Cisco Systems WRT310N manual Software End User License Agreement

Page 50

Appendix E

Software End User License Agreement

a)Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.)

b)Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that

(1)uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and

(2)will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with.

c)Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.

d)If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.

e)Verify that the user has already received a copy of these materials or that you have already sent this user a copy.

For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

7.You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things:

a)Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.

b)Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

8.You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

9.You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

10.Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

Wireless-N Gigabit Router

49

Image 50
Contents Wireless-N Gigabit Router Online Resources About This GuideIcon Descriptions Copyright and TrademarksTable of Contents Appendix D Regulatory Information Appendix E Software End User License AgreementChapter Product Overview Placement PositionsHorizontal Placement Front PanelWall-Mounting Placement Suggested Mounting HardwareAdditional Security Tips Chapter Wireless Security ChecklistGeneral Network Security Guidelines Setup Basic Setup Chapter Advanced ConfigurationHow to Access the Web-Based Utility Internet SetupPptp Static IPPPPoE Telstra Cable Optional SettingsL2TP Router IP Network SetupDhcp Server Setting Dhcp ReservationDdns Service Setup DdnsTime Setting DynDNS.orgMAC Address Clone Setup MAC Address CloneSetup Advanced Routing Advanced RoutingRouting Table Wireless Basic Wireless SettingsBasic Wireless Settings Wireless Security Wireless Wireless SecurityWi-Fi Protected Setup WPA2 Enterprise WPA2 PersonalWPA Enterprise RadiusAccess Restriction Wireless Wireless MAC FilterWireless MAC Filter MAC Address Filter ListAdvanced Wireless Wireless Client ListFirewall Security FirewallSecurity VPN Passthrough Internet FilterSummary Internet Access PolicyVPN Passthrough Applications and Gaming Single Port Forwarding Single Port ForwardingPort Range Forwarding Applications and Gaming Port Range ForwardingApplications & Gaming Port Range Triggering Port Range TriggeringApplications and Gaming DMZ QoS Quality of ServiceWireless Applications and Gaming QoSInternet Access Priority CategoryWeb Access Administration ManagementRouter Access Remote AccessLog Administration LogBackup and Restore UPnPReboot Administration DiagnosticsAdministration Factory Defaults DiagnosticsStatus Local Network Administration Firmware UpgradeStatus Router Local Network Status Wireless NetworkWireless Network Dhcp ServerAppendix a Troubleshooting Your computer cannot connect to the InternetAppendix B Specifications WRT310NExclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support FCC Radiation Exposure Statement Safety NoticesFCC Statement Avis d’Industrie Canada Wireless DisclaimerIndustry Canada Statement Industry Canada Radiation Exposure StatementDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software Licenses Appendix E Software End User License AgreementCisco Products Schedule Cisco Software License AgreementSoftware End User License Agreement Software End User License Agreement Schedule Network Magic Features GNU General Public License Schedule Open Source and Third Party LicensesSchedule 3-A PreambleSoftware End User License Agreement No Warranty GNU Lesser General Public License Schedule 3-BEND of Schedule 3-A Software End User License Agreement Software End User License Agreement Software End User License Agreement No Warranty END of Schedule 3-BOriginal SSLeay License Schedule 3-COpenSSL License END of Schedule 3-C