ANY THEORYOF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms or any publicly availableversion or derivative o this code cannot be changed. i.e.this code cannot simply be copied and put under anotherdistribution license [including the GNU Public License.]

END OF SCHEDULE 3-C


Recommended