background image

 

 

31

License Agreement for Embedded Software  

And Notice of Third Party Software 

 

 
 
THIS AGREEMENT (the “Agreement”) CONSTITUTES A LEGAL AGREEMENT BETWEEN THE PURCHASER OF THIS 
HARDWARE (“You”), AND ARXCEO CORPORATION (“ARXCEO”) REGARDING THE SOFTWARE EMBEDDED IN THE 
HARDWARE OR OTHERWISE INSTALLED ON THE HARDWARE AS DELIVERED. 
YOU SHOULD CAREFULLY READ THE 
FOLLOWING TERMS AND CONDITIONS BEFORE OPENING THIS PACKAGE. OPENING THIS PACKAGE WILL BE CONSTRUED AS 
YOUR ACCEPTANCE OF THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO THEM, PROMPTLY RETURN THE UNOPENED 
PACKAGE FOR A REFUND.  USE OF THE EMBEDDED SOFTWARE OUTSIDE OF THIS AGREEMENT CONSTITUTES A VIOLATION OF 
U.S. AND INTERNATIONAL COPYRIGHT LAW. 

1.  Grant of License:  ARXCEO  grants  to  you  a  limited,  revocable  license  of  the  ARXCEO  software  and/or  firmware  (the 

“Software”) that is embedded in or otherwise installed as delivered on the enclosed hardware (the “Equipment”), solely as the 
Software is installed at the date of purchase, and solely on the Equipment at one site; such license is strictly limited to use of the 
Software, in an unmodified state, on the unmodified Equipment.  From time to time, ARXCEO may, in its sole discretion, provide 
upgraded software for replacement of the Software and/or Third Party Products (as defined in Section 5) in connection with the 
Equipment (an “Upgrade”). Each Upgrade is governed by the terms set forth in ARXCEO’s distribution materials (e.g., the terms 
presented on ARXCEO’s web page linking to the upgrade, if provided by Internet download, or the terms of any documentation 
accompanying physical media distribution, if any) associated with that specific Upgrade (the “Upgrade Materials”), which may list 
specific models of equipment or specific purchase plans to which the Upgrade is made available or licensed.  You understand and 
agree that use of an Upgrade shall be governed by the license in the Upgrade Materials associated with such Upgrade (the 
Upgrade License); that this agreement does not grant any rights in, create any expectation of, and does not otherwise cover any 
Upgrade; and that because this license gives you no rights in any Upgrade, use of an Upgrade with equipment not specified in the 
Upgrade License or otherwise outside the scope of the Upgrade License is a violation of copyright in that Upgrade.  

2.   Copy Restrictions/Ownership of Software. The Software is licensed, not sold.  Your rights in the Equipment are subject to 

the terms of your purchase or leasing arrangement therefore, and do not in any way enlarge or imply rights in the Software; in all 
cases, ARXCEO retains title to the Software including any and all copies (whether authorized or not), regardless of form or media, 
and to all copyrights therein. The Software and accompanying written materials are copyrighted. You may make one copy of the 
Software (the “Backup Copy”) solely for backup and archival purposes, which copy must be held in strict confidentiality, and may 
not be transferred except together with the Equipment.  You agree not to make any copy other than the single first-generation 
Backup Copy.  You agree not to extract the Software or any portion thereof to other media (other than the making of the Backup 
Copy), upload the Software or any portion thereof to any equipment (other than the restoration of the Backup Copy to the 
Equipment in an unmodified state), or modify the Software in any manner.   

3.   Transfer and Other Restrictions. You may transfer the Software only both (a) with a copy of this Agreement, and (b) as 

installed on the Equipment, which transfer may be made to another party only on a permanent basis and only if the other party 
accepts the terms and conditions of this Agreement. Upon such transfer, you must transfer all accompanying written materials, 
and either transfer or destroy all copies of the Software. Any transfer or attempted transfer in violation of this provision is void.  
You may not lease, rent, merge, time share, or use the Software in the operation of any service bureau. You agree not to reverse 
engineer, decompile or disassemble the Software, except to the extent you are permitted to do so by applicable law that cannot be 
waived by this Section 3.  You may not use the Software for or in connection with any purpose or activity that (i) violates or 
infringes upon the rights of any others (including without limitation the right of privacy or the right of publicity, copyright, and 
trade secret), (ii) may be illegal, abusive, profane, obscene, immoral, indecent, threatening, slanderous, libelous, scandalous, or 
offensive to an average person, (iii) violates any law, regulation, or regulatory advisory, opinion, including particularly without 
limitation, those in the areas of antitrust, fair trade and securities law, or medical information (by way of non-limiting example, 
HIPAA requirements), or (iv) involves or relates to operation of nuclear facilities, aircraft navigation, aircraft communication, 
aircraft flight control, devices or systems in which serious injury or death to the operator of the device or system, or to others  due 
to a malfunction  (including, without limitation, software related delay or failure) could reasonably be foreseen.  You shall be 
responsible to ensure compliance with the foregoing.   

4. Termination. The licenses and rights granted in connection with this Agreement are effective for the operational life of the 

unmodified Equipment or until earlier terminated. The Agreement will terminate if you fail to comply with any provision of this 
Agreement, such termination to be automatically effective without notice except to the extent that notice is required by non-
waivable provision of law, in which case the termination shall be effective immediately upon such notice as the law shall require. 
You may voluntarily terminate at any time. Upon termination, you agree to destroy or purge all copies of the Software and 
accompanying written materials. You acknowledge and agree that upon termination of this Agreement, any attempt to access or 
use the Software is prohibited and unauthorized, and you agree that you will not make any such attempts.  The provisions of 
Sections 3, 4, 5, 8, 9, 10, and 11 shall survive any termination of this Agreement. 

5. ARXCEO’s Licensors and Third Party Software:   In addition to the Software, the Equipment includes the following 

software programs and code that are owned by ARXCEO’s licensors, respectively (“Third Party Products”):  the Microsoft XP 
Embedded program (“MSXPE”), licensed from Microsoft Corporation (“MS”) and subject to the MS EULA Attached as Schedule A; 
Apache Tomcat (“Tomcat”), licensed by Apache (“Apache”) under the ASF Apache License version 2.0, Attached as Schedule B; 
and possibly other code received by ARXCEO as “free software” without restrictions.  The Third Party Products are provided as a 
convenience to You, and are not considered part of the Software.  Your license to MSXPE is your sole source of license, rights, 
remedies, warranties, and benefits related to MSXPE.  You agree to all of the terms of the MS EULA, and agree with ARXCEO that 
you will comply with all such terms.  Your license to the remaining Third Party Products is directly with and from Apache or the 
other licensors thereof, and you agree to comply with the terms of such licenses.  In addition to the terms set forth in the relevant 
third party licenses (including without limitation the MS EULA and the Apache license), you agree that all Third Party Products 
are subject to all restrictions and obligations on You (but not the rights, remedies, or warranties in Your favor, or the 
obligations of ARXCEO) that are set forth in this Agreement for the Software,
 to the same extent as if the Third Party 
Products were considered Software, provided that in the event of a conflict between the terms of this Agreement and the terms of 
a Third Party EULA, the Third Party EULA controls, but only with respect to the specific Third Party Product covered under that 

Summary of Contents for ALLY IP1000

Page 1: ...User Guide...

Page 2: ...ceo logo are trademarks or registered trademarks of Arxceo Corporation Microsoft and Windows Embedded XP are registered trademarks of Microsoft Corporation Other brands trademarks or trade names may b...

Page 3: ...000 Back Panel 6 Management 7 Command Line Management 8 Confirmation 8 Intrusion Protection Information 10 Reviewing Intrusion Messages in the Event Log 12 Appendix A 13 Appendix B 18 Appendix C 25 Cu...

Page 4: ...from infected internal systems can be provided by deploying Ally products at common gateways or network traffic intersections In the Perimeter Protection position there are only a few steps to perfor...

Page 5: ...s case you will need to change the software Network Adapter Configuration to match this physical setup by using either the Ally Management Console or the command line interface To make certain this fe...

Page 6: ...0 introduces a potential point of attack The Ally IP1000 Inside and Outside Adapters do not use an IP or MAC address This unique approach helps protect the Ally IP1000 and your network from attacks Ho...

Page 7: ...ator Password arxceo 4 The first time the Ally Management Console is accessed you will be required to accept the End User License Agreement EULA If you do not accept the terms of the EULA the product...

Page 8: ...al console unattended logout of the system by entering the logout command in the command window This will password protect the console Confirmation The next step to Plug and Protect is to ensure no kn...

Page 9: ...te blacklists and whitelists for both the Outside and Inside adapters Arxceo recommends performing the following three steps as a component of your scheduled systems security maintenance 1 Review Blac...

Page 10: ...ine that you are blacklisting on SYN requests rather than ACK responses IP Fragments Due to physical differences between various networking hardware IP packets may be broken into various fragments whe...

Page 11: ...tion oriented sessions such as HTTP and TCP IP the Ally appliance prevents any connection into the network unless the original source IP address remains unchanged throughout the session For example on...

Page 12: ...e most recent 100 event log messages Additionally the Ally IP1000 event log messages can be viewed on the local console using the Windows Event Viewer To access the Windows Event Viewer 1 At the Ally...

Page 13: ...dapters Device ALLY has been started Network adapter Network Adapter Number is assigned to handle inside network traffic Network adapter Network Adapter Number is assigned to handle outside network tr...

Page 14: ...from the same IP address in Outside Scan Timeout Number seconds will cause that IP address to be placed on the outside adapter s blacklist 16 Configuration Blacklist Time Period An IP address will rem...

Page 15: ...formation Reply packets are passed through without analysis or discarded 35 Configuration ICMP Address Mask Policy ICMP Address Mask Request packets are passed through without analysis or discarded 36...

Page 16: ...card Fragmented Packet A fragmented packet from IP address Source IP Address to Destination IP Address with IP id IP ID was discarded 54 Detection Discard Outbound Management An outbound connection re...

Page 17: ...ole User or User Name set the ALLY SNMP Syslog agent s configuration variable Variable Name to New Variable Value 64 Configuration Event SNMP Syslog Agent Reload The ALLY SNMP Syslog agent was directe...

Page 18: ...passed through without inspection or intervention When Pass Through Mode is enabled the other Ally IP1000 configuration parameters are ignored and NO PROTECTION is provided General Filtering Options...

Page 19: ...tering Options at Inside to Outside Address Authentication Disabled First Connection per Session All Connections First Connect per Session TCP Policy id Maximum Number of Inside to Outside Concurrent...

Page 20: ...established This setting is especially useful when the applications communicating through the Ally create multiple connections from a specific source IP address to a single destination IP address and...

Page 21: ...ed 32 bit integers 25 5 Port Scan Prevention is one of the Ally IP1000 features designed to provide anti reconnaissance protection This feature limits the number of TCP connection requests from a spec...

Page 22: ...UDP Policy Discard All Analyze Allow All Analyze Selecting Analyze activates the UDP policy parameters i e the next 4 entries in this table General Filtering Options av DNS Policy Discard All Analyze...

Page 23: ...rd All Analyze Allow All Analyze Selecting Analyze activates the ICMP policy parameters i e the next 12 entries in this table General Filtering Options ai ICMP Echo Request Policy Discard All Allow Al...

Page 24: ...card All Allow All Allow All Address Resolution Protocol ARP is the protocol that converts IP addresses to MAC addresses Typically ARP traffic should be allowed to pass through the Ally IP1000 Non IP...

Page 25: ...ration Event Detection and Information Configuration and Configuration Event messages are always written to the event log while Detection and Information messages can be optionally disabled Use the Al...

Page 26: ...on Maximum Concurrent Connections N A mmun mmuy 9 Configuration IP Fragment Policy N A mfrn mfry 10 Configuration Log Invalid TCP Flags N A mlfn mlfy 11 Configuration Log Invalid TCP Option N A mlon m...

Page 27: ...eply Policy N A 33 Configuration ICMP Information Request Policy N A 34 Configuration ICMP Information Reply Policy N A 35 Configuration ICMP Address Mask Policy N A 36 Configuration ICMP Address Mask...

Page 28: ...sy 55 Detection Discard ARP Packet la mdan mday 56 Detection Discard ICMP Packet ldi mdin mdiy 57 Detection Discard UDP Packet ldu mdun mduy 58 Detection Discard DNS Packet ldns mddn mddy 59 Configura...

Page 29: ...zed Arxceo Reseller for hardware and software support for your Ally IP1000 Additional information is available on our website at www arxceo com Further support or additional questions may be directed...

Page 30: ...f Button System Reset Button LEDs Power Hard drive activity 2 network activity System overheat Power Supply 200 Watt AC Power Supply Thermal Control with PFC Cooling 1 x 100mm blower fan in chassis Op...

Page 31: ...violation of this provision is void You may not lease rent merge time share or use the Software in the operation of any service bureau You agree not to reverse engineer decompile or disassemble the S...

Page 32: ...e no obligation to provide the support services after the expiration of the then current Support Term At any time regardless of whether a Support Term is then in effect in the event that any part or a...

Page 33: ...icts of laws The parties hereby consent to the exclusive jurisdiction of the courts residing in the State of Alabama The headings in this Agreement are inserted for convenience only and shall not be u...

Page 34: ......

Reviews: