Linksys WRT160N manual GNU Lesser General Public License, Preamble

Page 50

Appendix E

Software End User License Agreement

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.

51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,

USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software—to make sure the software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages—typically libraries—of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/ or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author’s reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.

When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.

We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.

In other cases, permission to use a particular library in non- free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users’ freedom, it does ensure that the user of a program that is linked with the Library has the

Wireless-N Broadband Router

49

Image 50
Contents Wireless-N Broadband Router Online Resources About This GuideIcon Descriptions Copyright and TrademarksTable of Contents Appendix E Software End User License Agreement Appendix C Warranty InformationAppendix D Regulatory Information Chapter Product Overview Placement PositionsHorizontal Placement Front PanelWall-Mounting Placement Suggested Mounting HardwareAdditional Security Tips Chapter Wireless Security ChecklistGeneral Network Security Guidelines Setup Basic Setup Chapter Advanced ConfigurationHow to Access the Web-Based Utility Internet SetupPptp Static IPPPPoE Telstra Cable Optional SettingsL2TP Router IP Network SetupDhcp Server Setting Dhcp ReservationDdns Service Setup DdnsTime Setting DynDNS.orgMAC Address Clone Setup MAC Address CloneSetup Advanced Routing Advanced RoutingRouting Table Wireless Basic Wireless SettingsBasic Wireless Settings Wireless Security Wireless Wireless SecurityWi-Fi Protected Setup WPA2 Enterprise WPA2 PersonalWPA Enterprise RadiusAccess Restriction Wireless Wireless MAC FilterWireless MAC Filter MAC Address Filter ListAdvanced Wireless Wireless Client ListFirewall Security FirewallSecurity VPN Passthrough Internet FilterSummary Internet Access PolicyVPN Passthrough Applications and Gaming Single Port Forwarding Single Port ForwardingPort Range Forwarding Applications and Gaming Port Range ForwardingApplications & Gaming Port Range Triggering Port Range TriggeringApplications and Gaming DMZ QoS Quality of ServiceWireless Applications and Gaming QoSInternet Access Priority CategoryWeb Access Administration ManagementRouter Access Remote AccessLog Administration LogBackup and Restore UPnPReboot Administration DiagnosticsAdministration Factory Defaults DiagnosticsStatus Local Network Administration Firmware UpgradeStatus Router Local Network Status Wireless NetworkWireless Network Dhcp ServerAppendix a Troubleshooting Your computer cannot connect to the InternetAppendix B Specifications WRT160NExclusions and Limitations Limited WarrantyObtaining Warranty Service Technical Support GeneralFCC Radiation Exposure Statement Safety NoticesFCC Statement Avis d’Industrie Canada Wireless DisclaimerIndustry Canada Statement Изисквания Приложими National Restrictions Wireless Equipment Wireless-N/G/A/B ProductsCE Marking GHz Restrictions Product Usage RestrictionsItaly Latvia Third-Party Software or FirmwareDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Schedule Cisco Software License Agreement Cisco ProductsSoftware Licenses Software End User License Agreement Software End User License Agreement Schedule 3-A Schedule Network Magic FeaturesSchedule Open Source and Third Party Licenses GNU General Public LicenseSoftware End User License Agreement Software End User License Agreement END of Schedule 3-A No WarrantySchedule 3-B GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement Schedule 3-C END of Schedule 3-BOpenSSL License Original SSLeay LicenseEND of Schedule 3-C Router de banda ancha Wireless-N Recursos en línea Acerca de esta guíaDescripciones de los iconos Copyright y marcas comercialesContenido Apéndice C Información de garantía Apéndice D Información sobre normativaPanel posterior Capítulo Descripción del productoPanel frontal Posiciones de colocaciónColocación en la pared Piezas de montaje recomendadasCapítulo Lista de comprobación de seguridad inalámbricaCómo acceder a la utilidad basada en web Internet Setup Configuración de InternetSetup Basic Setup Configuración Configuración básica Static IP IP estática Connect on Demand Max Idle Time Conectar cuando seOptional Settings Parámetros opcionales IP del router Network Setup Configuración de redDhcp Server Setting Parámetro de servidor Dhcp Reserva DhcpDdns Service Servicio Ddns Setup Configuración DdnsTime Setting Parámetro de hora Static Routing Enrutamiento estático Setup Advanced Routing Configuración Enrutamiento avanzadoDynamic Routing Enrutamiento dinámico RIP MAC Address Clone Clonación de direcciones MACBasic Wireless Settings Parámetros inalámbricos básicos Routing Table Tabla de enrutamientoSecurity Mode Modo de seguridad Wi-Fi Protected Setup Configuración Wi-Fi protegidaWireless Security Seguridad inalámbrica Método n.ºSecurity Mode Modo de seguridad WPA2 Personal Access Restriction Restricción de acceso Lista de filtros de direcciones MACAdvanced Wireless Parámetros inalámbricos avanzados Wireless Client List Lista de clientes inalámbricosWeb Filter Filtro web Security Seguridad FirewallInternet Filter Filtros de Internet Security VPN Passthrough Seguridad Paso a través de VPNResumen Internet Access Policy Directiva de acceso a InternetVPN Passthrough Paso a través de VPN Single Port Forwarding Reenvío de puerto único Port Range Forwarding Reenvío de intervalos de puertos Applications and Gaming Aplicaciones y juegos QoS Wireless InalámbricoApplications and Gaming Aplicaciones y juegos DMZ QoS calidad de servicioOnline Games Juegos en línea Category CategoríaApplications Aplicaciones MAC Address Dirección MACManagement Gestión Web Access Acceso webRemote Access Acceso remoto Summary ResumenRegistro Administration Log Administración RegistroAdministration Diagnostics Administración Diagnóstico Log RegistroFactory Defaults Parámetros predeterminados de fábrica Reboot ReinicioDiagnostics Diagnóstico Ping Test Prueba de pingInternet Connection Conexión a Internet Status Estado RouterRouter Information Información del router Local Network Red local Status Wireless Network Estado Red inalámbricaWireless Network Red inalámbrica Dhcp Server Servidor DhcpApéndice a Resolución de problemas Su ordenador no puede conectarse a InternetApéndice B Especificaciones WRT160NObtención del servicio de garantía Garantía limitadaExclusiones y limitaciones Asistencia técnica Para devolución de productosApéndice D Información sobre normativaIndustry Canada Statement Una copia impresa ofrecida junto al producto Restricciones nacionales Equipo inalámbrico productos Wireless-N/G/A/BMarca CE Restricciones para 2,4 GHz Restricciones de uso del productoDocumentos técnicos en Software o firmware de tercerosDansk Danish Miljøinformation for kunder i EU Información sobre normativa Norsk Norwegian Miljøinformasjon for kunder i EU Información sobre normativa Anexo Productos de CiscoLicencias de software Acuerdo de licencia del software de CiscoAcuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final Anexo 3-A Anexo Características de Network MagicLicencias de terceros y de código abierto Licencia Pública General DE GNUPreámbulo Acuerdo de licencia del software para el usuario final FIN DEL Anexo 3-A Anexo 3-BAusencia DE Garantía Licencia Pública General Reducida DE GNU Acuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final Acuerdo de licencia del software para el usuario final Anexo 3-C FIN DEL Anexo 3-BLicencia de OpenSSL Licencia original de SSLeayFIN DEL Anexo 3-C Router Sem fios N de banda larga Recursos online Acerca deste manualDescrições dos ícones Direitos de autor e marcas comerciaisAnexo a Resolução de problemas Anexo B EspecificaçõesAnexo D Informações de regulamentação A/B Marca CE Restrições nacionaisPainel traseiro Capítulo Descrição geral do produtoPainel frontal Posições de colocaçãoColocação na parede Material de montagem sugeridoLista de verificação da segurança sem fios Sugestões adicionais de segurançaConfiguração automática Dhcp Configuração da InternetSetup Configuração Basic Setup Configuração básica Como aceder ao utilitário baseado na WebIP estático Internet Connection Type Tipo de ligação à Internet PPPoEDefinições opcionais Definição do servidor de Dhcp Configuração da redeIP do router Clientes já reservadosServiço Ddns Setup Configuração DdnsDefinição da hora Encaminhamento dinâmico RIP Clonar endereço MACEncaminhamento avançado Tabela de encaminhamento Definições sem fios básicasEncaminhamento estático Segurança sem fios Modo de segurançaSecurity Mode Modo de segurança WPA Enterprise Restrição de acesso Wireless Sem fios Wireless MAC Filter Filtro MAC sem fiosFiltro MAC sem fios Lista de filtros de endereços MACWireless Client List Lista de clientes sem fios Sem fios avançadasFiltro Web Security Segurança FirewallFiltro da Internet Política de acesso à Internet Security Segurança VPN Passthrough Passagem VPNPassagem VPN ResumoReencaminhamento de porta única Intervalo de reencaminhamento de portas Intervalo de accionamento de portas Applications and Gaming Aplicações e jogos DMZApplications and Gaming Aplicações e jogos QoS Tabela de clientes DhcpPrioridade de acesso à Internet QoS Qualidade do serviçoSem fios CategoriaAcesso à Web GestãoAcesso ao router Porta EthernetAcesso remoto Administration Administração Log RegistoRegisto Cópia de segurança e restauroTeste de ping ReiniciarDiagnósticos Teste de rastreio de rotaActualização do firmware Status Estado Local Network Rede localPredefinições de fábrica Informações sobre o routerRede sem fios Rede localServidor de Dhcp Anexo a Resolução de problemas Computador não consegue estabelecer ligação à InternetAnexo B Especificações AmbienteExclusões e limitações Anexo C Informações sobre a garantiaGarantia limitada Obter o serviço de garantiaSuporte técnico GeralAnexo D Informações de regulamentação Industry Canada Statement Изисквания Приложими Restrições nacionais Equipamento sem fios Produtos sem fios N/G/A/BRestrições da banda de 2,4 GHz Restrições à utilização do produtoDocumentos técnicos em Software ou firmware de terceirosDansk Danish Miljøinformation for kunder i EU Informações de regulamentação Norsk Norwegian Miljøinformasjon for kunder i EU Informações de regulamentação Produtos da Cisco Licenças de softwareContrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software Anexo Funcionalidades do Network Magic Preâmbulo Anexo Licenças de Terceiros e Open SourceLicença Pública Geral GNU Termos E Condições Para CÓPIA, Distribuição E Modificação Contrato de Licença do Utilizador Final para Software Licença Pública Geral Menor GNU Garantias NÃO IncluídasFIM do Anexo 3-A Termos E Condições Para CÓPIA, Distribuição E Modificação Contrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software Contrato de Licença do Utilizador Final para Software FIM do Anexo 3-B Licença OpenSSLLicença SSLeay Original FIM do Anexo 3-C
Related manuals
Manual 47 pages 58.56 Kb