Cisco Systems WRT310N manual Schedule 3-C, OpenSSL License, Original SSLeay License

Page 52

Appendix E

Software End User License Agreement

Schedule 3-C

OPENSSL LICENSE

If this Cisco product contains open source software licensed under the OpenSSL license:

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/).

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

In addition, if this Cisco product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3-C will apply to that open source software. The license terms below in this Schedule 3-C are from the public web site at http://www.openssl.org/source/license.html.

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License

Copyright © 1998-2007 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”

4.The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5.Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.

6.Redistributions of any form whatsoever must retain the following acknowledgment:“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License

Copyright © 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscape’s SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft. com).

Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed.

If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

Wireless-N Gigabit Router

51

Image 52
Contents Wireless-N Gigabit Router About This Guide Icon DescriptionsOnline Resources Copyright and TrademarksTable of Contents Appendix D Regulatory Information Appendix E Software End User License AgreementPlacement Positions Horizontal PlacementChapter Product Overview Front PanelWall-Mounting Placement Suggested Mounting HardwareGeneral Network Security Guidelines Chapter Wireless Security ChecklistAdditional Security Tips Chapter Advanced Configuration How to Access the Web-Based UtilitySetup Basic Setup Internet SetupPPPoE Static IPPptp L2TP Optional SettingsTelstra Cable Network Setup Dhcp Server SettingRouter IP Dhcp ReservationSetup Ddns Time SettingDdns Service DynDNS.orgSetup MAC Address Clone Setup Advanced RoutingMAC Address Clone Advanced RoutingBasic Wireless Settings Wireless Basic Wireless SettingsRouting Table Wi-Fi Protected Setup Wireless Wireless SecurityWireless Security WPA2 Personal WPA EnterpriseWPA2 Enterprise RadiusWireless Wireless MAC Filter Wireless MAC FilterAccess Restriction MAC Address Filter ListAdvanced Wireless Wireless Client ListSecurity Firewall Security VPN PassthroughFirewall Internet FilterVPN Passthrough Internet Access PolicySummary Applications and Gaming Single Port Forwarding Single Port ForwardingApplications and Gaming Port Range Forwarding Applications & Gaming Port Range TriggeringPort Range Forwarding Port Range TriggeringQoS Quality of Service WirelessApplications and Gaming DMZ Applications and Gaming QoSInternet Access Priority CategoryAdministration Management Router AccessWeb Access Remote AccessAdministration Log Backup and RestoreLog UPnPAdministration Diagnostics Administration Factory DefaultsReboot DiagnosticsStatus Router Administration Firmware UpgradeStatus Local Network Status Wireless Network Wireless NetworkLocal Network Dhcp ServerAppendix a Troubleshooting Your computer cannot connect to the InternetAppendix B Specifications WRT310NObtaining Warranty Service Limited WarrantyExclusions and Limitations Technical Support FCC Statement Safety NoticesFCC Radiation Exposure Statement Wireless Disclaimer Industry Canada StatementAvis d’Industrie Canada Industry Canada Radiation Exposure StatementDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Appendix E Software End User License Agreement Cisco ProductsSoftware Licenses Schedule Cisco Software License AgreementSoftware End User License Agreement Software End User License Agreement Schedule Network Magic Features Schedule Open Source and Third Party Licenses Schedule 3-AGNU General Public License PreambleSoftware End User License Agreement No Warranty END of Schedule 3-A Schedule 3-BGNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement No Warranty END of Schedule 3-BOpenSSL License Schedule 3-COriginal SSLeay License END of Schedule 3-C