About This Guide About This Guide Copyright and Trademarks Linksys, Cisco and the Cisco Logo Icon Descriptions registered trademarks trademarks of Cisco Systems, Inc. While reading through the User Guide you may see and/or its affiliates in the U.S. and various icons that call attention to specific items.
VPN client software Introduction to the Router applications that support IPSec to be installed. Thank you for choosing the Linksys 10/100 8-Port VPN NOTE: The 10/100 8-Port VPN Router supports Router. The Router lets multiple computers in your office IPSec VPN client software, including the Linksys share an Internet connection.
Off-Site Internet Notebook with VPN Client Software Central Office Router Computer to VPN Router For additional information and instructions about creating your own VPN, visit the Linksys website at www.linksys.com. 10/100 8-Port VPN Router...
Chapter 2 Product Overview Chapter 2: Reset The Reset button can be used for a warm reset or a reset to factory defaults. Product Overview Warm Reset If the Router is having • problems connecting to the Internet, press and hold in the Reset button for a Front Panel second using the tip of a pen.
The Router has four rubber feet on its bottom panel. Set true to scale. the Router on a flat surface near an electrical outlet. NOTE: Linksys is not responsible for damages WARNING: Do not place excessive weight incurred by insecure wall-mounting hardware.
Chapter 3 Installation Place the wall-mount slots over the screws and slide Repeat step 2 to attach the other bracket to the the Router down until the screws fit snugly into the opposite side. wall-mount slots. After the brackets are attached to the Router, use suitable screws to securely attach the brackets to any Rack-Mount Placement standard 19-inch rack.
Page 13
Chapter 3 Installation Connect your cable or DSL modem’s Ethernet cable to the Router’s Internet port. If you are using the DMZ/Internet port, then connect an Ethernet cable to the DMZ/Internet port. Connect the other end to a network device, such as a modem or public server.
Chapter 4 Advanced Configuration Chapter 4: System Summary Advanced Configuration The first screen that appears is the System Summary screen, which displays the Router’s current status and settings. This information is read-only. Underlined text Overview is hyperlinked to related setup pages, so if you click a hyperlink, the related setup screen will appear.
Upgrade” for instructions. Go buy To purchase a license to use this service, click Go buy. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. Register If you already have a license, click Register. You will be redirected to the Trend Micro ProtectLink Gateway System Summary (ProtectLink™...
Chapter 4 Advanced Configuration DDNS It shows the DDNS settings of the Router’s WAN port(s) and hyperlinks to the Setup > DDNS screen. DMZ Host It shows the DMZ private IP address and hyperlinks to the Setup > DMZ Host screen. The default is Disabled.
Chapter 4 Advanced Configuration be sent out, probably use incorrect settings, ” will be displayed. Setup > Network The Network screen shows all of the Router’s basic setup functions. The Router can be used in most network setups without changing any of the default values; however, you may need to enter additional information in order to connect to the Internet through an ISP (Internet Service Provider) or broadband (DSL or cable) carrier.
Page 18
Chapter 4 Advanced Configuration If you want to delete a subnet you have created, select it the Router. On the System Management > Dual-WAN screen, and click Delete selected subnet. Click Save Settings you can specify using one as a primary connection, with to save your changes, or click Cancel Changes to undo Smart Link Backup or using both connections in concert, them.
Page 19
Chapter 4 Advanced Configuration Static IP Specify WAN IP Address Enter the external IP address of the Router. Subnet Mask Enter the subnet mask of the Router. PPPoE Default Gateway Address Enter the IP address of the default gateway. User Name and Password Enter your account’s User DNS Server (Required) 1/2 Name and Password.
Page 20
Chapter 4 Advanced Configuration Click Save Settings to save your changes, or click Cancel Click Save Settings to save your changes, or click Cancel Changes to undo them. Changes to undo them. PPTP (Point-to-Point Tunneling Protocol) Transparent Bridge Point to Point Tunneling Protocol (PPTP) is a service used To connect two network segments, select Transparent Bridge.
The Router’s default User Name and Password is admin, The Maximum Transmission Unit (MTU) setting and Linksys strongly recommends that you change the specifies the largest packet size permitted for network Router’s password from the default to a unique password.
Chapter 4 Advanced Configuration Click Save Settings to save your change, or click Cancel Click Save Settings to save your changes, or click Cancel Changes to undo it. Changes to undo them. Setup > Time Setup > DMZ Host The Router uses the time settings to time stamp log events, The DMZ (Demilitarized Zone) Host feature allows one automatically apply the Access Rules and Content Filter, local user to be exposed to the Internet for use of a...
Chapter 4 Advanced Configuration Service Management Service Name Enter a name. Protocol Select the protocol it uses. Setup > Forwarding Port Range Enter its range. Forwarding Click Add to List. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return Port Range Forwarding to the Forwarding screen.
Chapter 4 Advanced Configuration Incoming Port Range UPnP Enter the starting and ending port numbers of the incoming port range. UPnP Function Select Yes to enable the UPnP function. Click Add to List, and configure as many entries as you Otherwise, keep the default, No.
Chapter 4 Advanced Configuration One-to-One NAT One-to-One NAT Select Enable to use the One-to-One NAT function. UPnP Forwarding Table List Add Range Click Refresh to update the on-screen information. Click Private Range Begin Enter the starting IP address of the Close to exit this screen and return to the UPnP screen.
Chapter 4 Advanced Configuration MAC Clone DynDNS.org WAN1/2 If you have enabled the Dual WAN feature, then you will have two ports, WAN1 and WAN2, available for MAC address assignment or cloning. User Defined WAN MAC Address To manually clone a MAC address, select User Defined WAN MAC Address, and then enter the 12 digits of your adapter’s MAC address.
Chapter 4 Advanced Configuration Password 3322.org Enter your PeanutHull account information. Host Name Enter your host name in the three Host Name fields. For example, if your host name were myhouse. oray.net, then myhouse would go into the first field, oray would go into the second field, and net would go into the last field.
Chapter 4 Advanced Configuration Working Mode Select Gateway mode if the Router passes through before reaching its destination. A node is is hosting your network’s connection to the Internet. any device on the network, such as a computer or router. Select Router mode if the Router exists on a network Interface Select the appropriate interface.
Chapter 4 Advanced Configuration Setup Enable DHCP Server To use the Router as your network’s DHCP server, select Enable DHCP Server. If you already have a DHCP server on your network, remove the check mark. Then configure the Dynamic IP settings. Dynamic IP Client Lease Time The Client Lease Time is the amount...
Chapter 4 Advanced Configuration To update the on-screen information, click Refresh. To exit NOTE: support NetBIOS DHCP this screen and return to the Setup screen, click Close. clients, the Router uses two methods. Static IP Address Enter the static IP address. You can First, when the DHCP clients receive dynamic enter 0.0.0.0 if you want the Router to assign a static IP IP addresses from the Router, it automatically...
Chapter 4 Advanced Configuration Dual-WAN Smart Link Backup/Load Balance If you want to use one of the WAN ports as the primary port and the other WAN port as backup, then select Smart Link Backup. If you want the Router to automatically manage the Internet connection through both WAN ports, then select Load Balance.
Page 32
Chapter 4 Advanced Configuration Generate the Error Condition in the System Retry Count Enter the number of times the Router will • Failover will not occur; only an error condition try to reconnect if the connection fails. will be logged. Retry Timeout Enter the number of times the Router will Network Service Detection can test a WAN port’s network...
Chapter 4 Advanced Configuration Service Name Enter a name. For IP Binding only, select All. Protocol Select the protocol it uses. Port Range Enter its range. Click Add to List. Click Save Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Dual-WAN screen.
Page 34
Chapter 4 Advanced Configuration Summary (Rate Control Selected) To change a rule, click Edit. To update the list, click Refresh. To return to the Bandwidth Management screen, click Close. On the Bandwidth Management screen, click Save Settings to save your changes, or click Cancel Changes to undo them.
Chapter 4 Advanced Configuration To change a rule, click Edit. To update the list, click Refresh. To return to the Bandwidth Management screen, click Close. On the Bandwidth Management screen, click Save Settings to save your changes, or click Cancel Changes to undo them.
The Internet has a service called the Domain Name Service (DNS), which allows users to enter an easily remembered host name, such as www.linksys.com, instead of numerical TCP/IP addresses to access Internet resources. The DNS Name Lookup tool will return the numerical TCP/IP address of a host name.
Factory Default Setting if you want to restore the Router to its factory default settings. After clicking the button, a If you need to restart the Router, Linksys recommends that confirmation screen appears. Click OK to continue. you use the Restart tool on this screen. When you restart from the Restart screen, then the Router will send out your log file before it is reset.
Chapter 4 Advanced Configuration System Management > Setting Backup Port Management > Port Setup Import Configuration File Basic Per Port Config. To import a configuration file, first specify where your The Basic Per Port Config. table displays the following: backup preferences file is located. Click Browse, and then Port ID The port number or name is displayed.
Chapter 4 Advanced Configuration To update the on-screen information, click Refresh. Firewall > General Enable or disable a variety of firewall, security, and web features. Port Management > Port Status Port ID To see the status information and settings for a specific port, select its ID number or name.
NOTE: If you disable the HTTPS feature, then you also disable the Linksys QuickVPN service The Router has the following default rules: on the Router. All traffic from the LAN to the WAN is allowed.
Chapter 4 Advanced Configuration Access Rules Add a New Access Rule Except for the default rules, all configured access rules are listed in the Access Rules table, and you can set the priority for each custom rule. If the Access Rules table has multiple pages, select a different page to view from the Jump to drop-down menu.
Chapter 4 Advanced Configuration Firewall > Content Filter Settings to save your changes, or click Cancel Changes to undo them. Click Exit to return to the Add a New Access Rule screen. Use this screen to block specific domains during the designated days and times for specific devices.
Chapter 4 Advanced Configuration Click Save Settings to save your changes, or click Cancel For each VPN tunnel, the No., Name, Status, Phase 2 Enc/ Changes to undo them. Auth/Grp, Local Group, Remote Group, and Remote Gateway will be displayed. NOTE: The content filter rules will be For each group VPN, the Group Name, number of...
Chapter 4 Advanced Configuration Name Remote Clients Status Click Detail List to display the It shows the Tunnel Name that you gave the VPN tunnel. Group Name, IP address and Connection Time of this group VPN. Click Refresh to update the on-screen information. Status This indicates the status of the VPN tunnel.
Chapter 4 Advanced Configuration IP Only The default is IP Only. Only the device with a specific IP address will be able to access the tunnel. Local Security Gateway Type > IP Only IP address The WAN (or Internet) IP address of the Router automatically appears.
Page 46
Chapter 4 Advanced Configuration Local Security Group Type > Subnet IP address Enter the IP address. The default is Local Security Gateway Type > Dynamic IP + Domain Name(FQDN) Authentication 192.168.1.0. Domain Name Enter the domain name for authentication. Subnet Mask Enter the subnet mask.
Page 47
Chapter 4 Advanced Configuration IP address Select this option if you know the static IP Dynamic IP + Domain Name(FQDN) Authentication address of the remote VPN device at the other end of the The Local Security Gateway will be a dynamic IP address, tunnel, and then enter the IP address.
Chapter 4 Advanced Configuration Phase 1 Encryption Select a method of encryption: DES (56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192 (192-bit), or AES-256 (256-bit). The method determines Remote Security Group Type > IP the length of the key used to encrypt or decrypt ESP IP address Enter the appropriate IP address.
Page 49
Chapter 4 Advanced Configuration Preshared Key This specifies the pre-shared key used Encryption Key is 48-bit, which requires 40 hexadecimal to authenticate the remote IKE peer. Enter a key of values. If you do not enter enough hexadecimal values, keyboard and hexadecimal characters, e.g., My_@123 then the rest of the Encryption Key will be automatically or 4d795f40313233.
Chapter 4 Advanced Configuration VPN Tunnel Backup Idle Time want the Router to propose compression when it initiates a After the specified • connection. If the responders reject this proposal, then the length of idle time, the Router will check the VPN tunnel Router will not implement compression.
IPSec client software, including the Linksys QuickVPN software. To manage access for Linksys QuickVPN Local Security Gateway Type > IP Only clients, click the VPN Client Access tab. (For IP address The WAN (or Internet) IP address of the Router more information about QuickVPN, refer to automatically appears.
Page 52
Chapter 4 Advanced Configuration Local Security Group Type > Subnet IP address Enter the IP address. The default is Local Security Gateway Type > Dynamic IP + Domain Name(FQDN) Authentication 192.168.1.0. Subnet Mask Enter the subnet mask. The default is Domain Name Enter the domain name for authentication.
Page 53
Chapter 4 Advanced Configuration the remote computer requests to create a tunnel with the Router, the Router will work as a responder. Remote Client > IP + Domain Name(FQDN) Authentication IP address Select this option if you know the static IP Remote Client >...
Chapter 4 Advanced Configuration (The Microsoft VPN client software does not support Aggressive mode and FQDN or User FQDN ID options.) Local Security Group Type > Subnet Remote Client > Microsoft XP/2000 VPN Client IP address Enter the IP address. The default is 192.168.1.0.
Page 55
Chapter 4 Advanced Configuration Perfect Forward Secrecy If the Perfect Forward Secrecy (PFS) feature is enabled, IKE Phase 2 negotiation will generate new key material for IP traffic encryption and authentication, so hackers using brute force to break encryption keys will not be able to obtain future IPSec keys.
Linksys QuickVPN clients. (The Router supports up to unchecked (Main Mode will be used). If network speed is 50 Linksys QuickVPN clients free of charge. If the Router preferred, select Aggressive Mode. If you select one of you have only supports up to ten clients, then upgrade the Dynamic IP types for the Remote Security Gateway its firmware.
Chapter 4 Advanced Configuration Add the QuickVPN client to the list. month and day; HHMM stands for hours and minutes.) Follow the on-screen instructions to save the file in the VPN Client Users install directory of the QuickVPN client software. User Name Enter the user name.
Chapter 4 Advanced Configuration User Name Enter a name for the PPTP VPN client. L2TP Pass Through Layer 2 Tunneling Protocol is the method used to enable Point-to-Point sessions via the New Password Enter a password for the PPTP VPN Internet on the Layer 2 level.
Chapter 4 Advanced Configuration so unless you change this setting, the Router will e-mail the log to you when there are more than 50 log entries. Log Time Threshold You can designate how often the log will be e-mailed to you. The default is 10 minutes, so unless you change this setting, the Router will e-mail the log to you every 10 minutes.
Chapter 4 Advanced Configuration View System Log To view logs, click this option. The System Log screen appears. Incoming Log Table Time The time of each log event is displayed. You can sort each log by time sequence. Event-Type The type of log event is displayed. System Log Message The message associated with each log event is...
Chapter 4 Advanced Configuration connection(s). Run the Access Rule Setup Wizard to set up Your Internet Service Provider (ISP) may require you the security policy for the Router. to use a host and domain name for your Internet connection. If your ISP requires them, complete the Host Name and Domain Name fields;...
Page 62
Chapter 4 Advanced Configuration Depending on which connection type you have Static IP selected, the appropriate screen will appear. Follow Complete the Static IP, Subnet Mask, and Default the instructions for the appropriate connection type: Gateway fields with the settings provided by your ISP. Obtain an IP automatically Click Next to continue.
Page 63
Chapter 4 Advanced Configuration PPPoE Complete the User Name and Password fields with the information provided by your ISP. Click Next to continue. Click Previous if you want to return to the previous screen. Click Exit if you want to exit the Setup Wizard.
Chapter 4 Advanced Configuration Save Settings. Allow or Deny If you want to save your changes, click From the drop-down menu, select Click Previous if you want to return to the previous depending on the intent of the Access Rule. screen.
Page 65
Chapter 4 Advanced Configuration LAN, WAN1, WAN2, or Select the Source Interface: Select the Destination IP address(es) for this Access Any from the Interface pull-down menu. Rule. If it can be any IP address, select Any. If it is one IP address, select Single and enter the IP address.
Adobe Reader. screen. Click Exit if you want to exit the Setup Wizard. Linksys Web Site Click Linksys Web Site, and the Support page of the Linksys website appears. Logout The Logout tab is located on the upper right-hand corner of the screen.
If the Diag LED continues to flash, the firmware image is damaged. Use the TFTP utility to upgrade the firmware. You can download the TFTP utility at www.linksys.com. Your computer cannot connect to the Internet. Follow these instructions until your computer can connect to the Internet: Make sure that the Router is powered on.
Add the QuickVPN client to the list. The 10/100 8-Port VPN Router (model number: RV082) The second section explains how to install and use Linksys supports IPSec VPN client software, including the Linksys QuickVPN, which works on computers running Windows QuickVPN software (also known as the Linksys VPN 2000, XP, or Vista.
Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista VPN tab. In the Router’s web-based utility, click the For the Change Password Allowed setting, select Yes to allow the user to change his or her password. Click the VPN Client Access tab.
Linksys QuickVPN Utility in the More Information Click client software. section. Select the version number of the Router. Proceed to the section, “Use of the Linksys QuickVPN Software”. Save the zip file to your computer, and extract the .exe file. Use of the Linksys QuickVPN Software Double-click the .exe file.
Appendix B Linksys QuickVPN for Windows 2000, XP, or Vista Password To terminate the VPN tunnel, click Disconnect. To Enter the Password assigned to you. • change your password, click Change Password. For Server Address Enter the IP address or domain name •...
Appendix C Gateway-to-Gateway VPN Tunnel Appendix C: Configuration of the RVL200 Gateway-to-Gateway VPN Follow these instructions for the first VPN Router, designated RVL200. The other VPN Router is designated Tunnel the RV082. Launch the web browser for a networked computer, designated PC 1.
Appendix C Gateway-to-Gateway VPN Tunnel IP Only. In the Preshared Key field, enter a string for this key, for For the Remote Security Gateway Type, select example, 13572468. Enter the RVL200’s WAN IP address in the IP Address field. For the Remote Security Group Type, select Subnet.
Appendix C Gateway-to-Gateway VPN Tunnel Configuration when the Remote Gateway Uses a Dynamic IP Address This example assumes the Remote Gateway is using a dynamic IP address. If the Remote Gateway uses a static IP address, refer to “Configuration when the Remote Gateway Uses a Static IP Address.
Appendix C Gateway-to-Gateway VPN Tunnel Configuration when Both Gateways Use Enable. Select For the Local Security Gateway Type, select IP Only. Dynamic IP Addresses The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. This example assumes both Gateways are using dynamic IP addresses.
Appendix C Gateway-to-Gateway VPN Tunnel Enable. Select For the Local Security Gateway Type, select IP Only. The WAN IP address (B.B.B.B) of the RV082 will be automatically detected. For the Local Security Group Type, select Subnet. Enter the RV082’s local network settings in the IP Address and Subnet Mask fields.
Appendix D IPSec NAT Traversal Appendix D: Configuration of Scenario 1 IPSec NAT Traversal In this scenario, Router A is the RVL200 Initiator, while Router B is the RVL200 Responder. Overview Network Address Translation (NAT) traversal is a technique developed so that data protected by IPSec can pass through a NAT.
Appendix D IPSec NAT Traversal IP Only. For the Local Security Group Type, select Subnet. Enter For the Local Security Gateway Type, select The WAN IP address of Router A will be automatically Router B’s local network settings in the IP Address and detected.
Appendix D IPSec NAT Traversal Configuration of the One-to-One NAT Rules Configuration of Scenario 2 The one-to-one NAT rules must be configured on In this scenario, Router B is the RVL200 Initiator, while NAT 2 - RV082 and NAT 1 - RV082. Router A is the RVL200 Responder.
Appendix D IPSec NAT Traversal One-to-One NAT tab. Subnet. Click the For the Remote Security Group Type, select Enter Router A’s local network settings in the IP Address For the One-to-One NAT setting, select Enable. and Subnet Mask fields. In the Private Range Begin field, enter 111.11.
Page 81
Appendix D IPSec NAT Traversal Subnet. For the Remote Security Group Type, select Enter Router B’s local network settings in the IP Address and Subnet Mask fields. In the IPSec Setup section, select the appropriate encryption, authentication, and other key management settings.
Appendix E Bandwidth Management Appendix E: Bandwidth Management Overview This appendix explains how to ensure Quality of Service (QoS) on Vonage Voice over Internet Protocol (VoIP) phone service. This example uses Vonage; however, similar instructions will apply to other VoIP services. Creation of New Services Create services,...
Appendix E Bandwidth Management Creation of New Bandwidth Management Enable to enable this rule. Select After you have set up the rule, click Add to list. Rules Set up a rule for Vonage 2. Select Vonage 2 from the Create four new rules: Vonage VoIP (Upstream), Vonage Service drop-down menu.
IP address, 192.168.1.1, in the Address field. System Management > Firmware Upgrade Press the Enter key. The Support page of the Linksys website appears. Follow the on-screen instructions to access the Downloads page for the 10/100 8-Port VPN Router (model number: RV082).
Page 85
Appendix F Firmware Upgrade The utility zip file will automatically open. Extract .exe file to an appropriate location on your computer. .exe file. Double-click the In the Router IP field, enter the IP address of the Router. Firmware Upgrade Utility Login In the Password field, enter the password for access to the Router.
Go buy To purchase a license to use this service, click Go buy. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. Register If you already have a license, click Register. You will be redirected to the Trend Micro ProtectLink Gateway website.
I want to buy Trend Micro ProtectLink Gateway. purchase a license to use this service, click this link. You will be redirected to a list of Linksys resellers on the Linksys website. Then follow the on-screen instructions. I have purchased ProtectLink Gateway and want to register it.
Appendix G Trend Micro ProtectLink Gateway Service ProtectLink > Web Protection Business Hours To filter this URL category during the business hours you have specified, select this option. The Web Protection features are provided by the Router. Leisure Hours To filter this URL category during Configure the website filtering settings on this screen.
If you do not Status The status of your license, Activated or Expired, is know this information, contact your ISP. displayed. https://us.imhs.trendmicro.com/linksys Platform The platform type, Gateway Service, is e-mail protection, click this link. You will be redirected to automatically displayed.
Page 90
Appendix G Trend Micro ProtectLink Gateway Service Renew To renew your license, click Renew. Then follow the on-screen instructions. Add Seats Each seat allows an e-mail account to use Email Protection. To add seats to your license, click Add Seats. Then follow the on-screen instructions. 10/100 8-Port VPN Router...
Java, Cookies, ActiveX, HTTP Proxy Status Monitor URL Filtering Static List by Domain or Keywords Environmental (included), Dynamic Filtering through Linksys/Trend Micro Dimensions 11.00" x 1.75" x 9.50" ProtectLink Gateway Services W x H x D (279.4 x 44.45 x 241.3 mm)
CONDITIONS, REPRESENTATIONS AND WARRANTIES, and the web pages referred to herein may be updated by INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED Linksys from time to time; the version in effect at the date WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. of purchase shall apply.
RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to (a) BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, excluding technology...
GPL or other open source code in this Software on a If this Linksys product contains open source software CD, Linksys will mail to You a CD with such code for $9.99 licensed under Version 2 of the “GNU General Public plus the cost of shipping, upon request.
Page 96
Appendix J Software License Agreement Copyright (C) 1989, 1991 Free Software Foundation, Inc. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, The precise terms and conditions for copying, distribution and modification follow.
Page 97
Appendix J Software License Agreement If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Each version is given a distinguishing version number. If this Linksys product contains open source software If the Program specifies a version number of this licensed under Version 2.1 of the “GNU Lesser General Public License which applies to it and “any later version”, you...
Appendix J Software License Agreement will apply to that open source software. The license terms recompiling it. And you must show them these terms so below in this Schedule 3 are from the public web site at they know their rights. http:// .gnu.org/licenses/old-licenses/lgpl-2.1.html We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license,...
Page 100
Appendix J Software License Agreement In other cases, permission to use a particular library in non- work based on the Library (independent of the use free programs enables a greater number of people to use of the Library in a tool for writing it). Whether that is a large body of free software.
Page 101
Appendix J Software License Agreement sections as part of a whole which is a work based on However, linking a “work that uses the Library” with the Library, the distribution of the whole must be on the Library creates an executable that is a derivative the terms of this License, whose permissions for other of the Library (because it contains portions of the licensees extend to the entire whole, and thus to each...
Page 102
Appendix J Software License Agreement Library will not necessarily be able to recompile the Give prominent notice with the combined library of application to use the modified definitions.) the fact that part of it is a work based on the Library, and explaining where to find the accompanying Use a suitable shared library mechanism for linking uncombined form of the same work.
Schedule 4 Each version is given a distinguishing version number. If this Linksys product contains open source software If the Library specifies a version number of this License licensed under the OpenSSL license: which applies to it and “any later version”, you have the...
Appendix J Software License Agreement OpenSSL License Original SSLeay License Copyright (c) 1998-2007 The OpenSSL Project. All rights Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) reserved. All rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
Appendix J Software License Agreement PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
Appendix K Regulatory Information Appendix K: Battery Recycling Statement Regulatory Information This product may contain a battery. Recycle or dispose of batteries in accordance with the battery manufacturer’s instructions and local/national disposal and recycling FCC Statement regulations. This product has been tested and complies with the 廢電池請回收...
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 108
Appendix K Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 109
Appendix K Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 110
ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. 10/100 8-Port VPN Router...
Appendix L Contact Information Appendix L: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.