User Guide
Page 3
...Configuration 2 How to Access the Web-Based Utility 2 Setup > Basic Setup 2 Setup > DDNS 6 Setup > MAC Address Clone 7 Setup > Advanced Routing 7 Security > Firewall 8 Security > VPN 9 Restrict Access 11 Applications & Gaming > Port Triggering 14 Applications & Gaming > UPnP Forwarding 14 Applications & Gaming > DMZ 15 Administration > Management ... Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 25 Appendix E: Software License Agreement 29 Software in Linksys Products 29 Software Licenses 29 Broadband Firewall Router with 4-Port Switch/VPN Endpoint ii
...Configuration 2 How to Access the Web-Based Utility 2 Setup > Basic Setup 2 Setup > DDNS 6 Setup > MAC Address Clone 7 Setup > Advanced Routing 7 Security > Firewall 8 Security > VPN 9 Restrict Access 11 Applications & Gaming > Port Triggering 14 Applications & Gaming > UPnP Forwarding 14 Applications & Gaming > DMZ 15 Administration > Management ... Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 25 Appendix E: Software License Agreement 29 Software in Linksys Products 29 Software Licenses 29 Broadband Firewall Router with 4-Port Switch/VPN Endpoint ii
User Guide
Page 12
... to match the name used to enable the tunnel. Under Local Secure Group and Remote Secure Group, you use the PPPoE client software provided by your computer(s) to access the tunnel. When using the Subnet setting, the default values of 0 should remain in the...your changes. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Broadband Firewall Router with 4-Port Switch/VPN Endpoint Security > VPN Tunnel Establishing a Tunnel The Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is...
... to match the name used to enable the tunnel. Under Local Secure Group and Remote Secure Group, you use the PPPoE client software provided by your computer(s) to access the tunnel. When using the Subnet setting, the default values of 0 should remain in the...your changes. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Broadband Firewall Router with 4-Port Switch/VPN Endpoint Security > VPN Tunnel Establishing a Tunnel The Router creates a tunnel or channel between two endpoints, so that the data or information between these endpoints is...
User Guide
Page 13
... a request from any combination of up to create the Encryption Key. This setting should be another VPN Router, a VPN Server, or a computer with VPN client software that the initial key exchange and IKE proposals are allowed. In this section, you can be selected. ...computer with VPN client software that is being used , a key is more secure). You may choose either of the tunnel. Authentication Authentication acts as a second VPN Router, on the Internet, for any IP address. This is being transmitted over the tunnel, where it Broadband Firewall Router with 4-Port Switch...
... a request from any combination of up to create the Encryption Key. This setting should be another VPN Router, a VPN Server, or a computer with VPN client software that the initial key exchange and IKE proposals are allowed. In this section, you can be selected. ...computer with VPN client software that is being used , a key is more secure). You may choose either of the tunnel. Authentication Authentication acts as a second VPN Router, on the Internet, for any IP address. This is being transmitted over the tunnel, where it Broadband Firewall Router with 4-Port Switch...
User Guide
Page 18
...'s administrator to the client web browser. Its primary function is the DMZ host. All pending messages and attachments are hardware and/or software processes reporting activity in a MIB (Management Information Base), which PC is to establish a connection with a specific MAC address, enter ... NNTP (Network News Transfer Protocol) The protocol used to be able to cancel your changes, or click Cancel Changes to access. Broadband Firewall Router with little selectivity. Specify a MAC Address behind the DMZ Port If you can specify which is a data structure that computer's IP...
...'s administrator to the client web browser. Its primary function is the DMZ host. All pending messages and attachments are hardware and/or software processes reporting activity in a MIB (Management Information Base), which PC is to establish a connection with a specific MAC address, enter ... NNTP (Network News Transfer Protocol) The protocol used to be able to cancel your changes, or click Cancel Changes to access. Broadband Firewall Router with little selectivity. Specify a MAC Address behind the DMZ Port If you can specify which is a data structure that computer's IP...
User Guide
Page 20
... limit, from the Linksys website, www.linksys.com. Log To disable the Log function, keep a permanent record using the Logviewer software. The Logviewer software saves all incoming and outgoing URLs or IP addresses for email alerts and a log of Service (DOS) attacks the Router detects before it times... many times in this software from 20 to 100, is the amount of Denial of all incoming and outgoing activity in the ping test here. This number can be between 1 and 4 and should the Router wait before sending an email alert. Broadband Firewall Router with options for your ...
... limit, from the Linksys website, www.linksys.com. Log To disable the Log function, keep a permanent record using the Logviewer software. The Logviewer software saves all incoming and outgoing URLs or IP addresses for email alerts and a log of Service (DOS) attacks the Router detects before it times... many times in this software from 20 to 100, is the amount of Denial of all incoming and outgoing activity in the ping test here. This number can be between 1 and 4 and should the Router wait before sending an email alert. Broadband Firewall Router with options for your ...
User Guide
Page 25
...for refurbished product This limited warranty is used will be bundled with third party software or Broadband Firewall Router with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of Linksys. TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED WARRANTIES AND CONDITIONS ... on how long an implied warranty lasts, so the above limitation or exclusion may not apply to Linksys at www.linksys.com. ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT, WHETHER FACTORY LOADED ON THE PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING THE PRODUCT, IS...
...for refurbished product This limited warranty is used will be bundled with third party software or Broadband Firewall Router with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of Linksys. TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED WARRANTIES AND CONDITIONS ... on how long an implied warranty lasts, so the above limitation or exclusion may not apply to Linksys at www.linksys.com. ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT, WHETHER FACTORY LOADED ON THE PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING THE PRODUCT, IS...
User Guide
Page 32
..., INSTALL OR USE THE SOFTWARE. Broadband Firewall Router with such product. "Software" includes, and this Agreement will not copy or modify the Software or decompile, decrypt, reverse engineer or disassemble the Software (except to the source code of such software, that source code is not transferable except to a person or entity to (a) the software of Linksys or its suppliers provided...
..., INSTALL OR USE THE SOFTWARE. Broadband Firewall Router with such product. "Software" includes, and this Agreement will not copy or modify the Software or decompile, decrypt, reverse engineer or disassemble the Software (except to the source code of such software, that source code is not transferable except to a person or entity to (a) the software of Linksys or its suppliers provided...
User Guide
Page 33
... has with any third parties regarding your Linksys product and/or the Software. IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Broadband Firewall Router with only those rights herein that...
... has with any third parties regarding your Linksys product and/or the Software. IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF Broadband Firewall Router with only those rights herein that...
User Guide
Page 34
... free program will not reflect on the Program (independent of having been made it clear that any other Free Software Foundation software is addressed as a whole at all the notices that refer to this License. You may at your option...receive source code or can get the source code. This General Public License applies to most of the Free Software Foundation's software and to any part thereof, to be licensed for a fee, you must cause the modified files to know...You must give any patent must be licensed as "you to ask you ". Broadband Firewall Router with the Program.
... free program will not reflect on the Program (independent of having been made it clear that any other Free Software Foundation software is addressed as a whole at all the notices that refer to this License. You may at your option...receive source code or can get the source code. This General Public License applies to most of the Free Software Foundation's software and to any part thereof, to be licensed for a fee, you must cause the modified files to know...You must give any patent must be licensed as "you to ask you ". Broadband Firewall Router with the Program.
User Guide
Page 35
... is not required to print an announcement.) These requirements apply to distribute corresponding source code. (This alternative is allowed only for software interchange; Each time you redistribute the Program (or any work based on the Program, the distribution of the whole must be ... on the Program), you under this License. You may not copy, modify, sublicense, or distribute the Program except as separate works. or, Broadband Firewall Router with such an offer, in full compliance. 5. Thus, it with the object code. 4. Accompany it is made by modifying or distributing the...
... is not required to print an announcement.) These requirements apply to distribute corresponding source code. (This alternative is allowed only for software interchange; Each time you redistribute the Program (or any work based on the Program, the distribution of the whole must be ... on the Program), you under this License. You may not copy, modify, sublicense, or distribute the Program except as separate works. or, Broadband Firewall Router with such an offer, in full compliance. 5. Thus, it with the object code. 4. Accompany it is made by modifying or distributing the...
User Guide
Page 36
...not distribute the Program at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. 33 If the Program does Broadband Firewall Router with 4-Port Switch/VPN Endpoint Software License Agreement not specify a version number of this License and any other property right claims or to contest... 2.1 of the Program into other circumstances. END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under this License, you wish to address new problems or concerns. Each version is copyrighted by copyrighted interfaces, ...
...not distribute the Program at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. 33 If the Program does Broadband Firewall Router with 4-Port Switch/VPN Endpoint Software License Agreement not specify a version number of this License and any other property right claims or to contest... 2.1 of the Program into other circumstances. END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under this License, you wish to address new problems or concerns. Each version is copyrighted by copyrighted interfaces, ...
User Guide
Page 37
... we gave you can relink them these rights. Broadband Firewall Router with the library. Most GNU software, including some specially designated software packages-typically libraries-of the Free Software Foundation and other free software developers Less of free software, we want it . A more lax criteria for...the same job as its users. Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to use the library. We...
... we gave you can relink them these rights. Broadband Firewall Router with the library. Most GNU software, including some specially designated software packages-typically libraries-of the Free Software Foundation and other free software developers Less of free software, we want it . A more lax criteria for...the same job as its users. Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to use the library. We...
User Guide
Page 38
..."Library", below, refers to any such software library or work which use of the Library in a tool for writing it). Activities other than as an argument passed when the facility is invoked, then you distribute them as separate works. Broadband Firewall Router with application programs (which has been distributed...any associated interface definition files, plus the scripts used by this License. Each licensee is addressed as you receive it, in any software library or other program which is a work based on the Library, the distribution of the whole must be optional: if the ...
..."Library", below, refers to any such software library or work which use of the Library in a tool for writing it). Activities other than as an argument passed when the facility is invoked, then you distribute them as separate works. Broadband Firewall Router with application programs (which has been distributed...any associated interface definition files, plus the scripts used by this License. Each licensee is addressed as you receive it, in any software library or other program which is a work based on the Library, the distribution of the whole must be optional: if the ...
User Guide
Page 39
...the Library (or with the complete corresponding machine-readable source code for the Library including whatever changes were used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering ...Software License Agreement When a "work that uses the Library" uses material from that version instead if you must alter all subsequent copies and derivative works made in the work (which must be linked without the Library, or if the work is therefore covered by law. The executable is itself . 6. Broadband Firewall Router...
...the Library (or with the complete corresponding machine-readable source code for the Library including whatever changes were used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering ...Software License Agreement When a "work that uses the Library" uses material from that version instead if you must alter all subsequent copies and derivative works made in the work (which must be linked without the Library, or if the work is therefore covered by law. The executable is itself . 6. Broadband Firewall Router...
User Guide
Page 40
...do not normally accompany the operating system. Appendix E b) Use a suitable shared library mechanism for linking with 4-Port Switch/VPN Endpoint Software License Agreement 8. Each time you may not copy, modify, sublicense, link with this License would not permit royalty-free redistribution of the...or works based on it. 10. You are not required to refrain entirely from the conditions of the other library facilities. Broadband Firewall Router with the Library. For example, if a patent license would be to accept this section is interface-compatible with the version ...
...do not normally accompany the operating system. Appendix E b) Use a suitable shared library mechanism for linking with 4-Port Switch/VPN Endpoint Software License Agreement 8. Each time you may not copy, modify, sublicense, link with this License would not permit royalty-free redistribution of the...or works based on it. 10. You are not required to refrain entirely from the conditions of the other library facilities. Broadband Firewall Router with the Library. For example, if a patent license would be to accept this section is interface-compatible with the version ...
User Guide
Page 41
...spirit to the present version, but may add an explicit geographical distribution limitation excluding those countries, so that system; NO WARRANTY Broadband Firewall Router with these, write to the author to ask for use in the OpenSSL Toolkit. (http://www.openssl.org/). Actually both the... apply to the toolkit. In such case, this License incorporates the limitation as if written in the body of this Linksys product contains open source software licensed under a dual license, i.e. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR...
...spirit to the present version, but may add an explicit geographical distribution limitation excluding those countries, so that system; NO WARRANTY Broadband Firewall Router with these, write to the author to ask for use in the OpenSSL Toolkit. (http://www.openssl.org/). Actually both the... apply to the toolkit. In such case, this License incorporates the limitation as if written in the body of this Linksys product contains open source software licensed under a dual license, i.e. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR...
User Guide
Page 42
...distribution. 3. Redistributions of conditions and the following disclaimer in binary form must display the following acknowledgement: "This product includes cryptographic software written by Eric Young ([email protected])" The word 'cryptographic' can be called "OpenSSL" nor may "OpenSSL" appear... © 1995-1998 Eric Young ([email protected]) All rights reserved. Broadband Firewall Router with the package. This product includes cryptographic software written by Tim Hudson (tjh@ cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES...
...distribution. 3. Redistributions of conditions and the following disclaimer in binary form must display the following acknowledgement: "This product includes cryptographic software written by Eric Young ([email protected])" The word 'cryptographic' can be called "OpenSSL" nor may "OpenSSL" appear... © 1995-1998 Eric Young ([email protected]) All rights reserved. Broadband Firewall Router with the package. This product includes cryptographic software written by Tim Hudson (tjh@ cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES...
User Guide
Page 43
...) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 4 Software License Agreement Broadband Firewall Router with 4-Port Switch/VPN Endpoint 8111121B-JL 40 LOSS OF...
...) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 4 Software License Agreement Broadband Firewall Router with 4-Port Switch/VPN Endpoint 8111121B-JL 40 LOSS OF...