WRP400 V10 Ug B-Web
WRP400 V10 Ug B-Web
Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.
Resource Website
Linksys www.linksys.com
Glossary www.linksys.com/glossary
Appendix A: Troubleshooting 37
Appendix B: Specifications 39
Appendix C: Warranty Information 41
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Exclusions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Back Panel
Placement Positions
There are three ways to physically install the Router. The
first way is to place the Router horizontally on a surface.
The second way is to stand the Router vertically on a Wall-Mounting Placement
surface. The third way is to mount the Router on a wall. The Router has four wall-mount slots on its back panel.
The distance between two adjacent slots is 60 mm
Horizontal Placement (2.36 inches).
The Router has four rubber feet on its bottom panel. Place Two screws are needed to mount the Router.
the Router on a level surface near an electrical outlet.
Suggested Mounting Hardware
2.5-3.0 mm
4-5 mm 1-1.5 mm
60 mm
For wireless products such as access points and routers, Additional Security Tips
you will be asked for a password when you want to change
•• Keep wireless routers, access points, or gateways away
their settings. These devices have a default password set
from exterior walls and windows.
by the factory. The Linksys default password is admin.
Hackers know these defaults and may try to use them •• Turn wireless routers, access points, or gateways
to access your wireless device and change your network off when they are not being used (at night, during
settings. To thwart any unauthorized changes, customize vacations).
the device’s password so it will be hard to guess.
•• Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys routers give you the ability to enable Media Access WEB: For more information on wireless
Control (MAC) address filtering. The MAC address is a security, visit www.linksys.com/security
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.
Chapter 3:
Advanced Configuration
After setting up the Router with the Setup Wizard (located
on the CD-ROM), the Router will be ready for use. However,
if you’d like to change its advanced settings, use the
Router’s web-based utility. This chapter describes each
web page of the utility and each page’s key functions. You
can access the utility via a web browser on a computer
connected to the Router.
The web-based utility has these main tabs: Setup, Wireless,
Security, Access Restrictions, Applications & Gaming,
Administration, Status, and Voice. Additional tabs will be
available after you click one of the main tabs.
Static IP this option, select Keep Alive. In the Redial Period field,
you specify how often you want the Router to check
If you are required to use a permanent IP address to the Internet connection. The default Redial Period is
connect to the Internet, select Static IP. 30 seconds.
PPTP
Point-to-Point Tunneling Protocol (PPTP) is a service that
applies to connections in Europe only.
Some DSL-based service providers use PPPoE (Point- Subnet Mask This is the Router’s Subnet Mask, as seen
to-Point Protocol over Ethernet) to establish Internet by users on the Internet (including your service provider).
connections. If you are connected to the Internet through Enter the Subnet Mask provided by your service provider.
a DSL line, check with your service provider to see if they Default Gateway Enter the IP address of the service
use PPPoE. If they do, you will have to enable PPPoE. provider server, which is provided by your service
provider.
User Name and Password Enter the User Name and
Password provided by your service provider.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
Internet Connection Type > PPPoE your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
User Name and Password Enter the User Name and automatically re-establish your connection as soon as you
Password provided by your service provider. attempt to access the Internet again. To use this option,
Service Name (Optional) If provided by your service select Connect on Demand. In the Max Idle Time field,
provider, enter the Service Name. enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Connect on Demand: Max Idle Time You can configure Max Idle Time is 5 minutes.
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If Keep Alive: Redial Period If you select this option, the
your Internet connection has been terminated due to Router will periodically check your Internet connection. If
inactivity, Connect on Demand enables the Router to you are disconnected, then the Router will automatically
automatically re-establish your connection as soon as you re-establish your connection. To use this option, select
attempt to access the Internet again. To use this option, Keep Alive. In the Redial Period field, you specify how often
select Connect on Demand. In the Max Idle Time field, you want the Router to check the Internet connection. The
enter the number of minutes you want to have elapsed default value is 30 seconds.
before your Internet connection terminates. The default
Max Idle Time is 5 minutes.
Keep Alive: Redial Period If you select this option,
the Router will periodically check your Internet
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use
Wireless-G Broadband Router with 2 Phone Ports 9
Chapter 3 Advanced Configuration
User Name and Password Enter the User Name and •• PPTP or L2TP: 1460
Password provided by your service provider. •• Telstra Cable: 1500
Connect on Demand: Max Idle Time You can configure Static DNS 1-3 The Domain Name System (DNS) is how
the Router to cut the Internet connection after it has been the Internet translates domain or website names into
Network Setup
The Network Setup section changes the settings on the
network connected to the Router’s Ethernet ports. Wireless
setup is performed through the Wireless tab.
Router IP
DHCP Reservation
This presents both the Router’s Local IP Address and
Subnet Mask as seen by your network. •• Select Clients from DHCP Table Click the Select
check box to reserve a client’s IP address. Then click
Add Clients.
•• Manually Adding Client To manually assign an IP
Router IP
address, enter the client’s name in the Enter Client
Name field. Enter the IP address you want it to have in
DHCP Server Setting the Assign IP Address field. Enter its MAC address in the
The settings allow you to configure the Router’s Dynamic To This MAC Address field. Then click Add.
Host Configuration Protocol (DHCP) server function. The Clients Already Reserved
Router can be used as a DHCP server for your network. A
DHCP server automatically assigns an IP address to each A list of DHCP clients and their fixed local IP addresses
computer on your network. If you choose to enable the will be displayed at the bottom of the screen. If you
Router’s DHCP server option, make sure there is no other want to remove a client from this list, click Remove.
DHCP server on your network.
Click Save Settings to apply your changes, or click
Cancel Changes to cancel your changes. To view the
most up-to-date information, click Refresh. To exit this
screen, click Close.
DNS Proxy The DNS proxy relays DNS requests to the
current public network DNS server for the proxy, and
it replies as a DNS resolver to the client device on the
network. To enable the DNS Proxy feature, select Enabled.
DHCP Server Setting To disable the DNS Proxy feature, keep the default,
Disabled.
DHCP Server DHCP is enabled by factory default. If you
Starting IP Address Enter a value for the DHCP server
already have a DHCP server on your network, or you don’t
to start with when issuing IP addresses. Because the
want a DHCP server, then select Disabled (no other DHCP
Router’s default IP address is 192.168.15.1, the Starting
features will be available).
IP Address must be 192.168.15.2 or greater, but smaller
DHCP Reservation Click this button if you want to assign than 192.168.15.253. The default Starting IP Address is
a fixed local IP address to a MAC address. 192.168.15.100.
DHCP Reservation Maximum DHCP Users Enter the maximum number of
computers that you want the DHCP server to assign IP
You will see a list of DHCP clients with the following addresses to. This number cannot be greater than 253.
information: Client Name, Interface, IP Address, and The default is 50.
MAC Address.
IP Address Range Displayed here is the range of available
IP addresses.
Client Lease Time The Client Lease Time is the amount
of time a network user will be allowed connection to the
Router with their current dynamic IP address. Enter the www.dyndns.org or www.TZO.com. If you do not want to
amount of time, in minutes, that the user will be “leased” use this feature, keep the default setting, Disabled.
this dynamic IP address. After the time is up, the user will
be automatically assigned a new dynamic IP address. The DDNS
default is 0 minutes, which means one day.
DDNS Service
Static DNS The Domain Name System (DNS) is how the
Internet translates domain or website names into Internet If your DDNS service is provided by DynDNS.org, then
addresses or URLs. Enter the local IP address of the DNS select DynDNS.org from the drop-down menu. If your
server, which is provided by your service provider. If you DDNS service is provided by TZO, then select TZO.com.
wish to use a different DNS server, enter that IP address The features available on the DDNS screen will vary,
in this field. The Router will use this for quicker access to a depending on which DDNS service provider you use.
functioning DNS server.
DynDNS.org
WINS The Windows Internet Naming Service (WINS)
manages each PC’s interaction with the Internet. If you
use a WINS server, enter that server’s IP address here.
Otherwise, leave this blank.
Time Setting
Time Zone Select the time zone in which your network
functions from this drop-down menu.
Automatically adjust clock for daylight saving
changes Select this option if you want the Router to
automatically adjust for daylight saving time. This option
is enabled by default.
Time Server Address If you want to use the Router’s
default Network Time Protocol (NTP) server, keep the
default, Auto. If you want to specify the NTP server, select
Manual, and enter the URL or IP address of the NTP server Setup > DDNS > DynDNS
you want to use.
User Name Enter the User Name for your DDNS account.
Resync Timer The timer controls how often the Router
resyncs with the NTP server. Enter the number of seconds Password Enter the Password for your DDNS account.
you want the interval to be, or keep the default, 3600 Host Name The is the DDNS URL assigned by the DDNS
seconds. service.
System Select the DynDNS service you use: Dynamic,
Static, or Custom. The default selection is Dynamic.
Mail Exchange (Optional) Enter the address of your mail
exchange server, so e-mails to your DynDNS address go to
your mail server.
Time Setting
Backup MX This feature allows the mail exchange server
Click Save Settings to apply your changes, or click Cancel to be a backup. To disable this feature, keep the default,
Changes to cancel your changes. Disabled. To enable the feature, select Enabled. If you
are not sure which setting to select, keep the default,
Setup > DDNS Disabled.
The Router offers a Dynamic Domain Name System (DDNS) Wildcard This setting enables or disables wildcards
feature. DDNS lets you assign a fixed host and domain for your host. For example, if your DDNS address is
name to a dynamic Internet IP address. It is useful when myplace.dyndns.org and you enable wildcards, then
you are hosting your own website, FTP server, or other x.myplace.dyndns.org will work as well (x is the wildcard).
server behind the Router. To disable wildcards, keep the default, Disabled. To enable
wildcards, select Enabled. If you are not sure which setting
Before you can use this feature, you need to sign to select, keep the default, Disabled.
up for DDNS service with a DDNS service provider,
Internet IP Address The Router’s Internet IP address is
displayed here. Because it is dynamic, it will change.
Wireless-G Broadband Router with 2 Phone Ports 12
Chapter 3 Advanced Configuration
Status The status of the DDNS service connection is MAC Address Clone
displayed here.
Enabled/Disabled To have the MAC address cloned,
Update To manually trigger an update, click this button. select Enabled.
Click Save Settings to apply your changes, or click Cancel MAC Address Enter the MAC address registered with
Changes to cancel your changes. your service provider here.
TZO.com Clone Your PC’s MAC Click this button to clone the MAC
address of the computer you are using.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
NAT
Enabled/Disabled If this Router is hosting your network’s
connection to the Internet, keep the default, Enabled. If
another router exists on your network, select Disabled.
When the NAT setting is disabled, dynamic routing will be
enabled.
Method #1
Use this method if your client device has a Wi-Fi Protected
Setup button.
1. Click or press the Wi-Fi Protected Setup button on
the client device.
2. Click the Wi‑Fi Protected Setup button on this
screen.
3. After the client device has been configured, click
OK. Then refer back to your client device or its
documentation for further instructions.
Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)
Method #2
Use this method if your client device has a Wi-Fi Protected
Setup PIN number.
1. Enter the PIN number in the field on this screen.
2. Click Register.
3. After the client device has been configured, click
OK. Then refer back to your client device or its
documentation for further instructions.
Method #3
Use this method if your client device asks for the Router’s
PIN number.
Select the security method for your wireless network. Group Key Renewal Enter a Group Key Renewal period,
Proceed to the appropriate instructions. If you do not which instructs the Router how often it should change the
want to use wireless security, keep the default, Disabled. encryption keys. The default is 3600 seconds.
WPA Algorithms WPA supports two encryption methods, WPA Algorithms WPA supports two encryption methods,
TKIP and AES, with dynamic encryption keys. Select the TKIP and AES, with dynamic encryption keys. Select the
type of algorithm, TKIP or AES. The default is TKIP. type of algorithm, TKIP or AES. The default is TKIP.
WPA Shared Key Enter a WPA Shared Key of 8-63 RADIUS Server Address Enter the IP address of the
characters. RADIUS server.
Group Key Renewal Enter a Group Key Renewal period, RADIUS Port Enter the port number of the RADIUS
which instructs the Router how often it should change the server. The default value is 1812.
encryption keys. The default is 3600 seconds. Shared Key Enter the key shared between the Router
and the server.
WPA2 Personal
Key Renewal Timeout Enter a Key Renewal Timeout
period, which instructs the Router how often it should
change the encryption keys. The default is 3600 seconds.
WPA2 Enterprise
This option features WPA2 used in coordination with a
RADIUS server. (It should only be used when a RADIUS
server is connected to the Router.)
Key 1-4 If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key Select which TX (Transmit) Key to use. The default
is 1.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
WEP
WEP is a basic encryption method, which is not as secure
as WPA.
Firewall
SPI Firewall Protection To use firewall protection, keep
the default, Enabled. To turn off firewall protection, select
Disabled.
Summary
Summary
The policies are listed with the following information:
No., Policy Name, Access, Days, Time of Day, and status
(Enabled). To enable a policy, select Enabled. To delete
a policy, click Delete. Click Save Settings to save your
changes, or click Cancel Changes to cancel your changes.
To return to the Internet Access Policy screen, click Close.
List of PCs
6. Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select Everyday. Then
enter a range of hours and minutes during which the
policy will be in effect, or select 24 Hours.
7. You can block websites with specific URL addresses.
Enter each URL in a separate URL field.
8. You can also block websites using specific keywords.
Enter each keyword in a separate Keyword field.
9. You can filter access to various services accessed
over the Internet, such as FTP or telnet. (You
can block up to three applications per policy.)
The Single Port Forwarding screen allows you to customize Protocol Select the protocol used for this application,
port services for common applications on this screen. either TCP, UDP, or Both.
When users send these types of requests to your network via To IP Address For each application, enter the IP address
the Internet, the Router will forward those requests to the of the PC that should receive the requests. If you assigned
appropriate servers (computers). Before using forwarding, a static IP address to the PC, then you can click DHCP
you should assign static IP addresses to the designated Reservation on the Basic Setup screen to look up its static
servers (use the DHCP Reservation feature on the Basic Setup IP address.
screen). Enabled For each application, select Enabled to enable
port forwarding.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
Start~End Port Enter the number or range of port(s) Forwarded Range For each application, enter the starting
used by the server or Internet applications. Check and ending port numbers of the forwarded port number
with the Internet application documentation for more range. Check with the Internet application documentation
information. for the port number(s) needed.
Protocol Select the protocol used for this application, Enabled Select Enabled to enable port triggering for the
either TCP, UDP, or Both. applications you have defined.
To IP Address For each application, enter the IP address Click Save Settings to apply your changes, or click Cancel
of the PC running the specific application. If you assigned Changes to cancel your changes.
a static IP address to the PC, then you can click DHCP
Reservation on the Basic Setup screen to look up its static Applications and Gaming > DMZ
IP address.
The DMZ feature allows one network computer to be
Enabled Select Enabled to enable port forwarding for exposed to the Internet for use of a special-purpose
the applications you have defined. service such as Internet gaming or videoconferencing.
DMZ hosting forwards all the ports at the same time to
Click Save Settings to apply your changes, or click Cancel
one PC. The Port Range Forwarding feature is more secure
Changes to cancel your changes.
because it only opens the ports you want to have opened,
while DMZ hosting opens all the ports of one computer,
exposing the computer to the Internet.
DMZ
Any PC whose port is being forwarded must have its DHCP
client function disabled and should have a new static IP
address assigned to it because its IP address may change
when using the DHCP function.
Enabled/Disabled To disable DMZ hosting, select
Disabled. To expose one PC, select Enabled. Then
configure the following settings:
Source IP Address If you want any IP address to be the
source, select Any IP Address. If you want to specify an IP
address or range of IP addresses as the designated source,
Applications and Gaming > QoS
select and complete the IP address range fields.
Destination If you want to specify the DMZ host by IP
address, select IP Address and enter the IP address in
QoS (Quality of Service)
the field provided. If you want to specify the DMZ host Wireless
by MAC address, select MAC Address and enter the MAC
address in the field provided. To retrieve this information, WMM Support If you have other devices that support
click DHCP Client Table. Wi‑Fi Multimedia (WMM) on your network, select Enabled.
Otherwise, keep the default, Disabled.
No Acknowledgement If you want to disable the Router’s
Acknowledgement feature, so the Router will not re-send
data if an error occurs, then select Enabled. Otherwise,
keep the default, Disabled.
select Manual, and enter the appropriate number in the Game Select the appropriate game. If you select Add a
field provided. New Game, follow the Add a New Game instructions.
Application
Applications Select the appropriate application. If you
select Add a New Application, follow the Add a New
Application instructions.
Priority Select the appropriate priority: High, Medium,
Normal, or Low.
Click Add to save your changes. Your new entry will appear QoS > Add a New Game
in the Summary list.
Enter a Name Enter any name to indicate the name of
Add a New Application the entry.
Port Range Enter the port range that the application will
be using. For example, if you want to allocate bandwidth
for FTP, you can enter 21-21. If you need services for an
application that uses from 1000 to 1250, you enter 1000-
1250 as your settings. You can have up to three ranges
to define for this bandwidth allocation. Port numbers
can range from 1 to 65535. Check your application’s
documentation for details on the service ports used.
QoS > Add a New Application
Enter a Name Enter any name to indicate the name of Select the protocol TCP, UDP, or Both.
the entry. Priority Select the appropriate priority: High, Medium
Port Range Enter the port range that the application will (Recommend), Normal, or Low.
be using. For example, if you want to allocate bandwidth Click Add to save your changes. Your new entry will appear
for FTP, you can enter 21-21. If you need services for an in the Summary list.
application that uses from 1000 to 1250, you enter 1000-
1250 as your settings. You can have up to three ranges MAC Address
to define for this bandwidth allocation. Port numbers
can range from 1 to 65535. Check your application’s
documentation for details on the service ports used.
Ethernet Port
Summary
This lists the QoS entries you have created for your
applications and devices.
Priority This column displays the bandwidth priority of
High, Medium, Normal, or Low.
Name This column displays the application, device, or
port name.
Information This column displays the port range or Administration > Management
MAC address entered for your entry. If a pre-configured
application or game was selected, there will be no valid Management
entry shown in this section.
Remove Click this button to remove an entry. Router Access
Edit Click this button to make changes. To ensure the Router’s security, you will be asked for your
password when you access the Router’s web-based utility.
Click Save Settings to apply your changes, or click Cancel The default is admin.
Changes to cancel your changes.
Router Password Enter a new password for the Router.
Administration > Management Re-enter to confirm Enter the password again to
confirm.
The Administration > Management screen allows the
network’s administrator to manage specific Router Web Access
functions for access and security.
Web Utility Access HTTP (HyperText Transport Protocol)
is the communications protocol used to connect to servers
on the World Wide Web. HTTPS uses SSL (Secured Socket
Layer) to encrypt data transmitted for higher security.
Select HTTP or HTTPS. HTTP is the default.
Web Utility Access via Wireless If you are using the
Router in a public domain where you are giving wireless
access to your guests, you can disable wireless access to
the Router’s web-based utility. You will only be able to
access the utility via a wired connection if you disable
the setting. Keep the default, Enabled, to allow wireless
access to the utility, or select Disabled to block wireless
access to the utility.
Log
•• Type Select Incoming Log, Outgoing Log, Security
Log, or DHCP Client Log.
•• <Type> Log The Incoming Log will display a temporary
log of the source IP addresses and destination
port numbers for the incoming Internet traffic. The
Outgoing Log will display a temporary log of the
local IP addresses, destination URLs/IP addresses, and
service/port numbers for the outgoing Internet traffic.
The Security log will display the login information for
the web-based utility. The DHCP Client Log will display
the LAN DHCP server status information. Diagnostics > Ping
Click Refresh to update the log. Click Clear to clear all Traceroute Test
the information that is displayed.
The Traceroute test tests the performance of a
Click Save Settings to apply your changes, or click Cancel
connection.
Changes to cancel your changes.
IP or URL Address Enter the address of the PC whose
Administration > Diagnostics connection you wish to test.
The diagnostic tests (Ping, Traceroute, and Detect Active Start to Traceroute To run the test, click this button. The
LAN Clients) allow you to check the connections of your Traceroute Test screen will show if the test was successful.
network devices, including connection to the Internet. Click Close to return to the Diagnostics screen.
Factory Defaults
Diagnostics > Traceroute
Restore Router Factory Defaults To reset the Router
Detect Active LAN Client(s) settings to the default values, select Yes. Then click Save
Settings. Any custom Router settings you have saved will
Search Time Select how many seconds you wish to be lost when the default settings are restored.
perform this search: 5, 10, or 15.
Restore Voice Factory Defaults To reset the voice
Start to Search To run the search, click this button. The settings to the default values, select Yes. Then click Save
Active LAN Client Table screen will show the search results. Settings. Any custom Voice settings you have saved will
You can sort the results by IP Address, MAC Address, be lost when the default settings are restored.
Interface, Client Name, or IP Status.
To re-run the search, click Retry. Click Close to return to NOTE: Restoring the voice defaults may require
the Diagnostics screen. your login (the default user name and password
are admin). If the defaults do not work, contact
your service provider for more information.
Router Information
Firmware Version The version number of the Router’s
current firmware is displayed.
Current Time The time set on the Router is displayed. End IP Address For the range of IP addresses used by
devices on your local network, the ending IP address is
Internet MAC Address The Router’s MAC address, as
displayed.
seen by your service provider, is displayed.
DHCP Clients Table Click this button to view a list of
Router Name The name of the Router is displayed.
computers that are using the Router as a DHCP server.
Host Name If required by your service provider, this was
entered on the Basic Setup screen.
Domain Name If required by your service provider, this
was entered on the Basic Setup screen.
Internet Connection
This section shows the current network information.
It varies depending on the Internet connection type
selected on the Basic Setup screen.
Click Refresh to update the on-screen information. DHCP Clients Table
Local Network
Local MAC Address The MAC address of the Router’s
local, wired interface is displayed.
Router IP Address The Router’s IP address, as it appears
on your local network, is displayed.
Subnet Mask The Subnet Mask of the Router is
displayed.
DHCP Server
DHCP Server The status of the Router’s DHCP server Status > Wireless Network
function is displayed.
Start IP Address For the range of IP addresses used by Wireless Network
devices on your local network, the starting IP address is Channel The channel of the wireless network(s) is
displayed. displayed.
Mode The wireless mode is displayed.
The Info screen displays Voice over Internet Protocol (VoIP) Product Information
information about the Router.
Product Name The model number of the Router is
displayed.
Serial Number The serial number of the Router is
displayed.
Software Version The version number of the Router
software is displayed.
Hardware Version The version number of the Router
hardware is displayed.
MAC Address The MAC address of the Router is
displayed.
Client Certificate The status of the client certificate,
which indicates that the Router has been authorized by
your service provider, is displayed.
System Status
Current Time The current date and time of the Router are
displayed.
Elapsed Time The amount of time elapsed since the last Call 1/2 Encoder The codec used for encoding is
reboot of the Router is displayed. displayed.
RTP Packets Sent The number of RTP packets sent by the Call 1/2 Decoder The codec used for decoding is
Router is displayed. displayed.
RTP Bytes Sent The number of RTP bytes sent by the Call 1/2 FAX The status of the fax pass-through mode is
Router is displayed. displayed.
RTP Packets Recv The number of RTP packets received Call 1/2 Type The direction of the call is displayed.
by the Router is displayed.
Call 1/2 Remote Hold This indicates whether the far end
RTP Bytes Recv The number of RTP bytes received by the has placed the call on hold.
Router is displayed.
Call 1/2 Callback This indicates whether the call was
SIP Messages Sent The number of SIP messages sent by triggered by a call back request.
the Router is displayed.
Call 1/2 Peer Name The name of the internal phone is
SIP Bytes Sent The number of SIP bytes sent by the displayed.
Router is displayed.
Call 1/2 Peer Phone The phone number of the internal
SIP Messages Recv The number of SIP messages received phone is displayed.
by the Router is displayed.
Call 1/2 Duration The duration of the call is displayed.
SIP Bytes Recv The number of SIP bytes received by the
Call 1/2 Packets Sent The number of packets sent is
Router is displayed.
displayed.
External IP The external IP address used for NAT mapping
Call 1/2 Packets Recv The number of packets received
is displayed.
is displayed.
Line 1/2 Status Call 1/2 Bytes Sent The number of bytes sent is
displayed.
Lines 1 and 2 have the same status information available.
Call 1/2 Bytes Recv The number of bytes received is
Hook State The status of the Internet phone line’s displayed.
readiness is displayed. “On” indicates that it is ready for
use, while “Off” indicates that it is in use. Call 1/2 Decode Latency The number of milliseconds for
decoder latency is displayed.
Registration State The status of the line’s registration
with the service provider is displayed. Call 1/2 Jitter The number of milliseconds for receiver
jitter is displayed.
Last Registration At The last date and time the line was
registered are displayed. Call 1/2 Round Trip Delay The number of milliseconds
for delay is displayed.
Next Registration In The number of seconds until the
next registration is displayed. Call 1/2 Packets Lost The number of packets lost is
displayed.
Message Waiting This indicates whether you have new
voicemail waiting. Call 1/2 Packet Error The number of invalid packets
received is displayed.
Call Back Active This indicates whether a call back
request is in progress. Call 1/2 Mapped RTP Port The number of the NAT
mapped RTP port is displayed.
Last Called Number The last number called is displayed.
Call 1/2 Media Loopback The Media Loopback feature
Last Caller Number The number of the last caller is allows the service provider to test the quality of the
displayed. connection to the Router. The status of the feature is
Mapped SIP Port The port number of the NAT mapped displayed.
SIP port is displayed.
Calls 1 and 2 have the same status information available.
Call 1/2 State The status of the call is displayed.
Call 1/2 Tone The type of tone used by the call is
displayed.
Ring Settings
Default Ring Select the default ringing pattern for all
callers. The default is 1.
Default CWT Select the default CWT pattern for all callers.
The default is 1.
Hold Reminder Ring Select the ring pattern that will
remind you of a call on hold when the phone is on-hook.
The default is 8.
Call Back Ring Select the ring pattern for call back
notification. The default is 7.
Cfwd Ring Splash Len Enter the duration of the ring
splash when a call is forwarded. The range is 0 to 10.0
seconds. The default is 0.
Cblk Ring Splash Len Enter the duration of the ring
splash when a call is blocked. The range is 0 to 10.0
seconds. The default is 0.
VMWI Ring Splash Len Enter the duration of the ring
splash when new messages arrive before the VoiceMail
Waiting Indication (VMWI) signal is applied. The range is 0
to 10.0 seconds. The default is 0.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
When you double-click the web browser, you are You cannot configure the settings for the second wireless
prompted for a username and password. If you want to network because the SSID2 settings are grayed out.
get rid of the prompt, follow these instructions.
Your service provider may control the settings for the
Launch the web browser and perform the following steps second wireless network (SSID2); contact your service
(these steps are specific to Internet Explorer but are similar provider for more information.
for other browsers):
1. Select Tools > Internet Options. WEB: If your questions are not addressed here,
2. Click the Connections tab. refer to the Linksys website, www.linksys.com.
The Router does not have a coaxial port for the cable
connection.
The Router does not replace your modem. You still need
your cable modem in order to use the Router. Connect your
cable connection to the cable modem, insert the setup
CD into your computer, and then follow the on‑screen
instructions.
Technical Support
This limited warranty is neither a service nor a
support contract. Information about Linksys’ current
technical support offerings and policies (including
any fees for support services) can be found at
www.linksys.com/support.
This limited warranty is governed by the laws of the
jurisdiction in which the Linksys product was purchased
by you.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623
Safety Notices and Information This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
•• Caution: To reduce the risk of fire, use only No.26 AWG
or larger telecommunication line cord.
Wireless Disclaimer
The maximum performance for wireless is derived from
IEEE Standard 802.11 specifications. Actual performance
can vary, including lower wireless network capacity,
data throughput rate, range and coverage. Performance
depends on many factors, conditions and variables,
including distance from the access point, volume of
network traffic, building materials and construction,
operating system used, mix of wireless products used,
interference and other adverse conditions.
Declaration of Conformity with Regard to Nederlands Dit apparaat voldoet aan de essentiele eisen
EU Directive 1999/5/EC (R&TTE Directive) [Dutch]:
en andere van toepassing zijnde bepalingen
van de Richtlijn 1999/5/EC.
Compliance Information for 2,4-GHz and 5-GHz Wireless
Products Relevant to the EU and Other Countries Following Malti Dan l-apparat huwa konformi mal-ħtiġiet
the EU Directive 1999/5/EC (R&TTE Directive) essenzjali u l-provedimenti l-oħra rilevanti
[Maltese]: tad-Direttiva 1999/5/EC.
Това оборудване отговаря на съществените
Български Ez a készülék teljesíti az alapvető
изисквания и приложими клаузи на Magyar
[Bulgarian] követelményeket és más 1999/5/EK
Директива 1999/5/ЕС.
[Hungarian]: irányelvben meghatározott vonatkozó
rendelkezéseket.
Česky Toto zařízení je v souladu se základními
požadavky a ostatními odpovídajícími Dette utstyret er i samsvar med de
[Czech]: ustanoveními Směrnice 1999/5/EC. Norsk
grunnleggende krav og andre relevante
[Norwegian]: bestemmelser i EU-direktiv 1999/5/EF.
Dansk Dette udstyr er i overensstemmelse med
de væsentlige krav og andre relevante Urządzenie jest zgodne z ogólnymi
[Danish]: bestemmelser i Direktiv 1999/5/EF. Polski
wymaganiami oraz szczególnymi warunkami
[Polish]: określonymi Dyrektywą UE: 1999/5/EC.
Dieses Gerät entspricht den grundlegenden
Deutsch Anforderungen und den weiteren
Português Este equipamento está em conformidade com
[German]: entsprechenden Vorgaben der Richtlinie
os requisitos essenciais e outras provisões
1999/5/EU. [Portuguese]: relevantes da Directiva 1999/5/EC.
Eesti See seade vastab direktiivi 1999/5/EÜ olulistele Acest echipament este in conformitate
Română
[Estonian]: nõuetele ja teistele asjakohastele sätetele. cu cerintele esentiale si cu alte prevederi
[Romanian] relevante ale Directivei 1999/5/EC.
This equipment is in compliance with the
Slovensko Ta naprava je skladna z bistvenimi zahtevami
English: essential requirements and other relevant
in ostalimi relevantnimi pogoji Direktive
provisions of Directive 1999/5/EC. [Slovenian]: 1999/5/EC.
Italiano Questo apparato é conforme ai requisiti •• A pdf file is included on the product’s CD.
essenziali ed agli altri principi sanciti dalla
[Italian]: Direttiva 1999/5/CE. •• A print copy is included with the product.
•• A pdf file is available on the product’s webpage.
Latviski Šī iekārta atbilst Direktīvas 1999/5/EK Visit www.linksys.com/international and select your
būtiskajām prasībām un citiem ar to country or region. Then select your product.
[Latvian]: saistītajiem noteikumiem.
If you need any other technical documentation, see the
Šis įrenginys tenkina 1999/5/EB Direktyvos “Technical Documents on www.linksys.com/international”
Lietuvių section, as shown later in this appendix.
esminius reikalavimus ir kitas šios direktyvos
[Lithuanian]: nuostatas.
2400-2483.5 100 X
5150-5350† 200 X
Check the CE label on the product to find out which
notified body was involved during the assessment.
5470-5725† 1000 X
††Dynamic Frequency Selection and Transmit Power Control are
required in the frequency ranges of 5250-5350 MHz and 5470-5725
MHz.
Denmark
In Denmark, the band 5150 - 5350 MHz is also allowed for
outdoor usage.
I Danmark må frekvensbåndet 5150 - 5350 også anvendes
udendørs.
Wireless-G Broadband Router with 2 Phone Ports 46
Appendix D Regulatory Information
This product meets the National Radio Interface and Third-Party Software or Firmware
the requirements specified in the National Frequency
Allocation Table for Italy. Unless this 2,4-GHz wireless LAN The use of software or firmware not supported/provided
product is operating within the boundaries of the owner’s by Linksys may result that the equipment is no longer
property, its use requires a “general authorization”. Please compliant with the regulatory requirements.
check http://www.comunicazioni.it/it/ for more details.
Technical Documents on
Questo prodotto è conforme alla specifiche di Interfaccia
Radio Nazionali e rispetta il Piano Nazionale di ripartizione www.linksys.com/international
delle frequenze in Italia. Se non viene installato all’interno Follow these steps to access technical documents:
del proprio fondo, l’utilizzo di prodotti Wireless LAN a
2,4 GHz richiede una “Autorizzazione Generale”. Consultare 1. Enter http://www.linksys.com/international in your
http://www.comunicazioni.it/it/ per maggiori dettagli. web browser.
2. Select the country or region in which you live.
Latvia 3. Click the Products tab.
The outdoor usage of the 2,4 GHz band requires an 4. Select the appropriate product category.
authorization from the Electronic Communications Office.
5. Select the product sub-category, if necessary.
Please check http://www.esd.lv for more details.
6. Select the product.
2,4 GHz frekveču joslas izmantošanai ārpus telpām 7. Select the type of documentation you want from the
nepieciešama atļauja no Elektronisko sakaru direkcijas. More Information section. The document will open
Vairāk informācijas: http://www.esd.lv. in PDF format if you have Adobe Acrobat installed on
Notes: your computer.
1. Although Norway, Switzerland and Liechtenstein are
NOTE: If you have questions regarding
not EU member states, the EU Directive 1999/5/EC has
the compliance of this product or you
also been implemented in those countries.
cannot find the information you need,
2. The regulatory limits for maximum output power are please contact your local sales office or visit
specified in EIRP. The EIRP level of a device can be www.linksys.com/international
calculated by adding the gain of the antenna used
(specified in dBi) to the output power available at the
connector (specified in dBm).
Wireless-G Broadband Router with 2 Phone Ports 47
Appendix D Regulatory Information
User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
tímto symbolem na produktu anebo na obalu bylo likvidováno
Waste Electric and Electronic Equipment s netříděným komunálním odpadem. Tento symbol udává,
(WEEE) že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
This document contains important information for users a dalších elektrických a elektronických zařízení prostřednictvím
with regards to the proper disposal and recycling of určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
Linksys products. Consumers are required to comply with
potenciálním negativním dopadům na životní prostředí a lidské
this notice for all electronic products bearing the following zdraví. Podrobnější informace o likvidaci starého vybavení si
symbol: laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.
Magyar (Hungarian) - Környezetvédelmi információ az Polski (Polish) - Informacja dla klientów w Unii
európai uniós vásárlók számára Europejskiej o przepisach dotyczących ochrony
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy środowiska
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági oznaczony symbolem znajdującym się na produkcie i/lub jego
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott opakowaniu nie był wyrzucany razem z innymi niesortowanymi
termék kidobásakor a szokványos háztartási hulladékelszállítási odpadami komunalnymi. Symbol ten wskazuje, że produkt
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön nie powinien być usuwany razem ze zwykłymi odpadami z
felelõssége, hogy ezt, és más elektromos és elektronikus gospodarstw domowych. Na Państwu spoczywa obowiązek
berendezéseit a kormányzati vagy a helyi hatóságok által wyrzucania tego i innych urządzeń elektrycznych oraz
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ elektronicznych w punktach odbioru wyznaczonych przez władze
hulladékfeldolgozás segít a környezetre és az emberi egészségre krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób
potenciálisan ártalmas negatív hatások megelõzésében. Ha i jego recykling pomogą zapobiec potencjalnie negatywnym
elavult berendezéseinek felszámolásához további részletes konsekwencjom dla środowiska i zdrowia ludzkiego. W celu
információra van szüksége, kérjük, lépjen kapcsolatba a helyi uzyskania szczegółowych informacji o usuwaniu starego sprzętu,
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal prosimy zwrócić się do lokalnych władz, służb oczyszczania
üzlettel, ahol a terméket vásárolta. miasta lub sklepu, w którym produkt został nabyty.
Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke
clientes da União Europeia v Evropski uniji
A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom – na izdelku in/ali na embalaži – med
não seja eliminado junto com os resíduos municipais não običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba
separados. O símbolo indica que este produto deve ser izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
eliminado separadamente dos resíduos domésticos regulares. Vaša odgovornost je, da to in preostalo električno in elektronsko
É da sua responsabilidade eliminar este e qualquer outro opremo odnesete na posebna zbirališča, ki jih določijo
equipamento eléctrico e electrónico através das instalações državne ustanove ali lokalna uprava. S pravilnim odlaganjem
de recolha designadas pelas autoridades governamentais ou in recikliranjem boste preprečili morebitne škodljive vplive na
locais. A eliminação e reciclagem correctas ajudarão a prevenir okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare
as consequências negativas para o ambiente e para a saúde opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
humana. Para obter informações mais detalhadas sobre a ste izdelek kupili.
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os serviços de eliminação de resíduos ou o
estabelecimento comercial onde adquiriu o produto. Suomi (Finnish) - Ympäristöä koskevia tietoja EU-
alueen asiakkaille
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä
Română (Romanian) - Informaţii de mediu pentru symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
clienţii din Uniunea Europeană ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.
Directiva europeană 2002/96/CE impune ca echipamentele care Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää
nu fie casate împreună cu gunoiul menajer municipal. Simbolul tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
indică faptul că acest produs trebuie să fie casat separat de viemällä tuote tai tuotteet viranomaisten määräämään
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi keräyspisteeseen. Laitteiston oikea hävittäminen estää
acest produs şi alte echipamente electrice şi electronice prin mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten
intermediul unităţilor de colectare special desemnate de guvern terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä
la prevenirea potenţialelor consecinţe negative asupra sănătăţii myymälästä, josta ostit tuotteen.
mediului şi a oamenilor. Pentru mai multe informaţii detaliate
cu privire la casarea acestui echipament vechi, contactaţi
autorităţile locale, serviciul de salubrizare sau magazinul de la Svenska (Swedish) - Miljöinformation för kunder i
care aţi achiziţionat produsul. Europeiska unionen
Det europeiska direktivet 2002/96/EC kräver att utrustning med
denna symbol på produkten och/eller förpackningen inte får
Slovenčina (Slovak) - Informácie o ochrane životného kastas med osorterat kommunalt avfall. Symbolen visar att denna
prostredia pre zákazníkov v Európskej únii produkt bör kastas efter att den avskiljts från vanligt hushållsavfall.
Podľa európskej smernice 2002/96/ES zariadenie s týmto Det faller på ditt ansvar att kasta denna och annan elektrisk och
symbolom na produkte a/alebo jeho balení nesmie byť elektronisk utrustning på fastställda insamlingsplatser utsedda
likvidované spolu s netriedeným komunálnym odpadom. av regeringen eller lokala myndigheter. Korrekt kassering och
Symbol znamená, že produkt by sa mal likvidovať oddelene återvinning skyddar mot eventuella negativa konsekvenser
od bežného odpadu z domácností. Je vašou povinnosťou för miljön och personhälsa. För mer detaljerad information om
likvidovať toto i ostatné elektrické a elektronické zariadenia kassering av din gamla utrustning kontaktar du dina lokala
prostredníctvom špecializovaných zberných zariadení určených myndigheter, avfallshanteringen eller butiken där du köpte
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia produkten.
pomôže zabrániť prípadným negatívnym dopadom na životné
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na WEB: For additional information, please visit
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov www.linksys.com
alebo obchod, v ktorom ste si produkt zakúpili.
used in accordance with the terms of this Agreement; SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF
(iii) to provide improvements to the way Linksys delivers THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL
technology to you and to other Linksys customers; (iv) to LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU
enable Linksys to comply with the terms of any agreements FOR THE PRODUCT. The foregoing limitations will apply
it has with any third parties regarding your Linksys even if any warranty or remedy under this Agreement fails
product and/or Software and/or (v) to enable Linksys to of its essential purpose. Some jurisdictions do not allow
comply with all applicable laws and/or regulations, or the the exclusion or limitation of incidental or consequential
requirements of any regulatory authority or government damages, so the above limitation or exclusion may not
agency. Linksys and/ or its affiliates may collect and apply to You.
process this information provided that it does not identify
Export. Software, including technical data, may be subject
you personally. Your use of your Linksys product and/or
to U.S. export control laws and regulations and/or export
the Software constitutes this consent by you to Linksys
or import regulations in other countries. You agree to
and/or its affiliates’ collection and use of such information
comply strictly with all such laws and regulations.
and, for EEA customers, to the transfer of such information
to a location outside the EEA. U.S. Government Users. The Software and documentation
qualify as “commercial items” as defined at 48 C.F.R. 2.101
Software Upgrades etc. If the Software enables you to
and 48 C.F.R. 12.212. All Government users acquire the
receive Upgrades, you may elect at any time to receive
Software and documentation with only those rights
these Upgrades either automatically or manually. If you
herein that apply to non-governmental customers.
elect to receive Upgrades manually or you otherwise
elect not to receive or be notified of any Upgrades, you General Terms. This Agreement will be governed by and
may expose your Linksys product and/or the Software construed in accordance with the laws of the State of
to serious security threats and/or some features within California, without reference to conflict of laws principles.
your Linksys product and/or Software may become The United Nations Convention on Contracts for the
inaccessible. There may be circumstances where we International Sale of Goods will not apply. If any portion
apply an Upgrade automatically in order to comply with of this Agreement is found to be void or unenforceable,
changes in legislation, legal or regulatory requirements the remaining provisions will remain in full force and
or as a result of requirements to comply with the terms effect. This Agreement constitutes the entire agreement
of any agreements Linksys has with any third parties between the parties with respect to the Software and
regarding your Linksys product and/or the Software. You supersedes any conflicting or additional terms contained
will always be notified of any Upgrades being delivered in any purchase order or elsewhere.
to you. The terms of this license will apply to any such END OF SCHEDULE 1
Upgrade unless the Upgrade in question is accompanied
by a separate license, in which event the terms of that Schedule 2
license will apply.
If this Linksys product contains open source software
Open Source Software. The GPL or other open source
licensed under Version 2 of the “GNU General Public
code incorporated into the Software and the open source
License” then the license terms below in this Schedule 2
license for such source code are available for free download
will apply to that open source software. The license terms
at http://www.linksys.com/gpl. If You would like a copy
below in this Schedule 2 are from the public web site at
of the GPL or other open source code in this Software on a
http://www.gnu.org/copyleft/gpl.html
CD, Linksys will mail to You a CD with such code for $9.99
plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE
Term and Termination. You may terminate this License
Version 2, June 1991
at any time by destroying all copies of the Software
and documentation. Your rights under this License will Copyright © 1989, 1991 Free Software Foundation, Inc.
terminate immediately without notice from Linksys if You 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
fail to comply with any provision of this Agreement. USA
Limited Warranty. The warranty terms and period Everyone is permitted to copy and distribute verbatim
specified in the applicable Linksys Product User Guide copies of this license document, but changing it is not
shall also apply to the Software. allowed.
Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS OR
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE Preamble
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, The licenses for most software are designed to take away
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF your freedom to share and change it. By contrast, the
CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF GNU General Public License is intended to guarantee your
OR RELATED TO THE USE OF OR INABILITY TO USE THE
Wireless-G Broadband Router with 2 Phone Ports 53
Appendix E Software License Agreement
freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
the software is free for all its users. This General Public MODIFICATION
License applies to most of the Free Software Foundation’s
software and to any other program whose authors 0. This License applies to any program or other work
commit to using it. (Some other Free Software Foundation which contains a notice placed by the copyright
software is covered by the GNU Lesser General Public holder saying it may be distributed under the terms
License instead.) You can apply it to your programs, too. of this General Public License. The “Program”, below,
refers to any such program or work, and a “work
When we speak of free software, we are referring to
based on the Program” means either the Program
freedom, not price. Our General Public Licenses are
or any derivative work under copyright law: that is
designed to make sure that you have the freedom to
to say, a work containing the Program or a portion
distribute copies of free software (and charge for this
of it, either verbatim or with modifications and/
service if you wish), that you receive source code or can
or translated into another language. (Hereinafter,
get it if you want it, that you can change the software or
translation is included without limitation in the term
use pieces of it in new free programs; and that you know
“modification”.) Each licensee is addressed as “you”.
you can do these things.
To protect your rights, we need to make restrictions that Activities other than copying, distribution and
forbid anyone to deny you these rights or to ask you to modification are not covered by this License; they
surrender the rights. These restrictions translate to certain are outside its scope. The act of running the Program
responsibilities for you if you distribute copies of the is not restricted, and the output from the Program is
software, or if you modify it. covered only if its contents constitute a work based on
the Program (independent of having been made by
For example, if you distribute copies of such a program,
running the Program). Whether that is true depends
whether gratis or for a fee, you must give the recipients
on what the Program does.
all the rights that you have. You must make sure that they,
too, receive or can get the source code. And you must 1. You may copy and distribute verbatim copies of the
show them these terms so they know their rights. Program’s source code as you receive it, in any medium,
provided that you conspicuously and appropriately
We protect your rights with two steps: (1) copyright the
publish on each copy an appropriate copyright
software, and (2) offer you this license which gives you
notice and disclaimer of warranty; keep intact all the
legal permission to copy, distribute and/or modify the
notices that refer to this License and to the absence
software.
of any warranty; and give any other recipients of the
Also, for each author’s protection and ours, we want to Program a copy of this License along with the Program.
make certain that everyone understands that there is no
warranty for this free software. If the software is modified You may charge a fee for the physical act of transferring
by someone else and passed on, we want its recipients a copy, and you may at your option offer warranty
to know that what they have is not the original, so that protection in exchange for a fee.
any problems introduced by others will not reflect on the 2. You may modify your copy or copies of the Program
original authors’ reputations. or any portion of it, thus forming a work based on the
Finally, any free program is threatened constantly by Program, and copy and distribute such modifications
software patents. We wish to avoid the danger that or work under the terms of Section 1 above, provided
redistributors of a free program will individually obtain that you also meet all of these conditions:
patent licenses, in effect making the program proprietary. a. You must cause the modified files to carry
To prevent this, we have made it clear that any patent must prominent notices stating that you changed the
be licensed for everyone’s free use or not licensed at all. files and the date of any change.
The precise terms and conditions for copying, distribution b. You must cause any work that you distribute or
and modification follow. publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third parties
under the terms of this License.
c. If the modified program normally reads commands c. Accompany it with the information you received as
interactively when run, you must cause it, when to the offer to distribute corresponding source code.
started running for such interactive use in the most (This alternative is allowed only for noncommercial
ordinary way, to print or display an announcement distribution and only if you received the program
including an appropriate copyright notice and in object code or executable form with such an
a notice that there is no warranty (or else, saying offer, in accord with Subsection b above.)
that you provide a warranty) and that users may
The source code for a work means the preferred form
redistribute the program under these conditions,
of the work for making modifications to it. For an
and telling the user how to view a copy of
executable work, complete source code means all
this License. (Exception: if the Program itself is
the source code for all modules it contains, plus any
interactive but does not normally print such an
associated interface definition files, plus the scripts
announcement, your work based on the Program
used to control compilation and installation of the
is not required to print an announcement.)
executable. However, as a special exception, the source
These requirements apply to the modified work as code distributed need not include anything that is
a whole. If identifiable sections of that work are not normally distributed (in either source or binary form)
derived from the Program, and can be reasonably with the major components (compiler, kernel, and so
considered independent and separate works in on) of the operating system on which the executable
themselves, then this License, and its terms, do not runs, unless that component itself accompanies the
apply to those sections when you distribute them as executable.
separate works. But when you distribute the same
If distribution of executable or object code is made
sections as part of a whole which is a work based on
by offering access to copy from a designated place,
the Program, the distribution of the whole must be on
then offering equivalent access to copy the source
the terms of this License, whose permissions for other
code from the same place counts as distribution of
licensees extend to the entire whole, and thus to each
the source code, even though third parties are not
and every part regardless of who wrote it.
compelled to copy the source along with the object
Thus, it is not the intent of this section to claim rights code.
or contest your rights to work written entirely by you;
1. You may not copy, modify, sublicense, or distribute
rather, the intent is to exercise the right to control the
the Program except as expressly provided under
distribution of derivative or collective works based on
this License. Any attempt otherwise to copy, modify,
the Program.
sublicense or distribute the Program is void, and will
In addition, mere aggregation of another work not automatically terminate your rights under this License.
based on the Program with the Program (or with a However, parties who have received copies, or rights,
work based on the Program) on a volume of a storage from you under this License will not have their licenses
or distribution medium does not bring the other work terminated so long as such parties remain in full
under the scope of this License. compliance.
1. You may copy and distribute the Program (or a 2. You are not required to accept this License, since you
work based on it, under Section 2) in object code or have not signed it. However, nothing else grants you
executable form under the terms of Sections 1 and 2 permission to modify or distribute the Program or its
above provided that you also do one of the following: derivative works. These actions are prohibited by law if
you do not accept this License. Therefore, by modifying
a. Accompany it with the complete corresponding
or distributing the Program (or any work based on the
machine-readable source code, which must be
Program), you indicate your acceptance of this License
distributed under the terms of Sections 1 and 2
to do so, and all its terms and conditions for copying,
above on a medium customarily used for software
distributing or modifying the Program or works based
interchange; or,
on it.
b. Accompany it with a written offer, valid for at least 3. Each time you redistribute the Program (or any work
three years, to give any third party, for a charge based on the Program), the recipient automatically
no more than your cost of physically performing receives a license from the original licensor to copy,
source distribution, a complete machine-readable distribute or modify the Program subject to these
copy of the corresponding source code, to be terms and conditions. You may not impose any further
distributed under the terms of Sections 1 and 2 restrictions on the recipients’ exercise of the rights
above on a medium customarily used for software granted herein. You are not responsible for enforcing
interchange; or, compliance by third parties to this License.
4. If, as a consequence of a court judgment or allegation not specify a version number of this License, you
of patent infringement or for any other reason (not may choose any version ever published by the Free
limited to patent issues), conditions are imposed on Software Foundation.
you (whether by court order, agreement or otherwise)
1. If you wish to incorporate parts of the Program into
that contradict the conditions of this License, they do
other free programs whose distribution conditions are
not excuse you from the conditions of this License. If
different, write to the author to ask for permission. For
you cannot distribute so as to satisfy simultaneously
software which is copyrighted by the Free Software
your obligations under this License and any other
Foundation, write to the Free Software Foundation; we
pertinent obligations, then as a consequence you
sometimes make exceptions for this. Our decision will
may not distribute the Program at all. For example,
be guided by the two goals of preserving the free status
if a patent license would not permit royalty-free
of all derivatives of our free software and of promoting
redistribution of the Program by all those who receive
the sharing and reuse of software generally.
copies directly or indirectly through you, then the only
way you could satisfy both it and this License would be NO WARRANTY
to refrain entirely from distribution of the Program.
1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
If any portion of this section is held invalid or THERE IS NO WARRANTY FOR THE PROGRAM, TO THE
unenforceable under any particular circumstance, EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
the balance of the section is intended to apply and WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
the section as a whole is intended to apply in other HOLDERS AND/OR OTHER PARTIES PROVIDE THE
circumstances. PROGRAM “AS IS” WITHOUT WARRANTY OF ANY
It is not the purpose of this section to induce you to KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
infringe any patents or other property right claims or BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
to contest validity of any such claims; this section has MERCHANTABILITY AND FITNESS FOR A PARTICULAR
the sole purpose of protecting the integrity of the free PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
software distribution system, which is implemented PERFORMANCE OF THE PROGRAM IS WITH YOU.
by public license practices. Many people have SHOULD THE PROGRAM PROVE DEFECTIVE, YOU
made generous contributions to the wide range of ASSUME THE COST OF ALL NECESSARY SERVICING,
software distributed through that system in reliance REPAIR OR CORRECTION.
on consistent application of that system; it is up to 2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
the author/donor to decide if he or she is willing to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,
distribute software through any other system and a OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
licensee cannot impose that choice. REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,
This section is intended to make thoroughly clear BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
what is believed to be a consequence of the rest of this GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
License. DAMAGES ARISING OUT OF THE USE OR INABILITY TO
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO
1. If the distribution and/or use of the Program is LOSS OF DATA OR DATA BEING RENDERED INACCURATE
restricted in certain countries either by patents or by OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR
copyrighted interfaces, the original copyright holder A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
who places the Program under this License may add an OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
explicit geographical distribution limitation excluding PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
those countries, so that distribution is permitted only SUCH DAMAGES.
in or among countries not thus excluded. In such case,
this License incorporates the limitation as if written in END OF TERMS AND CONDITIONS
the body of this License. END OF SCHEDULE 2
2. The Free Software Foundation may publish revised
and/or new versions of the General Public License Schedule 3
from time to time. Such new versions will be similar in If this Linksys product contains open source software
spirit to the present version, but may differ in detail to licensed under the OpenSSL license:
address new problems or concerns.
This product includes software developed by the
Each version is given a distinguishing version number.
OpenSSL Project for use in the OpenSSL Toolkit.
If the Program specifies a version number of this
(http://www.openssl.org/).
License which applies to it and “any later version”, you
have the option of following the terms and conditions This product includes cryptographic software written by
either of that version or of any later version published Eric Young ([email protected]).
by the Free Software Foundation. If the Program does
Wireless-G Broadband Router with 2 Phone Ports 56
Appendix E Software License Agreement
This product includes software written by Tim Hudson EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
([email protected]). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
In addition, if this Linksys product contains open
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
source software licensed under the OpenSSL license
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
then the license terms below in this Schedule 3 will
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
apply to that open source software. The license terms
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
below in this Schedule 3 are from the public web site at
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
http://www.openssl.org/source/license.html.
SUCH DAMAGE.
The OpenSSL toolkit stays under a dual license, i.e. both
This product includes cryptographic software written by
the conditions of the OpenSSL License and the original
Eric Young ([email protected]). This product includes
SSLeay license apply to the toolkit. See below for the
software written by Tim Hudson ([email protected]).
actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related
to OpenSSL please contact [email protected].
Original SSLeay License
Copyright © 1995-1998 Eric Young ([email protected])All
OpenSSL License rights reserved.
Copyright © 1998-2007 The OpenSSL Project. All rights This package is an SSL implementation written by Eric
reserved. Young ([email protected]).
Redistribution and use in source and binary forms, with The implementation was written so as to conform with
or without modification, are permitted provided that the Netscapes SSL.
following conditions are met:
This library is free for commercial and non-commercial
1. Redistributions of source code must retain the above use as long as the following conditions are adhered to.
copyright notice, this list of conditions and the The following conditions apply to all code found in this
following disclaimer. distribution, be it the RC4, RSA, lhash, DES, etc., code; not
2. Redistributions in binary form must reproduce the just the SSL code. The SSL documentation included with
above copyright notice, this list of conditions and the this distribution is covered by the same copyright terms
following disclaimer in the documentation and/or except that the holder is Tim Hudson (tjh@cryptsoft.
other materials provided with the distribution. com).
3. All advertising materials mentioning features or Copyright remains Eric Young’s, and as such any Copyright
use of this software must display the following notices in the code are not to be removed.
acknowledgment: “This product includes software If this package is used in a product, Eric Young should be
developed by the OpenSSL Project for use in the given attribution as the author of the parts of the library
OpenSSL Toolkit. (http://www.openssl.org/)” used. This can be in the form of a textual message at
4. The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual)
must not be used to endorse or promote products provided with the package.
derived from this software without prior written
Redistribution and use in source and binary forms, with
permission. For written permission, please contact
or without modification, are permitted provided that the
[email protected].
following conditions are met:
5. Products derived from this software may not be called
“OpenSSL” nor may “OpenSSL” appear in their names 1. Redistributions of source code must retain the
without prior written permission of the OpenSSL copyright notice, this list of conditions and the
Project. following disclaimer.
6. Redistributions of any form whatsoever must retain 2. Redistributions in binary form must reproduce the
the following acknowledgment: “This product includes above copyright notice, this list of conditions and the
software developed by the OpenSSL Project for use in following disclaimer in the documentation and/or
the OpenSSL Toolkit (http://www.openssl.org/)” other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT 3. All advertising materials mentioning features or
``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, use of this software must display the following
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED acknowledgement:
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR “This product includes cryptographic software written
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT by Eric Young ([email protected])”
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
Wireless-G Broadband Router with 2 Phone Ports 57
Appendix E Software License Agreement
8051210B-JL
Wireless-G Broadband Router with 2 Phone Ports 58