background image

22

Appendix E

Software End User License Agreement

Wireless-G Ethernet Bridge

of  the  Software  or  its  related  Documentation,  or 
electronically  transfer  the  Software  or  Documentation 
from one computer to another or over a network; (ii) alter, 
merge, modify, adapt, decrypt or translate the Software or 
related  Documentation,  or  decompile,  reverse  engineer, 
disassemble,  or  otherwise  reduce  the  Software  to  a 
human-perceivable form (except to the extent expressly 
permitted  by  law  notwithstanding  this  provision); 
(iii)  share,  sell,  rent,  lease,  or  sublicense  the  Software  or 
related Documentation; (iv) modify the Software or create 
derivative  works  based  upon  the  Software;  (v)  if  you 
make a backup copy of the Software and Documentation, 
you must reproduce all copyright notices and any other 
proprietary  legends  found  on  the  original  Software  and 
Documentation; (vi) use the Software for management of 
a business network with more than 8 computers; (vii) use 
the  Software  under  any  circumstances  for  competitive 
evaluation,  including  developing  competing  software; 
(ix) to the extent permitted under applicable law, assign, 
sublicense  or  otherwise  transfer  the  Software  unless 
the  prospective  assignee,  sublicensee  or  transferee 
expressly agrees to all the terms and conditions under this 
Agreement.

The  Software  and  Documentation  contain  trade  secrets 
and/or copyrighted materials of Cisco or its suppliers. You 
will not disclose or make available such trade secrets or 
copyrighted material in any form to any third party.

In the event that you fail to comply with this Agreement, 
the  license  granted  to  you  will  automatically  terminate, 
at  which  time  you  must  immediately  (i)  stop  using  the 
Cisco  Product  in  which  the  Software  is  embedded,  or 
(ii)  uninstall  the  Software  and  destroy  all  copies  of  the 
Software  and  Documentation  where  the  Software  is 
purchased separately. All other rights of both parties and 
all  other  provisions  of  this  Agreement  will  survive  this 
termination.

Ownership.

  The  Software  and  Documentation  are 

licensed  and  not  sold  to  you  by  Cisco  and  the  relevant 
third parties set forth in Schedule 3. Cisco and its licensors 
retain  all  right,  title  and  interest,  including  all  copyright 
and  intellectual  property  rights,  in  and  to,  the  Software 
and Documentation and all copies and portions thereof. 
All rights not specifically granted to you in this Agreement 
are  reserved  by  Cisco  and  its  licensors. Your  use  of  any 
software product from an entity other than Cisco that may 
have  been  recommended  by  Cisco  is  governed  by  such 
software product’s end user license agreement.

Links  and  Advertising.

  Cisco  may  provide  from  within 

the  Software  links  to  websites  or  third  party  software 
products  that  are  beyond  our  control.  Cisco  makes  no 
representations as to the quality, suitability, functionality, 
or  legality  of  any  sites  or  products  to  which  links  may 
be  provided,  and  you  hereby  waive  any  claim  you 
might  have  against  Cisco  with  respect  to  such  sites  or 
third  party  software  products.  Your  correspondence  or 

business  dealings  with,  or  participation  in  promotions 
of  advertisers  found  through  the  Software  and  any 
other  terms,  conditions,  warranties,  or  representations 
associated with such dealings, are solely between you and 
such advertiser. You agree that Cisco is not responsible or 
liable for any loss or damage of any sort incurred as the 
result of any such dealings or as the result of the presence 
of such advertisers in the Cisco Software.

Collection  and  Processing  of  Information.

  You  agree 

that  Cisco  and/or  its  affiliates  may,  from  time  to  time, 
collect and process information about your Cisco product 
and/or  the  Software  and/or  your  use  of  either  in  order 
(i)  to  enable  Cisco  to  offer  you  Upgrades;  (ii)  to  provide 
support  and  assistance  with  your  product  and/or  the 
Software;  (iii)  to  ensure  that  your  Cisco  product  and/or 
the Software is being used in accordance with the terms 
of  this  Agreement;  (iv)  to  provide  improvements  to  the 
way Cisco delivers technology to you and to other Cisco 
customers;  (v)  to  provide  reports  regarding  the  status 
and health of the network, including network traffic and 
application  usage;  (vi)  to  enable  Cisco  to  comply  with 
the terms of any agreements it has with any third parties 
regarding  your  Cisco  product  and/or  Software;  and/or 
(vii)  to  enable  Cisco  to  comply  with  all  applicable  laws 
and/or regulations, or the requirements of any regulatory 
authority or government agency. Cisco and/ or its affiliates 
may collect and process this information provided that it 
does not identify you personally. 

The  reports  feature  of  certain  Software  allows  you  to 
monitor the activity of computers running the Software in 
your home or small office. You must activate this feature in 
order to receive reports. If you activate the reports feature, 
you  agree  to  the  following:  (a)  the  Software  tracks  and 
monitors the following components and activities in your 
home or office: network traffic (e.g. megabytes per hour), 
application usage (the foreground window is tracked and 
the  time  each  application  is  in  the  foreground  during 
active usage of the computer) and internet history. (b) For 
all  computers  on  which  reports  feature  is  enabled,  the 
above information is transmitted to servers at Cisco and/
or a third party at periodic intervals while the computer 
is  online. This  information  is  associated  and  stored  with 
the  email  address  supplied  by  you  when  you  activated 
the  reports  feature. This  information  is  summarized  into 
a  formal  report  and  is  emailed  to  the  identified  email 
address.  (c)  Any  computer  on  the  network  running  the 
Software  can  enable  any  other  computer  (on  the  same 
primary network) to generate reports. When a computer 
is  enabled,  that  computer  shows  a  notification  that  it  is 
being  monitored.  As  long  as  that  computer  is  enabled, 
each time the Software is started the user of that particular 
computer will see a notification that it is being monitored 
by the reports feature. Any computer on the network with 
the  Software  installed  can  enable  or  disable  any  other 
computer from the reports feature.

Summary of Contents for Linksys WET54G

Page 1: ...USER GUIDE Wireless G Ethernet Bridge Model WET54G ...

Page 2: ...dress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary Network Secu...

Page 3: ...ppendix A Troubleshooting 11 Appendix B Specifications 12 Appendix C Warranty Information 13 Limited Warranty 13 Appendix D Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d Industrie Canada 16 Wireless Disclaimer 16 Avis de non responsabilité concernant les appareils sans fil 16 User Information for Consumer Produc...

Page 4: ... self test and remains lit after the self test has ended Ethernet Green This LED will be lit steadily when the Bridge is connected to the wired network The LED will flash when there is wired network traffic Wireless G Green This LED will be lit steadily when the Bridge is connected to the wireless network The LED will flash when there is wireless network traffic Back Panel Reset When pressed the R...

Page 5: ...le MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each...

Page 6: ...dge s current settings Help Provides explanations of various configuration settingsandlinkstoonlinetechnicalsupportresources You can also upgrade the Bridge s firmware using the Help screen SetupTab The Setup screen lets you configure the wired and wireless network settings for the Bridge Setup Firmware The version number of the Bridge s firmware is displayed here Firmware should be upgraded ONLY ...

Page 7: ...equipped devices to communicate directly with each other If you chose Ad Hoc mode then select the correct operating channel for your network from the Channel drop down menu This should match the channel setting of the other devices in your wireless network Select the appropriate network mode from the Mode drop down menu Keep the default Mixed if you have Wireless G 802 11g and Wireless B 802 11b d...

Page 8: ... wireless products After you enter the Passphrase click Generate to create WEP key s Keys 1 4 If you are not using a Passphrase then you can enter one or more WEP keys manually In each key field manually enter a set of values Do not leave a key field blank and do not enter all zeroes These are not valid key values If you are using 64 bit WEP encryption then each key must consist of exactly 10 hexa...

Page 9: ...y entering WEP keys you can enter a passphrase This passphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 32 alphanumeric characters This Passphrase function is compatible with Linksys wireless products only and cannot be used with Windows XP Zero Configuration If you want to communicate with non Linksys wireless products or Windows XP Zero Configur...

Page 10: ...n name of your wireless network in the User ID field Password This is the password used for your wireless network Enter the password in the Password field Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network or click Browse to browse for it Click Upload to upload the certificate Click Apply to save your changes If your page does not automatica...

Page 11: ...rinconsistentdataflow onlyminormodifications are recommended If a network packet is smaller than the preset RTS threshold size the RTS CTS mechanism will not be enabled The Router sends Request to Send RTS frames to a particular receiving station and negotiates the sending of a data frame After receiving an RTS the wireless station responds with a Clear to Send CTS frame to acknowledge the right t...

Page 12: ...layed here Wireless Settings SSID The Bridge s SSID is displayed here Network Type The Bridge s mode is displayed here Channel The Bridge s channel setting is displayed here Security The status of the Bridge s security is displayed here TX Rate The Bridge s transmission rate is displayed here Link Quality The quality of the Bridge s connection is displayed here Click Refresh to obtain the most up ...

Page 13: ...oad the Bridge s firmware upgrade file from the 1 Linksys website www linksys com Then extract the file On the 2 Help screen click Firmware Upgrade The 3 Firmware Upgrade screen will appear In the field provided enter the name of the extracted firmware upgrade file or click Browse to locate the file on your computer Firmware Upgrade After you have selected the appropriate file click 4 Upgrade and ...

Page 14: ...P address again The Bridge enabled PC won t communicate with a wireless enabled PC or printer Perform the following steps Check that the wireless enabled PC or printer is on the same wireless network as the PC using the Bridge Make sure that the SSID and network mode are the same for all devices connected to the same wireless network If the wireless LAN settings are okay make sure that all the dev...

Page 15: ... dBm 11Mbps CCK 12 1 dBm 54Mbps OFDM Security Features WEP Encryption WPA WEP Key Bits 64 128 bit Protocols 802 11b CCK 11Mbps CCK 5 5Mbps DQPSK 2Mbps DBPSK 1Mbps 802 11g OFDM 54Mbps Environmental Dimensions 4 96 x 1 06 x 4 21 126 x 27 x 107 mm Weight 8 50 oz 240 g Power 5V DC Certification FCC CE ICES 003 Operating Temp 32 to 104ºF 0 to 40ºC Storage Temp 4 to 158ºF 20 to 70ºC Operating Humidity 1...

Page 16: ...imited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE ...

Page 17: ... duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys co...

Page 18: ... environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use only No 26 ...

Page 19: ...tilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless network capac...

Page 20: ...rnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřady ...

Page 21: ...ποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménag...

Page 22: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Page 23: ...abrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenščina Slovene Okoljskeinformacijezastranke v Evropski uniji Evropska direktiva 2002 96 ES prepoveduje odlaganje opreme...

Page 24: ...E IS SUPPLIED AS PART OF ANOTHER PRODUCT THE UNUSED PRODUCT FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE SUBJECT TO THE RETURN PROCESS AND POLICIES OFTHE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A SUBSCRIPTION LICENSE AS INDICATED IN YOUR ORDER YOU ADDITIONALLY AGREE TO BE BOUND BY THE TERMS OF SERVICE SET FORTH IN SCHEDULE 2 I...

Page 25: ...isco with respect to such sites or third party software products Your correspondence or business dealings with or participation in promotions of advertisers found through the Software and any other terms conditions warranties or representations associated with such dealings are solely between you and such advertiser You agree that Cisco is not responsible or liable for any loss or damage of any so...

Page 26: ...und the purchase price of the Software media EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTHABOVEANDTOTHEMAXIMUMEXTENTPERMITTED BY APPLICABLE LAW ALL SOFTWARE PROVIDED BY CISCO IS PROVIDED AS IS WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND Without limiting the foregoing Cisco does not warrant that the operation of the product or software will be uninterrupted or error free Also due to the c...

Page 27: ...pect to any dispute with Cisco 2 Modifications Cisco may modify or cancel the terms of thisAgreementortheprice content ornatureoftheServices including discontinuing the Services program upon notice to you If Cisco modifies any of these terms you may cancel the Service by providing written notice to Cisco via www networkmagic com support of such cancellation and uninstalling the Software and discon...

Page 28: ...made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed under the terms of this G...

Page 29: ...rms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work ...

Page 30: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by t...

Page 31: ...nty for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot e...

Page 32: ...does You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Librar...

Page 33: ...e Library because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not ...

Page 34: ... copy modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such part...

Page 35: ...cision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE ...

Page 36: ...ERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OFTHE POSSIBILITY OF SUCH DAMAGE This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original ...

Page 37: ...NT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code ...

Reviews: