background image

23

AppendixE:SoftwareEndUserLicenseAgreement

morepeopletousethewholeGNUoperatingsystem,as

wellasitsvariant,theGNU/Linuxoperatingsystem.
Although the Lesser General Public License is Less

protectiveoftheusers’freedom,itdoesensurethatthe

userofaprogramthatislinkedwiththeLibraryhasthe

freedomandthewherewithaltorunthatprogramusinga

modifiedversionoftheLibrary.
Theprecisetermsandconditionsforcopying,distribution

and modification follow.  Pay close attention to the

difference between a“work based on the library” and a

“work that uses the library”.  The former contains code

derived from the library, whereas the latter must be

combinedwiththelibraryinordertorun.

GNULESSERGENERALPUBLICLICENSE

TERMSANDCONDITIONSFORCOPYING,

DISTRIBUTIONANDMODIFICATION

0. ThisLicenseAgreementappliestoanysoftwarelibrary

orotherprogramwhichcontainsanoticeplacedby

thecopyrightholderorotherauthorizedpartysaying

it may be distributed under the terms of this Lesser

GeneralPublicLicense(alsocalled“thisLicense”).Each

licenseeisaddressedas“you”.
A“library” means a collection of software functions

and/ordatapreparedsoastobeconvenientlylinked

withapplicationprograms(whichusesomeofthose

functionsanddata)toformexecutables.
The“Library”,below,referstoanysuchsoftwarelibrary

orworkwhichhasbeendistributedundertheseterms.

A“workbasedontheLibrary”meanseithertheLibrary

or any derivative work under copyright law: that is

to say, a work containing the Library or a portion

of it, either verbatim or with modifications and/or

translated straightforwardly into another language.

(Hereinafter,translationisincludedwithoutlimitation

intheterm“modification”.)
“Sourcecode”foraworkmeansthepreferredformof

theworkformakingmodificationstoit.Foralibrary,

completesourcecodemeansallthesourcecodefor

allmodulesitcontains,plusanyassociatedinterface

definition files, plus the scripts used to control

compilationandinstallationofthelibrary.
Activities other than copying, distribution and

modificationarenotcoveredbythisLicense;theyare

outsideitsscope.Theactofrunningaprogramusing

theLibraryisnotrestricted,andoutputfromsucha

program is covered only if its contents constitute a

work based on the Library (independent of the use

oftheLibraryinatoolforwritingit).Whetherthatis

truedependsonwhattheLibrarydoesandwhatthe

programthatusestheLibrarydoes.

1. You may copy and distribute verbatim copies of the

Library’s complete source code as you receive it, in

any medium, provided that you conspicuously and

appropriately publish on each copy an appropriate

copyright notice and disclaimer of warranty; keep

intactallthenoticesthatrefertothisLicenseandto

theabsenceofanywarranty;anddistributeacopyof

thisLicensealongwiththeLibrary.
Youmaychargeafeeforthephysicalactoftransferring

a copy, and you may at your option offer warranty

protectioninexchangeforafee.

2. YoumaymodifyyourcopyorcopiesoftheLibraryor

any portion of it, thus forming a work based on the

Library, and copy and distribute such modifications

orworkunderthetermsofSection1above,provided

thatyoualsomeetalloftheseconditions:
a. Themodifiedworkmustitselfbeasoftwarelibrary.
b. You must cause the files modified to carry

prominent notices stating that you changed the

filesandthedateofanychange.

c. You must cause the whole of the work to be

licensedatnochargetoallthirdpartiesunderthe

termsofthisLicense.

d. If a facility in the modified Library refers to a

function or a table of data to be supplied by an

application program that uses the facility, other

than as an argument passed when the facility is

invoked,thenyoumustmakeagoodfaitheffort

to ensure that, in the event an application does

not supply such function or table, the facility

still operates, and performs whatever part of its

purposeremainsmeaningful.

(Forexample,afunctioninalibrarytocomputesquare

roots has a purpose that is entirely well-defined

independentoftheapplication.Therefore,Subsection

2drequiresthatanyapplication-suppliedfunctionor

table used by this function must be optional: if the

applicationdoesnotsupplyit,thesquarerootfunction

muststillcomputesquareroots.)
These requirements apply to the modified work as

awhole.Ifidentifiablesectionsofthatworkarenot

derived from the Library, and can be reasonably

considered independent and separate works in

themselves, then this License, and its terms, do not

applytothosesectionswhenyoudistributethemas

separate works.  But when you distribute the same

sectionsaspartofawholewhichisaworkbasedon

theLibrary,thedistributionofthewholemustbeon

thetermsofthisLicense,whosepermissionsforother

licenseesextendtotheentirewhole,andthustoeach

andeverypartregardlessofwhowroteit.
Thus,itisnottheintentofthissectiontoclaimrights

orcontestyourrightstoworkwrittenentirelybyyou;

rather,theintentistoexercisetherighttocontrolthe

Summary of Contents for Valet Connector AM10

Page 1: ...user guide ...

Page 2: ...apter 2 Installation 2 Chapter 3 Wireless Network Configuration 4 Appendix A Troubleshooting 8 Appendix B Specifications 9 Appendix C Warranty Information 10 Appendix D Regulatory Information 12 Appendix E Software End User License Agreement 15 ...

Page 3: ...en the Valet Connector is plugged into the USB Extension Base or your laptop computer s USB port you can store the cap by attaching it to the Valet Connector Tostorethecap pushitontothetopoftheValetConnector until it fits snugly USB Extension Base The Valet Connector comes attached to its USB Extension Base Using the Valet Connector in its Base may often improve wireless signal performance especia...

Page 4: ...tup on the Valet Connector directly To do so perform the following steps for your specific operating system Windows 7 a Go to Start Computer and double click Cisco Valet Connector Setup b Double click Setup Windows Vista a Go to Start Computer and double click Cisco Valet Connector Setup b Double click Setup Windows XP a Go to Start My Computer and click Cisco Valet Connector Setup b Double click ...

Page 5: ...y Wi Fi Protected Access WPA WPA2 Enter the passphrase also known as a pre shared key Click Next Go to step 9 Enter the Wireless Password 8 Follow the on screen prompts to use your Easy Setup Key Click Next Insert your Easy Setup Key 9 The installation is complete Click Close You are Now Connected to Your Wireless Network NOTE If you have any problems during the installation process refer to the F...

Page 6: ...ouse pointer hovers over the icon the status information of your wireless connection appears Wireless Connection Status New Wireless Connection To connect to a different wireless network 1 Click the Wireless Network Configuration utility icon A list of available wireless networks appears Available Wireless Networks 2 Select your network and then click Connect Select Network 3 If your network does ...

Page 7: ...o a different wireless network 1 Right click the Wireless Network Configuration utility icon 2 Click Connect to a network Utility Menu 3 Select your network and then click Connect Select Network 4 If your network uses wireless security go to step 5 If your network does not use wireless security this screenappears Toconnecttoyourunsecurednetwork click Connect Anyway and go to step 7 Unsecured Netwo...

Page 8: ...o save your settings Click Close Connected to Network 8 The Set Network Location screen may appear This screen helps apply the correct settings for your type of location Select Home Work or Public location Select Network Location 9 This screen varies according to the selected location Click Close Network Settings Saved NOTE For help with the Wireless Network Configuration utility refer to Help and...

Page 9: ...able Wireless Network 3 Click Connect Anyway to connect theValet Connector to your network and then go to step 5 No Wireless Security 4 If your network uses Wired Equivalent Privacy WEP wireless security enter the WEP key in the Network key and Confirm network key fields If your network uses Wi Fi Protected Access WPA WPA2 wireless security enter the passphrase in the Network key and Confirm netwo...

Page 10: ...ert it into the computer s USB slot Your computer cannot communicate with the other computers on your wireless network 1 Make sure that the computers are powered on 2 Make sure that the Valet Connector is configured with the same Wireless Network Name also called the SSID or Service Set Identifier and wireless security settings as the other computers on your wireless network WEB If your questions ...

Page 11: ...0 20 MHz 92 dBm Typical MCS15 40 MHz 69 dBm Typical MCS0 40 MHz 90 dBm Typical Antenna Gain in dBi Antenna 1 0 33 dBi Antenna 2 1 4 dBi Security Features WEP WPA WPA2 Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 15 x 1 00 x 0 49 79 9 x 25 4 x 12 4 mm Weight 0 39 oz 11 g Certification FCC UL CB CE Operating Temp 0 to 40 C 32 to 104 F Storage Temp 20 to 70 C 4 to 158 F Opera...

Page 12: ...d Limitations This limited warranty does not apply if a the product assembly seal has been removed or damaged b the product has been altered or modified except by Cisco c the product damage was caused by use with non Cisco products d the product has not been installed operated repaired or maintained in accordance with instructions supplied by Cisco e the product has been subjected to abnormal phys...

Page 13: ...and effect Obtaining Warranty Service If you have a question about your product or experience a problem with it please go to www myciscohome com support where you will find a variety of online support tools and information to assist you with your product If the product proves defective during the Warranty Period contact Cisco Technical Support or if you purchased your product from a service provid...

Page 14: ...evicemaynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation The availability of some specific channels and or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination The firmware setting is not accessible by the end user FCC Radiation Expo...

Page 15: ... conforme aux limites d exposition aux radiofréquences établies pour un environnement non contrôlé Pour assurer le maintien de cette conformité l utilisateur doit suivre les consignes d utilisation décrites dans le présent manuel Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless network ...

Page 16: ... separarse de los residuos domésticos convencionales con vistas a su eliminación Es responsabilidad suya desechar este y cualesquiera otros aparatos eléctricos y electrónicos a través de los puntos de recogida que ponen a su disposición el gobierno y lasautoridadeslocales Aldesecharyreciclarcorrectamenteestos aparatos estará contribuyendo a evitar posibles consecuencias negativas para el medio amb...

Page 17: ...tions of the web sites including the Terms of Use located at the web site you are using as applicable and as amended from time to time Software Licenses The software licenses applicable to software from Cisco are made available at the Cisco public web site at www myciscohome com and www myciscohome com gpl respectively For Your convenience of reference a copy of the Cisco Software License Agreemen...

Page 18: ...sed and not sold to You by Cisco and the relevant third parties set forth in Schedule 2 Cisco its suppliers and its licensors respectively retain all right title and interest including all copyright and intellectual property rights in and to the Technology and Documentation and all copies derivatives and portions thereof All rights not specifically granted to You in this Agreement are reserved by ...

Page 19: ...ances where we apply an Upgrade automatically in order to comply with changes in legislation legal security or regulatory requirements or as a result of requirements to comply with the terms of any agreements Cisco has with any third parties regarding Your Cisco product and or the Software You will always be notified of any Upgrades being delivered to You In addition Cisco reserves the right to Up...

Page 20: ...ure to comply with any term of this Agreement Technical Support This limited warranty is neither a service nor a support contract Information about Cisco s current technical support offerings and policies including any fees for support services can be found at www myciscohome com support Export Software including technical data may be subject to U S export control laws and regulations and or expor...

Page 21: ...rotection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by softw...

Page 22: ...ted under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physically performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above...

Page 23: ...ical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the ...

Page 24: ...se terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by someone else and passed on the recipients ...

Page 25: ...he program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of t...

Page 26: ... work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline ...

Page 27: ...in in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License t...

Page 28: ...ermission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS N...

Page 29: ...their names without prior written permission of the OpenSSL Project 6 Redistributionsofanyformwhatsoevermustretainthe following acknowledgment This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http www openssl org THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRA...

Page 30: ... tjh cryptsoft com THIS SOFTWARE IS PROVIDED BY ERIC YOUNG AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT ...

Page 31: ...ed trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 10021610NC AI ...

Reviews: