About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the WPA-1000 using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Syntax Conventions • The ZyWALL 1050 may be referred to as the “WPA-1000”, the “device”, the “system” or the “product” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
Page 5
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The WPA-1000 icon is not an exact representation of your device. WPA-1000 Computer Notebook computer Server DSLAM Firewall Telephone Switch Router WPA-1000 User’s Guide...
Only use the included antenna(s). • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. This product is recyclable. Dispose of it properly. WPA-1000 User’s Guide...
6.3 Wireless Troubleshooting ....................44 6.4 Projection Problems ......................44 6.5 Internet Access ........................45 6.6 Reset the WPA-1000 to Its Factory Defaults ............... 46 Part III: Appendices and Index.............. 49 Appendix A Product Specifications..................51 Appendix B Setting up Your Computer’s IP Address............... 55 Appendix C Pop-up Windows, JavaScripts and Java Permissions .........
Page 15
Table of Contents Appendix H Customer Support....................149 Index............................153 WPA-1000 User’s Guide...
Page 16
Table of Contents WPA-1000 User’s Guide...
1.1.1 AP Mode (Standalone) Meeting participants can connect to the WPA-1000 in AP Mode. In this situation the WPA- 1000 acts as the access point (AP) in a standalone wireless network. Figure 1 AP Mode (Standalone) 1.1.2 AP Mode (with Internet Access)
Web Configurator. This is recommended for everyday management of the WPA-1000 using a (supported) web browser. See Section 2.4 on page 1.3 Good Habits for Managing the WPA-1000 Do the following things regularly to make the WPA-1000 more secure and to manage the WPA-1000 more effectively. WPA-1000 User’s Guide...
In the ZyXEL Support CD you can find the Firmware update tool. This tool updates your firmware. To update your firmware follow these steps. 1 Connect your computer to your WPA-1000 on the LAN port. 2 Locate your new firmware. You can find the latest firmware for your device from www.zyxel.com...
Page 24
Chapter 1 Introducing the WPA-1000 WPA-1000 User’s Guide...
Table 1 Hardware Connections Description LABEL DESCRIPTION POWER Use the power adapter that came with the package to connect your WPA-1000 to a power source. ON/OFF Press this button in to turn your device on or off. Use the grey VGA cable from the package to connect your WPA-1000 to a projector.
LAN. The device has no wireless connection. 2.3 Connecting to the Projector Connect the WPA-1000 to the projector (see the Quick Start Guide for instructions). The following image will appear on the projector screen. Figure 6 Projector Standby Screen The table below describes the labels on the screen.
Device Name This is the name given to the WPA-1000. This name is displayed in the user’s WPA-1000 utility when a user tries to connect to it. Network Type This is the wireless mode for the WPA-1000. It can be either AP mode (default) or Infrastructure mode. Use AP mode to...
Chapter 2 WPA-1000 Connections 2.4.2 Administrator Click on Administrator in the main screen. Type your user name and password in the screen below to access the administrator screen. Default Login Information user name admin password admin Change the user name and password for better security. See Section 4.2 on...
This is the status of the connected projector. It can be either Waiting for Project or Projecting. Users This shows how many people are logged into the WPA-1000. The maximum number of meeting participants allowed to log in at one time is 254. User List This shows a list of meeting participants who are logged into the device.
This is the IP address for each computer that is logged on to the device. Play Control • Click Play to begin or resume a user’s presentation • Click Stop to cut a user’s presentation. • Click Kick to disconnect a user from the network. WPA-1000 User’s Guide...
LABEL DESCRIPTION WPA-1000 Setup Device Name Set your own device name for your device. The default is WPA-1000. Resolution Your WPA-1000 supports 1024*768 resolution only at the time of writing. Login Code The login code is a password that allows a meeting participant access to the WPA-1000 utility in order to show a presentation.
Type a new password here. Use a combination of letters and digits without a Password space, up to 16 characters long. Confirm New Type exactly the same password here to confirm your password Password Send Click Send to apply your settings. Cancel Click Cancel to return to the previous settings WPA-1000 User’s Guide...
Infrastructure Mode and AP Mode. 5.1.1 AP Mode (Standalone) In this mode users connect to the WPA-1000 either through the LAN port or wirelessly, without an Internet connection. Enable the DHCP server to allow the allocation of user IP addresses.
Chapter 5 Network The AP must use the same security settings as the WPA-1000 to connect to it. The WPA-1000 only supports WEP at the time of writing. Use this screen to configure how users network with your device. Figure 12 Network > Network The following table describes the labels in the screen.
Table 9 Network > Wireless LABEL DESCRIPTION Wireless Setup Mode This is the wireless mode for the WPA-1000. It can be either AP mode (default) or Infrastructure mode. • Use AP mode (default) to connect wirelessly to the WPA-1000 directly. •...
Chapter 5 Network 5.1.4 AP Mode Example (Standalone) 1 Go to Network > Network to set an IP address for your WPA-1000. The default is 192.168.1.10. 2 Enable the DHCP server. Set the WPA-1000’s DHCP server to allocate an IP address for each user.
1 Connect the LAN port to a broadband modem for Internet access. 2 Go to Network > Network to set an IP address for your WPA-1000. Ask your network administrator if you are unsure of what this should be. In this example it is 192.168.1.1.
Figure 3 on page 22 for a diagram of this example. 1 Go to Network > Network to set an IP address for your WPA-1000. Ask your network administrator if you are unsure of what this should be. In this example it is 192.168.1.1.
2 Make sure you are using the power cord included with the WPA-1000. 3 Make sure the power cord is connected to the WPA-1000 and plugged in to an appropriate power source. Make sure the power source is turned on.
1 Check the projector is turned on and working properly. 2 Check your grey VGA cable is securely attached to the WPA-1000 and to the projector. 3 Turn the projector off and then on. 6.2 WPA-1000 Access and Login I forgot the IP address for the WPA-1000.
Page 43
Java enabled. See Section Appendix C on page 65 4 Make sure your computer is in the same subnet as the WPA-1000. (If you know that there are routers between your computer and the WPA-1000, skip this step.) • If there is a DHCP server on your network, make sure your computer is using a dynamic IP address.
4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the WPA-1000. 5 Check that both the WPA-1000 and your wireless station are using the same wireless and wireless security settings. The link quality and/or signal strength is poor all the time.
I cannot access the Internet anymore. I had access to the Internet (with the WPA-1000), but my Internet connection is not available anymore. 1 Check the WPA-1000’s hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 2.1 on page...
6.5 Reset the WPA-1000 to Its Factory Defaults If you reset the WPA-1000, you lose all of the changes you have made. The WPA-1000 re- loads its default settings, and the admin password resets to admin and the IP address resets to 192.168.1.10.
Page 47
Appendices and Index Product Specifications (51) Setting up Your Computer’s IP Address (55) Pop-up Windows, JavaScripts and Java Permissions (65) IP Addresses and Subnetting (71) Wireless LANs (81) Legal Information (95) Open Source Licences (99) Customer Support (149) Index (153)
P P E N D I X Product Specifications The following tables summarize the WPA-1000’s hardware and firmware features. Table 10 Hardware Specifications Dimensions (W x D x H) 190 x 130 x 33 mm Device Weight 0.4kg Power Specification...
4 Make sure the screws are snugly fastened to the wall. They need to hold the weight of the WPA-1000 with the connection cables. 5 Align the holes on the back of the WPA-1000 with the screws on the wall. Hang the WPA-1000 on the screws.
Appendix A Product Specifications Figure 21 Wall-mounting Example The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm). Figure 22 Masonry Plug and M4 Tap Screw WPA-1000 User’s Guide...
Page 52
Appendix A Product Specifications WPA-1000 User’s Guide...
After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the WPA-1000’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. WPA-1000 User’s Guide...
• If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). WPA-1000 User’s Guide...
5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your WPA-1000 and restart your computer when prompted. Verifying Settings 1 Click Start and then Run.
Appendix B Setting up Your Computer’s IP Address Figure 26 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 27 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. WPA-1000 User’s Guide...
• If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. WPA-1000 User’s Guide...
To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. WPA-1000 User’s Guide...
• If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. WPA-1000 User’s Guide...
Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your WPA-1000 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.
Page 62
Appendix B Setting up Your Computer’s IP Address WPA-1000 User’s Guide...
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 33 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. WPA-1000 User’s Guide...
Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. WPA-1000 User’s Guide...
3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 36 Pop-up Blocker Settings WPA-1000 User’s Guide...
3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. WPA-1000 User’s Guide...
2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 39 Security Settings - Java WPA-1000 User’s Guide...
1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 40 Java (Sun) WPA-1000 User’s Guide...
Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. WPA-1000 User’s Guide...
Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. WPA-1000 User’s Guide...
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 16 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.0 0000 0000 255.255.255.128 1000 0000 WPA-1000 User’s Guide...
The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub- networks, A and B. WPA-1000 User’s Guide...
Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 21 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS WPA-1000 User’s Guide...
Page 76
You must also enable Network Address Translation (NAT) on the WPA- 1000. Once you have decided on the network number, pick an IP address for your WPA-1000 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
LAN and WAN addresses must be on different subnets. In the following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 45 Conflicting Computer IP Addresses Example WPA-1000 User’s Guide...
LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 46 Conflicting Computer and Router IP Addresses Example WPA-1000 User’s Guide...
Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. WPA-1000 User’s Guide...
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. WPA-1000 User’s Guide...
(AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. WPA-1000 User’s Guide...
AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. WPA-1000 User’s Guide...
Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the WPA-1000 uses long preamble. The wireless devices MUST use the same preamble mode in order to communicate.
Wi-Fi Protected Access (WPA) Most Secure WPA2 You must enable the same wireless security settings on the WPA-1000 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
Page 85
EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. . WPA-1000 User’s Guide...
Page 86
However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. WPA-1000 User’s Guide...
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. WPA-1000 User’s Guide...
AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. WPA-1000 User’s Guide...
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. WPA-1000 User’s Guide...
The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. WPA-1000 User’s Guide...
Page 92
For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. WPA-1000 User’s Guide...
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
Page 94
This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. WPA-1000 User’s Guide...
Page 95
Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products. WPA-1000 User’s Guide...
Page 96
Appendix F Legal Information WPA-1000 User’s Guide...
No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes busybox 1.0.0, uCLinux 2.4.22, boa 0.93.16, bridge-utils 1.2 and wireless tools 26 software under GPL license.
Page 98
License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) WPA-1000 User’s Guide...
Page 99
Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. WPA-1000 User’s Guide...
Page 100
Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY WPA-1000 User’s Guide...
Page 101
END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. This WPA-1000 product included Third Party Software with the license conditions as specified below. DiXiM DMA application is proprietary of DigiOn except: Below GPL modules by GUN General Public License.
Page 102
All the files in MRUA_src/rmlibungif/src/libungi Custom license http library: MRUA_src/rmlibhttp/src/common.c MRUA_src/rmlibhttp/src/http.c Custom license Vera.ttf: MRUA_src/samples/Vera.ttf bin/Vera.ttf Custom license VeraMono.ttf: File located in MRUA_src/samples/VeraMono.ttf File located in bin/VeraMono.ttf Custom license UPnP Library: MRUA_src/rmupnp/upnp_stack/_MediaServerControlPointStack/MmsCp.h MRUA_src/ rmupnp/upnp_stack/_MediaServerControlPointStack/MmsCp.c MRUA_src/rmupnp/ upnp_stack/_Utility/MyString.c MRUA_src/rmupnp/upnp_stack/_Utility/MyString.h MRUA_src/rmupnp/upnp_stack/_ControlPointCoreStack/ILibSSDPClient.c MRUA_src/rmupnp/upnp_stack/_ControlPointCoreStack/ILibParsers.c MRUA_src/rmupnp/upnp_stack/_ControlPointCoreStack/ILibWebClient.h WPA-1000 User’s Guide...
Page 103
This software is provided "AS IS", and you, its user, assume the entire risk as to its quality and accuracy. This software is copyright (C) 1991-1998, Thomas G. Lane. All Rights Reserved except as specified below. WPA-1000 User’s Guide...
Page 104
* libpng versions 0.97, January 1998, through 1.2.5 - October 3, 2002: Glenn * See also "Contributing Authors", below. * Note about libpng version numbers: * Due to various miscommunications, unforeseen code incompatibilities * and occasional factors outside the authors' control, version numbering WPA-1000 User’s Guide...
Page 107
* DLLNUM will change each time there are forward or backward changes * in binary compatibility (e.g., when a new feature is added). * See libpng.txt or libpng.3 for more information. The PNG specification * is available as RFC 2083 <ftp://ftp.uu.net/graphics/png/documents/> * and as a W3C Recommendation <http://www.w3.org/TR/REC.png.html> WPA-1000 User’s Guide...
Page 108
* libpng versions 0.89, June 1996, through 0.96, May 1997, are * Copyright (c) 1996, 1997 Andreas Dilger * Distributed according to the same disclaimer and license as libpng-0.88, * with the following individuals added to the list of Contributing Authors: WPA-1000 User’s Guide...
Page 109
* to the following restrictions: * 1. The origin of this source code must not be misrepresented. * 2. Altered versions must be plainly marked as such and * must not be misrepresented as being the original source. WPA-1000 User’s Guide...
Page 110
* Thanks to Frank J. T. Wojcik for helping with the documentation. * Y2K compliance in libpng: * ========================= * October 3, 2002 * Since the PNG Development group is an ad-hoc body, we can't make * an official declaration. WPA-1000 User’s Guide...
Page 111
* instead of "year - 1900" into the png_convert_from_struct_tm() function, * but this is not under our control. The libpng documentation has always * stated that it works with 4-digit years, and the APIs have been * documented as such. WPA-1000 User’s Guide...
Page 112
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. libHTTP License * Copyright (c) 2000-2004 Dag-Erling Coïdan Smørgrav * All rights reserved. WPA-1000 User’s Guide...
Page 113
* Copyright 1997 Massachusetts Institute of Technology * Permission to use, copy, modify, and distribute this software and * its documentation for any purpose and without fee is hereby * granted, provided that both the above copyright notice and this WPA-1000 User’s Guide...
Page 114
("Fonts") and associated documentation files (the "Font Software"), to reproduce and distribute the Font Software, including without limitation the rights to use, copy, merge, publish, distribute, and/or sell copies of the Font Software, and to permit persons to WPA-1000 User’s Guide...
Page 115
Permission is hereby granted, free of charge, to any person obtaining a copy of the fonts accompanying this license ("Fonts") and associated documentation files (the "Font Software"), to reproduce and distribute the Font Software, including without limitation the rights to use, copy, merge, publish, WPA-1000 User’s Guide...
Page 116
Software. DEFINITIONS. "Licensed Product" means UPnP Forum compliant software developed by Licensee that incorporates the Intel Software in whole or in part, in source code or object code form, within Licensee's product offering. WPA-1000 User’s Guide...
Page 117
DAMAGES. SOME JURISDICTIONS PROHIBIT EXCLUSION OR LIMITATION OF LIABILITY FOR IMPLIED WARRANTIES OR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM JURISDICTION TO JURISDICTION. WPA-1000 User’s Guide...
Page 118
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. WPA-1000 User’s Guide...
Page 119
Software included with the ARM utilities package (as inferred from the list of Makefiles): binutils: binutils-2.11.2 ftp://sources.redhat.com/pub/binutils/releases busybox: busybox-1.00-pre3 and busybox-1.00 http://www.busybox.net/downloads ccache: ccache-2.3 http://ccache.samba.org/ftp/ccache/ cdrtools: cdrtools-2.00.3 http://www.fokus.gmd.de/research/cc/glone/employees/jo erg.schilling/private/cdrecord.html elf2flt: elf2flt-20020214 and elf2flt-20030314 http://www.uclinux.org/pub/uClinux/utilities/ gcc: gcc-2.95.3 http://gcc.gnu.org WPA-1000 User’s Guide...
Page 120
MPL (Mozilla Public License) -OR- GPL ftp://ftp.microwindows.org/pub/microwindows madwifi: madwifi-cvs20040331 Dual license: a) Custom license - source redistribution OK - see - OR - b) GPL http://madwifi.org/pub/linux/snapshot/tars mtd: mtd-20040901 WPA-1000 User’s Guide...
Page 121
STLport: STLport-4.5.3 Custom license - source redistribution OK - see http://www.stlport.org/archive tinylogin: tinylogin-1.4 GPL -AND- Shadow utilities license (BSD-style) -PLUS- derived work from code licensed under the Eindhoven University of Technology license http://tinylogin.busybox.net/downloads uclibc: uClibc-0.9.21 and uClibc-0.9.26 WPA-1000 User’s Guide...
Page 122
General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to WPA-1000 User’s Guide...
Page 123
Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's WPA-1000 User’s Guide...
Page 124
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. WPA-1000 User’s Guide...
Page 125
Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. WPA-1000 User’s Guide...
Page 126
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND WPA-1000 User’s Guide...
Page 127
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. WPA-1000 User’s Guide...
Page 128
If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. WPA-1000 User’s Guide...
Page 129
"work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION WPA-1000 User’s Guide...
Page 130
Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) WPA-1000 User’s Guide...
Page 131
Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. WPA-1000 User’s Guide...
Page 132
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. WPA-1000 User’s Guide...
Page 133
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. WPA-1000 User’s Guide...
Page 134
MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF WPA-1000 User’s Guide...
Page 135
`Frob' (a library for tweaking knobs) written by James Random Hacker. <signature of Ty Coon>, 1 April 1990 Ty Coon, President of Vice That's all there is to it! STLPort License * README file for STLport 4.5 * This directory contains STLport-4.5 release. What's inside : WPA-1000 User’s Guide...
Page 136
* Permission to modify the code and to distribute modified code is granted, * provided the above notices are retained, and a notice that the code was * modified is included with the above copyright notice. WPA-1000 User’s Guide...
Page 137
* THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR SPECIAL, EXEMPLARY, * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER WPA-1000 User’s Guide...
Page 138
* above. If you wish to allow use of your version of this file only * under the terms of the [GNU] License and not to allow others to use * your version of this file under the MPL, indicate your decision by WPA-1000 User’s Guide...
Page 139
OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org)" WPA-1000 User’s Guide...
Page 140
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes WPA-1000 User’s Guide...
Page 141
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. WPA-1000 User’s Guide...
Page 142
Special thanks to Marek Michalkiewicz (marekm@i17linuxb.ists.pwr.wroc.pl) for taking over the Linux port of this software. /*** * Copyright 1995 by Wietse Venema. All rights reserved. Individual files * may be covered by other copyrights (as noted in the file itself.) WPA-1000 User’s Guide...
Page 143
This software is copyright 1988 - 1994, Julianne Frances Haugh. All rights reserved. NOTE: Some components of the WPA-1000 incorporate source code covered under the GPL License or GPL like License. To obtain the source code covered under those Licenses, please contact ZyXEL Communications Corporation at: ZyXEL Technical Support.
Page 144
Software for the purpose of deriving the source code of the Software. 6.No Warranty WPA-1000 User’s Guide...
Page 145
ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8. 9.Audit Rights WPA-1000 User’s Guide...
Page 146
If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. WPA-1000 User’s Guide...
Need help?
Do you have a question about the WPA-1000 and is the answer not in the manual?
Questions and answers