Linksys SRW2016, SRW248G4, SRW2048, SRW2024, SRW224G4 manual Appendix H

Page 94

Appendix H

Software License Agreement

Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http:// www.openssl.org/)”

4.The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl. org.

5.Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.

6.Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)”

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

=======================================

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License

-----------------------

Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscape’s SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft. com).

Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed.

If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2.Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.Alladvertisingmaterialsmentioningfeaturesoruseofthis software must display the following acknowledgement:

“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”

The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related :-).

4.If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:“This product includes software written by Tim Hudson (tjh@cryptsoft.com)”

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL

WebView Switches

87

Image 94
Contents WebView Switches Icon Descriptions About This GuideAbout This Guide Online ResourcesTable of Contents Advanced Configuration Security Radius Security TACACS+ Security 802.1x Settings Appendix D Glossary Appendix B Windows HelpAppendix H Software License Agreement Chapter Introduction ChapterIntroduction Product Overview Chapter Product OverviewSRW2048 SRW2024 Product OverviewSRW2016 SRW248G4 SRW224G4 Refer to Configuration Using Placement Options Connecting the SwitchBefore You Install the Switch OverviewHardware Installation Configuring the SwitchChapter Configuration Using Console Interface Connecting to the Switch through a Telnet SessionSwitch Main Menu System Configuration MenuManagement Settings Telnet Configuration Username & Password Settings IP Configuration Http Network Configuration Port Status File ManagementPort Configuration HelpAccessing the Web-based Utility Chapter Advanced ConfigurationAdvanced Configuration Setup SummarySystem Information Setup Network SettingsIP Configuration IdentificationLocal Time Setup TimeSet Time Daylight SavingSetup Green Ethernet Port Management Port SettingsPort Settings Port Configuration Port Management Link Aggregation Link Aggregation DetailSingle Vlan Port Management LacpVlan Management Create Vlan Vlan RangeVlan Management Port Setting Vlan Management Ports to VlanVlan Management Vlan to Ports Vlan Management GvrpStatistics Rmon Statistics Log Table Statistics Rmon HistoryRmon History Statistics Rmon Alarm Alarm Entry Indicates a specific alarmAdd Event Statistics Rmon EventsStatistics Port Utilization Rmon Events LogStatistics 802.1x Statistics Statistics Gvrp StatisticsACL IP Based ACL ACL MAC Based ACL Security ACL Binding Security RadiusSecurity 802.1x Settings Security TACACS+802.1x Settings Setting Timer Security Port SecuritySecurity Multiple Hosts Security Storm Control QoS CoS SettingsQoS CoS Default QoS Queue SettingsQoS Dscp Settings QoS BandwidthQoS Advanced Mode QoS Basic ModeAdvanced Mode Out of Profile Dscp Advanced Mode New Class Map Advanced Mode Policy NameSpanning Tree Spanning Tree STP Status Global SettingSpanning Tree Global STP Spanning Tree STP Port Settings Bridge SettingsSpanning Tree Rstp Port Settings Spanning Tree Mstp Properties Spanning Tree Mstp Instance Settings Multicast Igmp Snooping Multicast Bridge Multicast Multicast Bridge Multicast Forward AllSnmp Global Parameters Snmp ViewsSnmp Group Profile Snmp Group MembershipSnmp Communities Base Table Snmp Notification FilterAdvanced Table Admin User Authentication Snmp Notification RecipientAdmin Static Address Admin Jumbo FramesQuery Admin Dynamic Address Admin LoggingAdmin Port Mirroring Admin Cable TestBackup Admin Save ConfigurationAdmin Firmware Upgrade Via TftpAdmin Factory Defaults Admin RebootAdmin Server Logs Admin Memory Logs Admin Flash LogsGigabit Ethernet Appendix aAppendix a About Gigabit Ethernet Fiber Optic Cabling Fiber Optic CablingShared Resources Appendix BAppendix B Windows Help Network Neighborhood/My Network PlacesStartup Menu Procedures Appendix C Downloading using XmodemAppendix C Downloading using Xmodem Appendix D Glossary Appendix DGlossary Glossary Smtp Simple Mail Transfer Protocol The standard e Appendix D Specifications Appendix E SpecificationsAppendix E Specifications Environmental Security MAC Address port security† Obtaining Warranty Service Warranty InformationLimited Warranty Appendix FWarranty Information Technical SupportAppendix G Regulatory InformationRegulatory Information Appendix G Norsk Norwegian Miljøinformasjon for kunder i EU Appendix G Software in Linksys Products Appendix HAppendix H Software License Agreement Software LicensesSchedule Software License AgreementPreamble Appendix H END of Terms and Conditions END of Schedule Appendix H END of Schedule 3s Appendix Contact Information
Related manuals
Manual 123 pages 42.48 Kb Manual 3 pages 47.48 Kb Manual 2 pages 1.75 Kb

SRW2016, SRW224G4, SRW2024, SRW2048, SRW248G4 specifications

The Linksys SRW2048 is a robust Layer 2 managed switch that caters to the networking needs of small to medium-sized businesses. Designed with performance and reliability in mind, it provides features that ensure optimal network efficiency and security.

One of the standout features of the SRW2048 is its 48 10/100/1000 Mbps Gigabit Ethernet ports, enabling high-speed data transfer and seamless connectivity for various devices within the network. This makes it ideal for environments with heavy data traffic, ensuring minimal latency and high performance.

The SRW2048 also supports advanced Layer 2 management features, including VLAN (Virtual Local Area Network) support, which allows users to segment the network into smaller, manageable sections. This is crucial for improving security and performance, as it reduces unnecessary traffic and potential broadcast storms. With a VLAN configuration, businesses can group users and devices based on function or department, ensuring efficient communication within teams.

In addition to VLAN capabilities, the Linksys SRW2048 incorporates Quality of Service (QoS) features. This technology prioritizes critical network traffic, such as voice over IP (VoIP) and video conferencing, ensuring that these applications receive the bandwidth they require for optimal performance. This is particularly beneficial for businesses that rely on real-time communication tools.

The switch also enhances security through features such as IEEE 802.1X port security, which ensures that only authorized users can access the network. The SRW2048 supports access control lists (ACLs), allowing administrators to set specific permissions for users and devices, further tightening security.

Linksys has also equipped the SRW2048 with a user-friendly web-based management interface, simplifying the process of configuring and monitoring network performance. This accessible interface allows IT personnel to quickly identify issues, manage traffic, and configure settings without extensive training.

Another notable characteristic of the Linksys SRW2048 is its robust build quality and reliability. With a metal chassis and fanless design, it maintains a low acoustic footprint and ensures passive cooling, making it suitable for office environments.

Overall, the Linksys SRW2048 is a feature-rich managed switch that combines advanced networking technologies, efficient performance, and security features to meet the diverse needs of modern businesses. Its scalability, manageability, and robust construction make it a valuable addition to any network infrastructure.