background image

43

Appendix E

Software License Agreement

Wireless-N Gigabit Router

If the modified program normally reads commands

c.

interactively  when run, you must cause it, when
started running for such interactive use in the most
ordinary way, to print or display an announcement
including an appropriate copyright notice and
a notice that there is no warranty (or else, saying
that you provide a warranty) and that users may
redistribute the program under these conditions,
and telling the user how to view a copy of 
this License. (Exception: if the Program itself is
interactive  but  does not normally print such an
announcement, your work based on the Program
is not required to print an announcement.)

These requirements apply to the modified work as
a whole.  If  identifiable  sections  of  that  work  are  not
derived from the Program, and can be reasonably
considered independent and separate works in
themselves, then this License, and its terms, do not
apply to those sections when you distribute them as
separate works. But when  you  distribute the same
sections as part of a whole which is a work based on
the Program, the distribution of the whole must be on
the terms of this License, whose permissions for other
licensees extend to the entire whole, and thus to each
and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights
or contest your rights to work written entirely by you;
rather, the intent is to exercise the right to control the
distribution of derivative or collective works based on
the Program. 

In addition, mere aggregation of another work not
based on the Program with  the Program (or with  a
work based on the Program) on a volume of a storage
or distribution medium does not bring the other work 
under the scope of this License. 

You may copy and distribute the Program (or a

3.

work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2
above provided that you also do one of the following:

Accompany it with the complete corresponding

a.

machine-readable source code,  which must be
distributed  under  the  terms  of  Sections 1 and  2
above on a medium customarily used for software
interchange; or, 

Accompany it with a written offer, valid for at least

b.

three years, to give any third party, for a charge
no more than your cost of physically performing
source distribution, a complete machine-readable
copy of the corresponding source code, to be
distributed under the terms of Sections 1 and 2
above on a medium customarily used for software
interchange; or, 

Accompany it with the information you received as

c.

to the offer to distribute corresponding source code.
(This alternative is allowed only for noncommercial
distribution and only if you received the program
in object code or executable form with such an
offer, in accord with Subsection b above.)

The source code for a work means the preferred form
of the work for making modifications to it. For an
executable work, complete source code means all
the source code for all modules it contains, plus any
associated interface definition files, plus the scripts
used to control compilation and installation of the
executable. However, as a special exception, the source
code  distributed need not include anything that is
normally distributed (in either source or binary form)
with the major components (compiler, kernel, and so
on) of the operating system on which the executable
runs, unless that component itself accompanies the
executable.

If distribution of executable or object code is made
by  offering access to copy  from a designated place,
then offering equivalent access to copy the source
code from the same place counts as distribution of 
the source code, even though  third parties are not
compelled to copy the source along with the object
code.

You may not copy, modify, sublicense, or distribute

4.

the Program except as expressly provided under
this License. Any attempt otherwise to copy, modify,
sublicense or distribute the Program is void, and will
automatically terminate your rights under this License.
However, parties who have received copies, or rights,
from you under this License will not have their licenses
terminated so long as such parties remain in full
compliance.

You are not required to accept this License, since you

5.

have not signed it. However, nothing else grants you
permission to modify or distribute the Program or its
derivative works. These actions are prohibited by law if 
you do not accept this License. Therefore, by modifying
or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License
to do so, and all its terms and conditions for copying,
distributing or modifying the Program or works based
on it. 

Each time you redistribute the Program (or any work 

6.

based on the Program), the recipient automatically
receives a license from the original licensor to copy,
distribute or modify the Program subject to these
terms and conditions. You may not impose any further
restrictions on the recipients’ exercise of the rights
granted herein. You are not responsible for enforcing
compliance by third parties to this License.

Summary of Contents for WRT310N

Page 1: ...USER GUIDE Wireless N Gigabit Router Model WRT310N ...

Page 2: ...y website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glossary ...

Page 3: ... Firewall 18 Security VPN Passthrough 19 Access Restrictions Internet Access 19 Applications and Gaming Single Port Forwarding 21 Applications and Gaming Port Range Forwarding 21 Applications Gaming Port Range Triggering 22 Applications and Gaming DMZ 22 Applications and Gaming QoS 23 Administration Management 25 Administration Log 26 Administration Diagnostics 26 Administration Factory Defaults 2...

Page 4: ...dustry Canada Statement 34 Avis d Industrie Canada 35 Wireless Disclaimer 35 Avis de non responsabilité concernant les appareils sans fil 35 User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE 36 Appendix E Software License Agreement 40 Software in Linksys Products 40 Software Licenses 40 ...

Page 5: ...e sure the client device supports Wi Fi Protected Setup WaituntiltheLEDisoff andthentryagain The LED flashes amber when a Wi Fi Protected Setup session is active and a second session begins The Router supports one session at a time Wait until the LED is off before starting the next Wi Fi Protected Setup session Wireless Blue The Wireless LED lights up when the wireless feature is enabled If the LE...

Page 6: ...ermine where you want to mount the Router Make 1 sure that the wall you use is smooth flat dry and sturdy Also make sure the location is within reach of an electrical outlet Drill two holes into the wall Make sure the holes are 2 152 mm 6 inches apart Insert a screw into each hole and leave 3 mm 3 0 12 inches of its head exposed Maneuver the Router so the wall mount slots line up 4 with the two sc...

Page 7: ...MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of each computer in you...

Page 8: ...s 192 168 1 1 in the Address field Then press Enter A login screen will appear Non Windows XP users will see a similar screen Leave the User name field blank The first time you open the Web based utility use the default password admin You can set a new password from the Administration tab s Management screen Click t OK to K continue Login Screen Setup Basic Setup The first screen that appears is t...

Page 9: ...utes you want to have elapsed before your Internet connection terminates The default Max Idle Time is 15 minutes Keep Alive Redial Period If you select this option the Router will periodically check your Internet connection If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field d you specify how often ...

Page 10: ...ction If you are disconnected then the Router will automatically re establish your connection To use this option select Keep Alive In the Redial Period field d you specify how often you want the Router to check the Internet connection The default Redial Period is 30 seconds Telstra Cable Telstra Cable is a service that applies to connections in Australia only Internet Connection Type Telstra Cable...

Page 11: ... server on your network or you don t want a DHCP server then select Disabled no other DHCP features will be available DHCP Reservation Click this button if you want to assign a fixed local IP address to a MAC address DHCP Reservation You will see a list of DHCP clients with the following information Client Name Interface IP Address and MAC Address DHCP Reservation Select Clients from DHCP Table s ...

Page 12: ...need to sign up for DDNS service with a DDNS service provider www dyndns org or www TZO com If you do not want to use this feature keep the default setting Disabled DDNS DDNS Service If your DDNS service is provided by DynDNS org then select DynDNS org from the drop down menu If your DDNS service is provided by TZO then select TZO com The features available on the DDNS screen will vary depending o...

Page 13: ...lick Save Settings to apply your changes or click Cancel Changes to cancel your changes Setup Advanced Routing This screen is used to set up the Router s advanced functions Operating Mode allows you to select the type s of advanced functions you use Dynamic Routing automatically adjusts how packets travel on your network Static Routing sets up a fixed route to another network destination Setup Adv...

Page 14: ... select Manual Proceed to the Basic Wireless Settings section To use Wi Fi Protected Setup select Wi Fi Protected Setup Proceed to the Wi Fi Protected Setup section BasicWireless Settings Wireless Basic Wireless Settings Manual Setup Network Mode From this drop down menu you can select the wireless standards running on your network If you have Wireless N Wireless G and Wireless B devices in your n...

Page 15: ...ce Click the 2 Wi Fi Protected Setup button on this screen After the client device has been configured click 3 OK Then refer back to your client device or its documentation for further instructions Method 2 Use this method if your client device has a Wi Fi Protected Setup PIN number Enter the PIN number in the 1 field on this screen Click 2 Register After the client device has been configured clic...

Page 16: ...dynamic encryption keys Select the type of algorithm AES or TKIP or AES The default is TKIP or AES Passphrase Enter a Passphrase of 8 63 characters Key Renewal Enter a Key Renewal period which instructs theRouterhowoftenitshouldchangetheencryptionkeys The default Group Key Renewal period is 3600 seconds WPA Enterprise This option features WPA used in coordination with a RADIUS server This should o...

Page 17: ...he port number of the RADIUS server The default value is 1812 Shared Secret Enter the key shared between the Router and the server Encryption Select a level of WEP encryption 40 64bits 10hexdigits or104 128bits 26hexdigits The default is 40 64 bits 10 hex digits Passphrase Enter a Passphrase to automatically generate WEP keys Then click Generate Key 1 4 If you did not enter a Passphrase enter the ...

Page 18: ...Wireless MAC Filter screen click r Close MAC 01 50 Enter the MAC addresses of the devices whose wireless access you want to block or allow Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Wireless AdvancedWireless Settings This Advanced Wireless Settings screen is used to set up the Router s advanced wireless functions These settings should only be adjusted ...

Page 19: ...smissions but will severely decrease performance The default is Auto Beacon Interval Enter a value between 1 and 65 535 milliseconds The Beacon Interval value indicates the frequency interval of the beacon A beacon is a packet broadcast by the Router to synchronize the wireless network The default value is 100 DTIM Interval This value between 1 and 255 indicates the interval of the Delivery Traffi...

Page 20: ... risk of not having access to Internet sites created using this programming language Select this feature to enable ActiveX filtering Deselect the feature to allow ActiveX usage Cookies A cookie is data stored on your computer and used by Internet sites when you interact with them Select this feature to filter cookies Deselect the feature to allow cookie usage Click Save Settings to apply your chan...

Page 21: ...te additional policies one at a time Select a number from the 1 Access Policy drop down y menu Enter a Policy Name in the field provided 2 To enable this policy select 3 Enabled Click 4 Edit List to select which PCs will be affected by the policy The List of PCs screen appears You can select a PC by MAC address or IP address You can also enter a range of IP addresses if you want this policy to aff...

Page 22: ...he server that should receive these requests Select Enabled to activate this entry For additional applications complete the following fields Application Name Enter the name you wish to give the application Each name can be up to 12 characters External Port Enter the external port number used by the server or Internet application Check with the Internet application documentation for more informatio...

Page 23: ... the computer that sends the matching data is remembered by the Router so that when the requested data returns through the Router the data is pulled back to the proper computer by way of IP address and port mapping rules Applications and Gaming Port Range Triggering Port RangeTriggering Application Name Enter the application name of the trigger Triggered Range For each application enter the starti...

Page 24: ...ent click Select To retrieve the most up to date information click Refresh To exit this screen and return to the DMZ screen click Z Close Click Save Settings to apply your changes or click Cancel Changes to cancel your changes Applications and Gaming QoS Quality of Service QoS ensures better service to high priority types of network traffic which may involve demanding real time applications such a...

Page 25: ...tails on the service ports used Select the protocol TCP or UDP or select Both Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your changes Your new entry will appear in the Summary list Online Games QoS Online Games Games Select the appropriate game Priority Select the appropriate priority High Medium Recommend Normal or Low Click Add to save your cha...

Page 26: ...e wireless access to the Router s web based utility You will only be able to access the utility via a wired connection if you disable the setting Keep the default Enabled to allow wireless access to the utility or select Disabled to block wireless access to the utility Remote Access Remote Management To permit remote access of the Router from outside the local network select Enabled Otherwise keep...

Page 27: ...Log To disable the Log function select Disabled To monitor traffic between the network and the Internet keep the default Enabled With logging enabled you can choose to view temporary logs View Log To view the logs click View Log Log View Log Log Type s Select Incoming Log Outgoing Log Security Log or DHCP Client Log Type Log s The Incoming Log will display a temporary log of the source IP addresse...

Page 28: ...he Administration Factory Defaults screen allows you to restore the Router s configuration to its factory default settings Administration Factory Defaults NOTE Donotrestorethefactorydefaultsunless you are having difficulties with the Router and have exhausted all other troubleshooting measures OncetheRouterisreset youwillhave to re enter all of your configuration settings Factory Defaults Restore ...

Page 29: ...s entered on the Basic Setup screen Internet Connection This section shows the current network information stored in the Router The information varies depending on the Internet connection type selected on the Basic Setup screen Click Refresh to update the on screen information Status Local Network The Local Network screen displays information about the k local wired network Status Local Network Lo...

Page 30: ...n about k your wireless network Status Wireless Wireless Network MAC Address The MAC address of the Router s local wireless interface is displayed here Mode Displayed here is the wireless mode used by the network Network Name SSID Displayed here is the name of the wireless network which is also called the SSID Radio Band Shown here is the Radio Band setting selected on the Basic Wireless Settings ...

Page 31: ...and then insert the setup CD into your computer Click Setup and follow the on screen instructions When you double click the web browser you are prompted for a username and password If you want to get rid of the prompt follow these instructions Launch the web browser and perform the following steps these steps are specific to Internet Explorer but are similar for other browsers Select 1 Tools Inter...

Page 32: ...CAT 5e Number of Antennas 3 Max Rated RF power 17 5 dBm 1 5 dB UPnP able cert Able Security Features WEP WPA WPA2 Security Key Bits 128 Bit Environmental Dimensions 7 95 x 6 3 x 1 34 202 x 160 x 34 mm Weight 13 40 oz 0 38 kg Power 12V Certification FCC CE IC 03 Wi Fi Operating Temp 32 to 104 F 0 to 40 C Storage Temp 4 to 140 F 20 to 60 C Operating Humidity 10 to 85 Noncondensing Storage Humidity 5...

Page 33: ...ited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DU...

Page 34: ...ies VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys com su...

Page 35: ... environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this product in the USA is firmware limited to channels 1 through 11 Safety Notices Caution To reduce the risk of fire use only No 26 ...

Page 36: ...ilisé à une distance d au moins 20 cm entre l antenne et le corps de l utilisateur L émetteur ne doit pas être placé près d une autre antenne ou d un autre émetteur ou fonctionner avec une autre antenne ou un autre émetteur Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802 11 specifications Actual performance can vary including lower wireless network capaci...

Page 37: ...směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřa...

Page 38: ...ίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ménages...

Page 39: ...endezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagworde...

Page 40: ...e zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganje o...

Page 41: ...INKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED AS PART O...

Page 42: ...il to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING NE...

Page 43: ...o prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed un...

Page 44: ...f Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means...

Page 45: ...w versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Fre...

Page 46: ...or the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effect...

Page 47: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 48: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whe...

Page 49: ... modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights underthisLicense However partieswhohavereceived copies or rights from you under this License will not have their licenses terminated so long as such parties r...

Page 50: ...y NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICUL...

Page 51: ...des cryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft com All rights reserved This package is an SSL implementation written by Eric Young eay cryptsoft com The implementation was written so as to conform with Netscape s SSL This library is free for...

Page 52: ...VER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Thelicenseanddistributiontermsforanypubliclyavailable version or derivative of this code cannot be changed i e this code cannot simply be copied and put under another distribution l...

Reviews: