Linksys BEFVP41 manual GNU Lesser General Public License

Page 39

Appendix F

Software License Agreement

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.

51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,

USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software—to make sure the software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages—typically libraries—of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/ or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author’s reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.

When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.

We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.

In other cases, permission to use a particular library in non- free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users’ freedom, it does ensure that the user of a program that is linked with the Library has the

EtherFast Cable/DSL VPN Router with 4-Port Switch

35

Image 39
Contents EtherFast Cable/DSL VPN Router with 4-Port Switch Copyright and Trademarks About This GuideIcon Descriptions Online ResourcesTable of Contents Appendix F Software License Agreement VPN Examples Computer using VPN client software to VPN RouterChapter Introduction Introduction to VPNsVPN Security Chapter Product Overview Front PanelBack Panel Internet Setup Chapter Advanced ConfigurationHow to Access the Web-Based Utility Setup Basic SetupPPPoE Static IPHeart Beat Signal Optional Settings and MTUNetwork Setup Setup DdnsAdvanced Routing Setup MAC Address CloneSetup Advanced Routing MAC CloneVPN Passthrough Security FirewallSecurity VPN FirewallVPN Tunnel Local Secure Group and Remote Secure GroupRemote Security Gateway Auto IKE Advanced SettingKey Management StatusProposal Access RestrictionsPhase Other SettingsPort Range Forwarding Internet AccessTo create an Internet Access policy Applications and Gaming Port Range ForwardingTriggered Range Applications & Gaming Port TriggeringPort Triggering UPnP ForwardingApplications and Gaming DMZ Administration ManagementLog Administration LogGateway Password UPnPPing Test Administration DiagnosticsAdministration Factory Defaults Factory DefaultsAdministration Firmware Upgrade Status GatewayStatus Local Network Dhcp Client Table Local NetworkYour computer cannot connect to the Internet Appendix a TroubleshootingAppendix B VPN Tunnel OverviewInstructions BEFVP41 Appendix C SpecificationsLimited Warranty Obtaining Warranty ServiceExclusions and Limitations Technical Support Avis d’Industrie Canada Safety NoticesFCC Statement Industry Canada StatementDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Software in Linksys Products Software LicensesSchedule 1 Linksys Software License Agreement Preamble ScheduleSoftware License Agreement Software License Agreement No Warranty GNU Lesser General Public License Software License Agreement Software License Agreement Software License Agreement No Warranty Original SSLeay License OpenSSL License8112021NC-JL

BEFVP41 specifications

The Linksys BEFVP41 is a sophisticated yet user-friendly VPN router designed primarily for small office and home office networks. Known for its robust performance and versatility, it stands out as a solid choice for users looking to enhance their network security and connectivity.

One of its key features is the built-in VPN support, which allows users to establish secure connections to remote networks or clients. The BEFVP41 supports up to 50 simultaneous VPN connections, making it an excellent option for small businesses that require secure remote access for their employees without compromising on speed or reliability.

The router employs advanced security protocols including IPsec, which is well-known for ensuring encrypted communication over the internet. This level of security enables users to safeguard sensitive data and maintain privacy while accessing their networks remotely, critical for businesses that handle confidential information.

In terms of connectivity, the BEFVP41 is equipped with four Ethernet ports that support 10/100 Mbps speeds, allowing for high-speed wired connections. It also features a WAN port for connection to a broadband modem, ensuring a fast and stable internet connection. The router supports various connection types, including DHCP, static IP, and PPPoE, making it versatile for different networking environments.

Additional features include a user-friendly web-based interface, which simplifies the setup and configuration process for users. This intuitive design is combined with powerful QoS (Quality of Service) capabilities, enabling prioritized bandwidth allocation to specific applications or users, ensuring that critical business applications have the necessary speeds and reliability.

The BEFVP41 also offers dynamic DNS support, which allows users to access their home or office network using a domain name instead of remembering an IP address. Moreover, it includes a DHCP server for automated IP address assignment, making network management more streamlined.

Overall, the Linksys BEFVP41 combines essential networking technologies and security features into a compact design suitable for any small business or home office environment. With its robust performance, extensive VPN capabilities, and user-friendly interface, it caters effectively to the diverse needs of modern network requirements. The BEFVP41 is a reliable solution for those looking to enhance their connectivity while maintaining security and ease of use.