SSID and Security Key ......................................................................................................................... 2
Additional Information ........................................................................................................................... 3
Contacting Customer Service ............................................................................................................... 3
Get Started .................................................................................................................................................... 4
Parts and Function ................................................................................................................................ 4
Handling a SIM Card ..................................................................................................................... 5
Insert the SIM Card ....................................................................................................................... 6
Remove the SIM Card .................................................................................................................. 7
Battery Use ........................................................................................................................................... 8
Insert the Battery ........................................................................................................................... 8
Remove the Battery ...................................................................................................................... 9
Charge the Battery ...................................................................................................................... 10
Turn Your Device On and Off ............................................................................................................. 11
Control Your Device Using the Power Butt on ............................................................................. 12
Port Forwarding .......................................................................................................................... 57
Port Filtering ................................................................................................................................ 59
About Page ......................................................................................................................................... 61
View Network Activation Information .......................................................................................... 64
Limitation of Liability .................................................................................................................. 108
Additional Inform ation and Updat es .......................................................................................... 109
Safety Information ..................................................................................................................................... 110
Important Notice ................................................................................................................................ 110
Safety and Hazards........................................................................................................................... 110
Proper Battery Use and Disposal ...................................................................................................... 110
Index .......................................................................................................................................................... 114
TOC iv
Page 6
Introduction
The following topics describe the basics of using this guide and your new mobile broadband device.
Before You Begin
Thank you for purchasing your new NETGEAR Fuse Mobile Hotspot. The following topics explain how
best to use this guide to get the most out of your mobile broadband device.
Before Using Your Device
Read Safety Information thoroughly for proper usage.
Accessible services may be limited by subscription contract conditions.
Guide Usage Notes
Note that most descriptions in this guide are based on your device's default settings at the time of
purchase.
Screenshots and Key Labels
Screenshots and Key labels are provided for reference only. Actual windows, menus, etc., may differ in
appearance.
Other Notations
In the user guide, the NETGEAR Fuse Mobile Hotspot may be referred to either as "mobile broadband
device," "hotspot," "device," or "WiFi router."
Operating Environment (Compatible OSs)
The table below outlines the compatible operating environments for your device. Use outside of these
environments may affect performance. Additional factors (hardware, connected peripherals, installed
applications, etc.) may also affect performance.
● For computer support, OS version upgrade information, etc., see the corresponding
manufacturer's product support documentation.
● The information for the operating environments (compatible OSs) listed below is the current
information for your device sold as of May 2015.
Introduction 1
Page 7
Item
Description
Compatible Operating Systems (OSs)
Windows® 8 (x86), Windows 7, Windows Vista®, Windows
One or more computers that support WiFi (802.11b/g/n)
Available Hard Disk Capacity
N/A
Internet Explorer® (version 8.0 or later)
XP® SP3, or Mac OS® X (version 10.5 or later)
Mac OS 10.6–10.8, iOS4, Andr o id 2.1, Blackberry 5.0
Additional Requirements
Compatible Browsers
If you’ll be connecting your device through USB, a USB 2.0
slot
Mozilla Firefox® (version 4.0 or later)
Google Chrome™ (version 17 or later)
Apple Safari
Apple Safari
Android Browser (Android OS 2.2 or later)
®
(version 5.0 or later)
®
Mobile (version iOS 4.0)
Package Contents
See below for details on everything you will find in the box for your NETGEAR Fuse Mobile Hotspot.
● NETGEAR Fuse Mobile Hotspot
● Battery cover
● Rechargeable battery
● AC charger with Type A USB port
● Micro-USB cable
● Micro-SIM (preinstalled)
● Get Started Guide
● Important Information Booklet
SSID and Security Key
Before connecting WiFi devices to your NETGEAR Fuse Mobile Hotspot, you will need to confirm the
SSID (network name) and security key (WiFi password).
Introduction 2
Page 8
■ The WiFi network name and security key (password) are displayed on the LCD home screen
when you power on your device.
Additional Information
The following list describes additional information useful to know before you begin using your NETGEAR
Fuse Mobile Hotspot.
● Your mobile broadband device accommodates software updates. Always use the latest software.
● Note that connection speeds may drop or connections may be disabled depending on line traffic
or connection environments.
● When using WLAN overseas, change the settings according to the laws of those countries.
Contacting Customer Service
You can reach Customer Service online.
● Visit boostmobile.com.
● If your device is ever lost or stolen, call Boost immediately at 1-888-BOOST-4U
(1-888-266-7848). We will secure your account balance and your ac cou nt infor mation.
Introduction 3
Page 9
Get Started
The following topics give you all the information you need to set up your mobile device the first time.
Parts and Function
Learn your device's primary external features and buttons.
Front View
Back View (Battery Cover Removed)
Get Started 4
Page 10
Interior (Battery Removed)
Part
Description
LCD screen
View device status. (See LCD Interface.)
Power button
Toggle power on or off.
External antenna ports (2)
RF antenna connectors for advanced users (slide open to access).
Connect the micro-USB cable for charging or creating a tethered
Remove the battery cover to remove or insert the battery or SIM
SIM card slot
The SIM card is preinstalled.
Micro-USB port
Battery cover
connection.
card.
SIM Card
The SIM card is an IC card containing your device's phone number and other customer information.
Note: Your SIM card is preinstalled.
Handling a SIM Card
Keep the following in mind when handling a SIM card.
● The customer is responsible for any damage caused by inserting the SIM card in another brand
of IC card reader, etc.
Get Started 5
Page 11
● Always keep the IC chip clean.
● Wipe clean with a dry, soft cloth.
● Avoid applying labels. Ma y damage the SIM car d.
● See instructions included with the SIM card for handling.
● The SIM card is the property of the company.
● The SIM card is replaceable (at cost) in case of loss/damage.
● Return the SIM card to the company when cancelling a subscription.
● Returned SIM cards are recycled for environmental purposes.
● Note that SIM card specifications and performance may change without notice.
● NETGEAR recommends that you keep a separate copy of information that is stored on the SIM
card. NETGEAR is not responsible for damages from stored information that is lost.
● Always follow emergency procedures to suspend service if your SIM card or device (SIM card
inserted) is lost or stolen. For details, contact Customer Service.
● Always power off the mobile broadband device before inserting or removing the SIM card.
Insert the SIM Card
Follow these instructions to insert a SIM card. Remember to power off your device before inserting a SIM
card.
Note: Your device's SIM card is preinstalled. These instructions are for reference only.
1. Remove the battery cover.
2. Remove the battery. (See Remove the Battery.)
Get Started 6
Page 12
3. Open the SIM card cover.
4. Insert the SIM card.
Insert gently with the gold IC chip facing downward.
5. Close the SIM card cover.
6. Insert the battery. (See Insert the Battery.)
Make sure that the battery contact points align with those inside the battery compartment.
7. Attach the battery cover.
Remove the SIM Card
Follow these instructions to remove the device's SIM card.
Note: Remove the SIM card only if instructed by your Internet service provider.
1. Press and hold the Power button to turn off the device before removing the SIM card.
2. Remove the battery cover.
3. Remove the battery. (See Remove the Battery.)
4. Open the SIM card cover.
5. Remove the SIM card.
6. Close the SIM card cover.
7. Insert the battery. (See Insert the Battery.)
Make sure that the battery contact points align with those inside the battery compartment.
Get Started 7
Page 13
8. Attach the battery cover.
Battery Use
The following topics explain how to insert and remove your device's battery.
Battery Cautions
Storage: Avoid storing or leaving the battery with no charge remaining. Saved information and settings
may become lost or changed, or the battery may become unusable. Charge once every six months
before storing or leaving unused for a long period.
Bulges: Depending on use, bulges may appear near end of battery life. This does not affect safety.
Replacing Battery: The battery is a consumable item. It needs to be replaced if operating time shortens
noticeably. Purchase a new battery.
Cleaning: Clean soiled terminals between the battery and the device with a clean, dry cotton swab.
Soiled terminals can result in a poor connection and prevent charging, etc.
Insert the Battery
Before you use your device, install the battery.
1. At the antenna connector shown below, lift the raised edge of the battery cover to remove it.
2. Insert the battery into your device, contacts end first.
Get Started 8
Page 14
Make sure that the battery contact points align with those inside the battery compartment.
3. Replace the battery cover.
Remove the Battery
Follow these instructions to remove your device's battery. Always power the device off before removing
the battery.
1. At the antenna connector shown below, lift the raised edge of the battery cover to remove it.
2. Remove the battery.
3. Replace the battery cover.
Get Started 9
Page 15
Charge the Battery
You need to recharge your device’s battery periodically. You can continue using your device while it is
charging.
The faster method is to connect your device to the AC charger. Alternatively, you can connect your device
to your computer, although this charges more slowly.
Charge Using the AC Adapter
1. Insert the larger (Type A) end of the micro-USB cable into the AC charger.
2. Insert the other end of the cable into the micro-USB port on the side of your device.
3. Insert the AC charger into an electrical outlet. (If the battery is already partially charged when the
charger is plugged into the outlet, your device will power on automatically.)
While your device is charging, the percentage of charge that the battery has displays on the LCD (and the
Mobile Hotspot Manager home page, if your device is on).
When your device is fully charged, the full battery icon and message display on the LCD (and the Mobile
Hotspot Manager home page, if your device is on).
Charge Using a USB-to-Computer Connection
Note: If you will be using the USB connection to connect to the Internet (and not just for charging your
device), you must install the device driver. (See TRU-Install.)
Note: If you are using Mac OS X 10.4.x, after you connect your device, you may see a warning message
that your computer is running on the UPS backup battery and that you should prevent a computer
Get Started 10
Page 16
shutdown. You can continue with your work. To prevent this message from being displayed, install the
device driver.
1. Make sure that your computer is turned on.
2. Insert the larger (Type A) end of the micro-USB cable into your computer.
3. Insert the other end of the cable into the micro-USB port on the side of your device.
● While your device is charging, the percentage of charge that the battery has displays on the LCD
(and the Mobile Hotspot Manager home page, if your device is on).
● When your device is fully charged, the full battery icon and message display on the LCD (and the
Mobile Hotspot Manager home page, if your device is on).
Turn Your Device On and Off
Use the Power button to turn your device on and off.
Turning Your Device On
1. Make sure that:
Your device has a charged battery inserted.
– or –
Your device is connected to the AC charger or a computer (through the micro-USB cable).
2. If the LCD is blank, press and hold the Power button until the screen lights up.
Get Started 11
Page 17
Desired result
Action
Turn mobile
Turn mobile
Wake up WiFi
Cycle through
Turning Your Device Off
■ Press and hold the Power button until the "Shut Down" message appears.
Control Your Device Using the Power Button
The Power button is used to turn the NETGEAR Fuse Mobile Hotspot on or off and to choose which
information screen to display on the LCD.
hotspot on
hotspot off
signal and device
screen
screens
Press and hold the Power button for 3-4 seconds.
Press and hold the Power button for 3-4 seconds.
Press and release the Power button.
Press and release the Power button.
Sleep Mode
If you are not using your device, or if the battery has not been charged, your device automatically enters
sleep mode to save power.
In sleep mode, WLAN is disabled.
■ To wake your hotspot from sleep mode, press the Power button and the LCD wakes up. WLAN function is enabled and WiFi devices can reconnect to the hotspot.
Get Started 12
Page 18
The time required to recover the network connection varies by environment, settings, etc.
Activation and Service
Before using your device, you must set up your service with Boost Mobile. Locate the MEID (DEC)
number on the packaging. You will need this 18-digit number to activate your Mobile Hotspot.
For more information about your Boost Mobile account, see My Account.
Create Your Account and Pick Your Plan
Set up your Boost Mobile account.
1. From your computer, visit boostmobile.com/activate.
2. Enter your device's MEID and click start activation process.
Your Mobile Hotspot’s MEID (serial number) can be found on the packaging.
3. Follow the remaining instructions to choose your plan and select a payment method.
4. Follow the activation instructions.
Note: You can also activate by phone by calling 1-888-BOOST-4U (1-888-266-7848).
Get Started 13
Page 19
Connect with Wi Fi ( W LAN)
You can connect to your Fuse Mobile Hotspot WiFi networks from computers and WiFi devices.
Connect to the Mobile Hotspot WiFi
Network
You can find and select the WiFi network or you can use WiFi Protected Setup (WPS) to connect to the
WiFi network.
Find and Select the Mobile Hotspot WiFi Network
The following procedure explains how to connect to the hotspot's WiFi network.
To connect to WiFi:
1. Do one of the following, depending on your operating system.
Windows 7: Click the WiFi icon in the system tray.
Windows Vista: Click Control Panel > Network and Internet > Network and Sharing
Mac: Click the AirPort icon (in the upper right corner of your screen).
Linux: See the user documentation of the Linux distribution.
Other operating systems: See the user documentation for your operating system or
computer.
2. Select the WiFi network provided by the NETGEAR Fuse Mobile Hotspot and connect to it. (If
prompted for a network key/security key/password, enter the WiFi password.)
Tip: The WiFi network name and password are displayed on the LCD home screen of the NETGEAR
Fuse Mobile Hotspot. (See LCD Home Screen.)
Connect Through WPS
WiFi Protected Setup (WPS) provides a fast, simple, and secure way to connect WPS-enabled devices to
your WiFi network. You don’t have to give the name (SSID) and WiFi password of your Main or Guest
network to other users.
Connect with WiFi (WLAN) 14
Page 20
The WPS feature is available on certain cameras, printers, smartphones, and laptops. These devices
have either a hardware button or a WPS-related option in the software. Please consult the user
documentation for your device.
WPS is always available for the Main and Guest WiFi networks as long as the WiFi radio is on (the device
is not asleep due to the sleep [standby] option, or off while the device is tethered).
WPS is not available in any of these situations:
● WiFi radio is off while your device is sleeping due to inactivity.
● WiFi radio is off while your device is tethered. (See Turn WiFi On or Off When Tethered.)
● The WiFi security option is WPA Personal, WEP, or WEP-related, for example, WEP 64 Bit Open.
(To change security to WPA/WPA2 Personal, see Change the WiFi Security.)
● The broadcast network name is not enabled. (See WiFi Options Tab.)
● MAC Filter Mode is "White list (Allow only those in list)", but no computers have been added to
the list. (See Manage the Block List (MAC Filtering).)
If the maximum number of connected devices on the chosen network (Main or Guest) has already been
met, an error message indicating that the maximum number of devices has been reached is displayed
when you attempt WPS. Disconnect one of the connected devices and then retry.
Use the LCD to Connect with WPS
1. Press the Power button on the Mobile Hotspot.
The LCD displays.
2. Press the Power button again to cycle through the LCD screens and display the WiFi Protected
Setup screen.
3. Press and hold the Power button until the activation bar fills up on the WiFi Protected Setup
screen.
For 2 minutes the Mobile Hotspot scans for computers or WiFi devices that are using WPS to
establish a WiFi connection.
4. Within 2 minutes, press the WPS button on the computer or WiFi device you want to connect or
select the WPS-related option in your device’s software.
The computer or WiFi device connects to the Mobile Hotspot WiFi network.
Use the Mobile Hotspot Manager (http://MyHotSpot) to Connect with WPS
1. Log in to the home page. (See Log In to the Mobile Hotspot Manager.)
2. Click WiFi.
3. Below the Main WiFi or Guest WiFi section, click WPS.
Connect with WiFi (WLAN) 15
Page 21
4. Perform one of the following procedures, depending on whether the WiFi device you are adding
to your WiFi network supports the PBC (Push Button Configuration) method or the PIN (Personal
Information Number) method.
If the WiFi device supports the PBC (Push But ton Configuration) method:
1. Click WPS button pairing.
2. Within 2 minutes, press the WPS button on the wireless device you want to connect or select the
WPS-related option in your device’s software.
– or –
If the WiFi device has a PIN associated with it:
1. Find out the PIN for the WiFi device you are adding. To do this, use the PIN option in your
device’s software. Alternatively, use the WiFi Protected Setup Wizard that may be available,
depending on the manufacturer of your device.
2. In the Web page, click Enter WPS PIN.
3. Enter your device’s PIN.
4. Click Submit.
Your NETGEAR Fuse Mobile Hotspot and the wireless device will communicate and establish the
connection. If no problems are encountered, the message “The device can now access your hotspot”
displays. If your device does not connect, the message “No devices were connected …” displays. Try to
connect it manually. (See Find and Select the Mobile Hotspot WiFi Network.)
Note: If you want to stop the pairing process, click Cancel.
Guest WiFi Network
Your NETGEAR Fuse Mobile Hotspot lets you create a separate Guest WiFi network that you can share
with temporary users.
Devices on the Guest WiFi network:
● Cannot access devices that are on the Main WiFi network (such as printers or other computers).
● Cannot use the Mobile Hotspot Manager to change any device settings.
Turn the Guest WiFi Network On and Off
You can turn on the Guest WiFi network from the Mobile Hotspot Manager’s WiFi page.
1. Log in to the home page. (See Log In to the Mobile Hotspot Manager.)
2. Click WiFi.
3. In the Guest WiFi area, click Turn On or Turn Off.
Connect with WiFi (WLAN) 16
Page 22
Guest WiFi Password
You can set the hotspot to use the same Guest WiFi password all the time, or for greater security, you
can have it generate a random password each time the Guest WiFi network is turned on.
Change the Guest WiFi Password
You can change the Guest WiFi password manually.
Note: The password changes only when Guest WiFi is turned on—for example, if Guest WiFi was on
when your device was restarted, the password doesn’t change because the Guest WiFi is still on.
1. Log in to the home page. (See Log In to the Mobile Hotspot Manager.)
2. Click WiFi > Options.
3. In the Guest WiFi section, enter a new WiFi password.
4. Click Submit.
Tip: To generate a new random password manually, with the above settings active, turn the Guest WiFi
off and then back on again. (See Turn the Guest WiFi Network On and Off.)
Randomize the Guest WiFi Password
You can randomize the guest WiFi password.
1. Log in to the home page. (See Log In to the Mobile Hotspot Manager.)
2. Click WiFi > Options.
3. In the Guest WiFi section, select Generate a new password each time I turn on the Guest WiFi.
4. Click Submit.
Connect with WiFi (WLAN) 17
Page 23
Connect with the M icro-USB Cable
The following topics describe how to share your device's Internet connection with a computer using a
direct USB connection.
Making a Tethered Connection
Your device supports a direct connection through a USB cable to a Windows or Mac computer. (This is
commonly referred to as a “tethered” connection.)
To connect your device to your computer:
1. Insert the larger (Type A) end of the micro-USB cable into your computer.
2. Insert the other end of the cable into the micro-USB port on the side of your device.
Note: If you’ll be using USB to connect to the Internet (and not just for charging your device), you must
install the device driver.
Use the micro-USB cable when:
● You want to charge your device, but you don’t want to use the AC charger, or the AC charger is
not available.
● Your computer does not have WiFi.
● You want to prevent any other devices from using the hotspot. (See Turn WiFi On or Off When
Tethered.)
Note: You can also block individual devices. See Manage the Block List (MAC Filtering).
Note: If you’re having problems, see Cannot Connect Through USB.
Connect with the Micro-USB Cable 18
Page 24
Note: If you’ll be using USB for data transfer (and not just for charging your device), you must install the
device driver. (See “Windows” or “Mac” below.) No Installation CD is required—your device supports the
TRU-Install feature.
Note: If you’re using Mac OS X 10.4.x, after you connect your device, you may see a warning message
that your computer is running on the UPS backup battery and that you should perform a computer
shutdown. You can continue with your work. To prevent this message from being displayed, install the
device driver (see “Mac” below).
Windows Device Driver
To install the device driver on Windows:
1. Make sure that your device is turned on.
2. Connect your device to your computer through the micro-USB cable.
3. If the TRU-Install windo w is not displayed, in Windows Explorer, browse to the TRU-Install entry
(under My Computer), and then browse to the Win folder and run Setup.exe.
– or –
If the AutoPlay window opens, click Runsetup.exe.
4. In the TRU-Install windo w, c lick OK.
5. Follow the onscreen instructions.
Mac Device Driver
To install the device driver on Mac:
1. Make sure that your device is turned on.
2. Connect your device to your computer through the micro-USB cable.
3. In the window that appears, double-click the .pkg file.
4. Follow the onscreen instructions.
5. When prompted for your password, enter your Mac password.
TRU-Install
TRU-Install is a feature that installs the necessary drivers the first time you connect your device to your
Windows or Mac computer through the micro-USB cable. (For details, see Making a Tethered
Connection.) An installation CD is not required.
TRU-Install is enabled by default.
To change the setting:
Connect with the Micro-USB Cable 19
Page 25
1. In the address bar of your Web browser, type one of the following:
http://MyHotSpot
http://192.168.1.1
2. In the Sign In field, enter the Mobile Hotspot Manager administrator password (1-31 letters,
numbers, and symbols). (The default password is "password.")
3. Click Settings > General > Software and Reset.
4. Select (to enable TRU-Install) or clear (to disable TRU-Install) the check box labeled Install driver when connecting to Windows or MAC computers with a USB cable.
Connect with the Micro-USB Cable 20
Page 26
LCD Interface
Item
Description
1
Signal strength
2
Network type (LTE)
3
Network carrier name
Alerts – Indicates number of alerts to be read. Appears only when at least one alert is
5
Battery status. (See Battery Icon.)
6
Share icon.
7
Main WiFi network name and password.
WiFi Status – Indicates whether WiFi is active (solid) or sleeping (outlined) and the
9
Data usage – Indicates the amount of data remaining.
Access your device and connection information, and configure device settings from the LCD interface.
If the LCD is not lit, see Turn Your Device On and Off.
LCD Home Screen
The LCD home screen displays icons and text that reflect the status of your device and your connection,
and screen elements that link to other configuration screens.
4
8
active. (See Alerts Screen.)
number of WiFi connections.
LCD Interface 21
Page 27
Signal
No signal
Tip: Information on the LCD can also be viewed and configured in the Mobile Hotspot Manager interface.
See Mobile Hotspot Manager Home Page and General Device Settings.
Signal Strength Icon
The signal strength icon appears on your device’s home screen and in the Mobile Hotspot Manager
Status panel.
If your device is not connected (dropped signal, outside of service area, etc.) the alerts icon () appears
on the LCD.
Strength
Icon
Status
Very weak signal
Excellent signal
Battery Icon
The battery icon indicates the state of the batt er y of your device.
The text next to the icon indicates the remaining charge. The battery icon displays on your device’s home
screen and in the Mobile Hotspot Manager Status panel.
The battery’s life is affected by the following conditions, some of which can be adjusted from your device
and from the Mobile Hotspot Manager:
● Standby time (See Set the Sleep (Inactivity) Timer.)
● Data throughput
● Network signal strength (the better the signal, the longer the battery life)
Alerts
Alerts notify you about situations that require your attention and suggest the actions you need to take to
resolve them.
Some of the alerts you may encounter include:
● Software Update Available
LCD Interface 22
Page 28
● Max WiFi devices reached
● Mobile Broadband disconnected
● WiFi is off
● Hotspot is not activated
● SIM errors
LCD Information Screens
The LCD home screen links to several screens used to configure your device.
● Alerts – Show network and device messages. See Alerts Screen for details.
● WPS – Use WiFi Protected Setup to connect to the WiFi network.
● Device Info – View information about the mobile hotspot.
● About – View devic e details.
Tip: Information on the LCD can also be viewed and configured in the Mobile Hotspot Manager interface.
See Mobile Hotspot Manager Home Page and General Device Settings.
To move between these screens:
● Press the Power button once to move between screens.
● On the Alerts and About screens, press and hold the Power button to see additional pages.
Alerts Screen
The Alerts screen shows network or device alerts for situations that require your attention.
To read more alerts:
■ If there is more than one alert to read, press and hold the Power button to view the next alert.
To exit the Alerts screen:
■ Press the Power button once.
LCD Interface 23
Page 29
Device Info Screen
Item
Description
MEID
The MEID of your hotspot (displayed on the packaging and inside the battery
My #
The hotspot’s telephone number.
ICCID
The serial number of the SIM.
FW
The hotspot’s firmware version.
FW Build Date
The date the firmware version was created.
Activation
The hotspot’s activation status (Activated / Deactivated) and the date and time
Admin
The URL to access the Mobile Hotspot Manager.
Password
The password to log in to the Mobile Hotspot Manager.
The Device Info screen shows detailed information about your mobile hotspot and account.
To exit the Device Info screen:
■ Press the Power button once.
The Device Info screen shows the following information.
compartment).
status
the status changed.
LCD Interface 24
Page 30
Settings
The following topics provide an overview of device settings, accessed through the Mobile Hotspot
Manager.
Mobile Hotspot Manager Overview
Use a Web browser to access your device and connection information, and configure device settings from
the Mobile Hotspot Manager.
Log In to the Mobile Hotspot Manager
Logging in to the home page allows you to view more detailed information about your device, and to
manage its settings, broadband network connection, and WiFi networks.
Note: To log in to the home page, your computer must be tethered to your device, or connected to your
device’s Main WiFi network. You cannot log in over the Guest WiFi network.
Note: If you access the Mobile Hotspot Manager but you don’t log in, you can only view the current
network connection status and a list of devices connected to the Main and Guest WiFi networks.
To log in:
1. In the address bar of your Web browser, type one of the following:
http://MyHotSpot
http://192.168.1.1
2. In the Sign In field on the home screen, enter the password (1–31 letters, numbers, and
symbols).
Note: The default password is “password.” NETGEAR recommends that you change the password, if
you haven ’t already. (See Change the Mobile Hotspot Man ager Pas sword.)
3. Click Sign In.
After a period of inactivity, you will be automatically logged off (timeout security feature).
Settings 25
Page 31
Mobile Hotspot Manager Home Page
Item
Description
Home
Click to view the Home Page.
WiFi
Click to view the WiFi Page.
Settings
Click to view the Settings Page.
About
Click to view information about your account, the device, and network status.
Help
Display the Help page.
Connection
The home page is the entry page for the Mobile Hotspot Manager interface.
You can:
● View your data usage and status information for your data connection.
● Manage your mobile broadband network connection and WiFi connections.
● View alert messages.
Details
Settings 26
Mobile broadband connection information. See Status (Connection Details).
Page 32
Item
Description
Language
Select the language.
Current
Session
Connected
More to
Data Usage
Estimated data usage for the current session.
Your WiFi
Basic information about your data plan. For more details, click Manage My
Alerts
Alerts appear on the dashboard and remain until issues are resolved.
Usage
Details about the current session in which you logged in.
Devices
Explore
Details
My Account
List of devices connected to the hotspot’s Main or Guest WiFi network.
Notifications and messages about resources.
Your Main WiFi network’s name and password.
Account to connect to your account.
Data Usage
Data usage estimates are shown in the Data Usage section of the home page.
Note: Data usage amounts are approximate and should not be used for billing purposes. For accurate
data usage amounts, click the Check Carrier Usage link.
Settings 27
Page 33
You can view an estimate of your data usage on your device’s home screen, and on the Mobile Hotspot
Item
Description
My number
The telephone number linked to your data plan.
My Account
Click to connect to your account.
Item
Description
Alert title
A short description of the issue to be addressed.
The alert message and, if appropriate, links or buttons to take action on the alert.
Manager’s home page.
Note: The session data counter resets automatically each time your device is powered off and on, and
when the mobile broadband network connection disconnects and reconnects (for example, when you are
going through a tunnel). The plan data counter does not reset automatically, but you can click Reset to
reset it manually.
My Account
The My Account section shows basic information about your plan, including your account number, and
includes a link to see more detailed information.
The following information is displayed.
Alerts
The Alerts section shows network or device alerts for situations that require your attention.
The following information is displayed for each alert.
Description
(For example, the Connect link in the alert shown above would make the device
attempt to connect to the network.)
Settings 28
Page 34
Item
Description
Signal
The more bars, the stronger the signal.
Network
Name of the available network.
Network type
LTE
Connect /
Click this button to connect or disconnect your device from the mobile network.
Battery
Indicates the remaining capacity of the battery, and its charging state.
The alerts disappear only when the issues they describe are resolved.
You can also view the alerts on the Fuse Hotspot’s LCD. See Alerts Screen.
Status (Connection Details)
The Status section shows details about your mobile broadband service and connection state and your
hotspot’s battery charge level, and lists the devices that are connected to the Main and Guest WiFi
networks.
The following information is displayed.
strength
carrier name
Disconnect
button
charge level
WiFi Page
From the WiFi page, you can configure the WiFi network, including WiFi security.
Settings 29
Page 35
Connect Tab
Item
Description
Main WiFi
This is the name that identifies your Main WiFi network and is visible to other WiFi-
WiFi
This is the password that other WiFi-enabled devices need to connect to the Main
WPS
Connect a device to the Main WiFi network using WPS. See Connect Through WPS.
Guest WiFi
Click this button to turn the Guest WiFi network on or off.
From the Connect tab of the WiFi page, you can configure access to your Main and Guest WiFi
networks.
■ In the Mobile Hotspot Manager, click WiFi > Connect.
You can:
● Edit the Main or Guest WiFi name and password.
● Turn the Guest WiFi network on or off. See Guest WiFi Network.
● Connect devices using WPS. See Connect Through WPS.
The following information is displayed.
WiFi Name
Password
Turn Off /
Turn On
enabled devices. See WiFi Options Tab.
WiFi network. See WiFi Options Tab.
Note: The rest of the Guest WiFi fields / buttons appear only when the Guest WiFi
network is on.
Settings 30
Page 36
Item
Description
WiFi
Network
This is the password that other WiFi-enabled devices need to connect to the Guest
WPS
Connect a device to the Guest WiFi network using WPS. See Connect Through WPS.
Name
This is the name that identifies your Guest WiFi network and is visible to other WiFienabled devices. See WiFi Options Tab.
Password
WiFi network. See WiFi Options Tab.
WiFi Options Tab
From the Options tab on the WiFi page, you can configure your WiFi network’s connection parameters
and security, and additional WiFi options.
■ In the Mobile Hotspot Manager, click WiFi > Options.
Settings 31
Page 37
You can:
Item
Description
Main WiFi
This is the name that identifies your Main WiFi network and is visible to other
This is the password that other WiFi-enabled devices need to connect to the
Guest WiFi
WiFi network
This is the name that identifies your Guest WiFi network and is visible to other
This is the password that other WiFi-enabled devices need to connect to the
Generate a new
If selected, a random password is used each time Guest WiFi is restarted. See
Max WiFi
You can limit the total number of WiFi devices (1-10) that can connect to the
● Edit the Main and Guest WiFi names and passwords. See Change the WiFi Network Name.
● Limit the number of devices that can connect to the Main and Guest WiFi networks.
● Configure your WiFi network’s connection parameters and security, and additional WiFi options.
Note: If you change or adjust some of the WiFi settings, all connected devices will be disconnected and
have to be reconnected after the settings are saved.
The following information is displayed.
WiFi Name
WiFi Password
name
Password
password each
time I turn on
the Guest WiFi
Max WiFi
WiFi-enabled devices. See Change the WiFi Network Name.
Main WiFi network.
WiFi-enabled devices.
Guest WiFi network.
Randomize the Guest WiFi Password.
Main and Guest WiFi networks. See Set the Maximum Number of WiFi
Devices.
Note: If you change Max WiFi, the Main WiFi and Guest WiFi values adjust
automatically.
Settings 32
Page 38
Item
Description
Main WiFi /
Set the maximum number of WiFi devices that can connect to each of the WiFi
WiFi Options
Choose whether to show or hide the WiFi network name and password on the
Choose whether the WiFi radio turns off or stays on when your device is
Connection
This setting determines the type of wireless devices that can connect to your
This is the active channel of the WiFi access point. If your network is having
This setting specifies the smallest packet size, in bytes, for which RTS/CTS
Guest WiFi
networks (Main and Guest). The total is limited to the Max WiFi value.
Click to increase the Main WiFi number, or to increase the Guest
WiFi number.
WiFi Info on
Home
USB Tether
Mode
hotspot’s home screen. (Choose Hide if you want to be sure unwanted users
can’t look at the home screen and log in.) See
Network Name and Password on LCD Home Screen.
tethered to a computer. (See Turn WiFi On or Off When Tethered.)
network.
Recommended options:
●802.11 G – Choose only if you’re certain that all of the WiFi devices
used with your hotspot support 802.11 g. This option ensures faster
WiFi speeds.
●802.11 B/G/N or 802.11 B/G – Choose if you’re not sure which modes
the WiFi devices used wit h your hot spo t suppor t.
Note: If you change this value to 802.11 B/G/N and the specified WiFi security
Encryption type is not supported by this value, the security Encryption type may
change to WPA/WPA2 Personal.
Show or Hide the Main WiFi
WiFi Channel
RTS Threshold
Settings 33
performance issues (possibly caused by other WiFi networks in the vicinity
using the same channel), try a different WiFi channel. See
Channel.
(Request to Send/Clear to Send) handshaking is used. The recommended
value is 2347. Change this value only if you’re experiencing inconsistent data
flow. Make only minor changes to this value.
Change the WiFi
Page 39
Item
Description
Fragmentation
This setting specifies the largest allowable size, in bytes, for a packet. If the
Security
If broadcast is enabled (Show), the wireless network is displayed in the list of
Encryption
The type of security used by the Main WiFi network.
Guest
The type of security used by the Guest WiFi network. See Change the WiFi
Threshold
packet is larger than this, it is fragmented into multiple packets before it is
transmitted. To prevent poor network performance, it’s recommended to keep
this value as large as possible (up to 2346).
Broadcast
Network Name
Encryption
WiFi networks available in the local area. For increased security, set this field to
Hide. You will need to give the WiFi network name (Main or Guest) to the
people who will be accessing your network, and WPS will not be available.
Security.
Show or Hide the Main WiFi Network Name and
Password on LCD Home Screen
You can choose whether to show the Main WiFi network name and password on your device’s home
screen. You can do this from the Mobile Hotspot Manager’s Options tab.
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. Beside WiFi Info on Home, select Show or Hide.
3. Click Submit.
Change the WiFi Network Name
You can change the WiFi network name for the Main WiFi network and the Guest WiFi network.
Note: If you change the WiFi network name, all computers and devices that are currently connected with
WiFi are disconnected during the change. After this change has been made, you must use the new WiFi
network name to connect.
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. In the Main WiFi section, type a new name in the WiFi Name field.
3. In the Guest WiFi section, type a new name in the WiFi Network Name field.
4. Click Submit.
Settings 34
Page 40
Set the Maximum Number of WiFi Devices
If your network is having performance issues, you might want to decrease the number of WiFi devices
allowed to connect to your device at the same time, or change the maximum number of devices that can
connect to either the Main WiFi or Guest WiFi network at the same time. (When Guest WiFi is turned on,
the maximum number of WiFi devices is shared between Main WiFi and Guest WiFi.)
Note: Your device is factory preset to allow a maximum of ten (10) WiFi devices, with eight (8) on Main
WiFi and two (2) on Guest WiFi.
You can change these limits on the Mobile Hotspot Manager’s WiFi > Options page.
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. Beside Max WiFi, select the total number of WiFi devices that can connect to your device at the
same time.
3. Click to increase the Main WiFi limit, or click to increase the Guest WiFi limit.
(Increasing one decreases the other.)
Note: The Main WiFi limit cannot be set to 0.
4. Click Submit.
Change the WiFi Security
You can change the WiFi security setting for your Mobile Hotspot.
By default WiFi security is enabled for your device and its WiFi networks.
Note: If you change the WiFi security setting, all computers and devices that are currently connected with
WiFi are disconnected during the change. After this change has been made, you must use the new WiFi
security to connect.
Note: All devices used with the NETGEAR Fuse Mobile Hotspot must support the selected security type.
Note: WPS is available only if you select either a WPA2 Personal option (including WPA/WPA2 Personal)
or (not recommended) no security. (See Connect Through WPS.)
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. In the list beside Encryption (for Main WiFi) or Guest Encryption (for Guest WiFi) select one of
the following options. Note that not all options ma y be available, dep end in g on the Connection
Mode.
None – No security is used (no password is required to access the WiFi network); this setting
is not recommended. Anyone may access your device and use your Internet connection.
(You are responsible for payment for data usage fees.)
WPA Personal TKIP – This is a strong security standard that is supported by most WiFi
devices.
Settings 35
Page 41
WPA Personal TKIP/AES – This is a strong security standard that is supported by most WiFi
devices.
WPA2 Personal AES – This is a stronger, newer security standard that is limited to newer
WiFi devices.
WPA2 Personal TKIP/AES – This is a stronger, newer security standard that is limited to
newer WiFi devices.
WPA/WPA2 Personal (recommended setting if any of your devices are more than two years
old) – WiFi devices that use either WPA or WPA2 can connect to the NETGEAR Fuse Mobile
Hotspot. Supported by most WiFi devices.
3. Click Submit.
The option you select determines the WiFi security used and also the maximum length of the WiFi
password.
Turn WiFi On or Off When Tethered
You can specify if WiFi stays off or on when your device is tethered (connected to a computer with the
micro-USB cable).
Note: All connected devices will be disconnected and have to reconnect after you disconnect the microUSB cable.
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. In the USB Tethered section, select one of the following:
WiFi stays Off
WiFi stays On
3. Click the Submit button.
Change the WiFi Channel
The WiFi channel is the active channel of the WiFi access point. If your network is having performance
issues (possibly caused by other WiFi networks in the vicinity using the same channel), try a different
WiFi channel.
You can change the channel from the Mobile Hotspot Manager’s WiFi > Options page.
Note: All connected devices will be disconnected and have to reconnect if the channel is changed.
1. In the Mobile Hotspot Manager, click WiFi > Options.
2. Select a different channel number in the WiFi Channel list, or, to have your device automatically
determine the channel to use, select Auto.
Note: If you choose Auto, your device could reselect the same channel. If this happens, try again.
Settings 36
Page 42
3. Click Submit.
Item
Description
● None – Any device can connect to the WiFi networks.
Black List or White List
Name
A description of the device (the owner’s name, the device’s purpose, etc.)
MAC Address
The device’s MAC address.
MAC Filter Tab
MAC (Media Access Control) filtering can prevent unauthorized wireless devices from connecting to your
network.
The MAC filter is used to grant (“white list”) or block (“black list”) access by wireless devices to the Main
and Guest WiFi networks. Access is based on the MAC address of each wireless device.
You can choose one of three modes:
● None – All computers are allowed to access the network.
● Black list – All computers are allowed to access the network, unless they’re in this list.
● White list – Only computers that are in this list are allowed to access the network.
Regardless of the mode, a user must provide the correct WiFi password to access the network.
MAC filtering increases security of your network. You can give access to your network, based on the MAC
address of the wireless devices. This makes it harder for a hacker to use a MAC address to access your
network.
To view or change the MAC filter:
■ In the Mobile Hotspot Manager, click WiFi > MAC Filter.
The following information is displayed.
● Black List – The listed devices will not be able to connect to the WiFi
MAC Filter Mode
networks.
●White List – Only the listed devices will be allowed to connect to the
WiFi networks.
Settings 37
Page 43
Manage the Block List (MAC Filtering)
You can manage your NETGEAR Fuse Mobile Hotspot’s block list on the Mobile Hotspot Man ag er ’s WiFi
> MAC Filter page. This lets you identify devices that should not be allowed to access your WiFi
networks.
To enable or disable the block list:
1. In the Mobile Hotspot Manager, click WiFi > MAC Filter.
A list of the devices blocked from using your WiFi networks appears.
2. Beside MAC Filter Mode, select Black list to block devices, or select None to stop blocking
devices.
3. Click Submit.
To view and unblock devices on the block list:
1. In the Mobile Hotspot Manager, click WiFi > MAC Filter.
A list of the devices blocked from using your WiFi networks appears.
2. Click the button beside the device you want to unblock. The device is removed from the
list immedia tely.
To specify computers or devices that can access the network:
1. In the Mobile Hotspot Manager, click WiFi > MAC Filter.
A list of the devices blocked from using your WiFi networks appears.
2. Beside MAC Filter Mode, select White list.
3. In the empty Name field, enter a name for the device, for example, “Amy’s PC.”
4. In the empty MAC Ad d r e ss field, enter the MAC address of the device you’re adding to the list.
(If you don’t know this address, see Find the MAC Address.)
Click the button beside the row.
5. Repeat steps 4 and 5 for each computer for which you want to allow access.
IMPORTANT: Make sure you add the computer you are using, or else you will not be able to access the
network after your device resets.
6. Click Submit.
To specify computers or devices that are denied access to the network:
1. In the Mobile Hotspot Manager, click WiFi > MAC Filter.
Settings 38
Page 44
A list of the devices blocked from using your WiFi networks appears.
2. Beside MAC Filter Mode, select Black list.
3. Determine and block an undesired user of your network.
4. In the Connected Device s section, if you see a device you don’t recognize, you can click its
name and compare its MAC address to the MAC address of each of the devices on your network.
To determine the MAC address of each device you have, see F ind t he MAC Address. If none
of your devices have this MAC address, that device might be an intruder.
5. In the empty Name field, enter a name for the device, for example, “Amy’s PC.”
6. In the empty MAC Ad d r e ss field, enter the MAC address of the device you’re adding to the list.
7. Click the button beside the row.
8. For each device you want to block, repeat steps 4, 5, and 6.
To remove a device from the allowed or disallowed lists:
1. In the Mobile Hotspot Manager, click WiFi > MAC Filter.
A list of the devices blocked from using your WiFi networks appears.
2. In the list of allowed/disallowed devices, click the button besi de the row.
3. Click Submit.
Settings Page
From the Settings page, you can configure your device, network settings, and router settings.
General Device Settings
From the General > Device tab of the Settings page, you can configure your device’s display, sleep
settings, Mobile Hotspot Manager (Web browser) URL and Mobile Hotspot Manager administrator
password.
Settings 39
Page 45
■ In the Mobile Hotspot Manager, click Settings > General > Device.
Item
Description
Language
Choose the default language used for the LCD display and the Mobile Hotspot
The following information is displayed.
Default
Language
Settings 40
Manager (English or Español).
See Set the Language.
Page 46
Item
Description
Screen
Screen
Set the brightness of the LCD to Bright or Dim. (Use Dim to make your battery
Screen Timeout
The length of time the LCD will display, while the devices is on battery power,
The length of time the LCD will display, while you are using the AC charger,
The length of time the LCD will display, while the device is tethered to the
Hotspot LED
On/Off
Turn the Hotspot LED on or off.
Sleep
Turns off the WiFi radio if no devices have been connected for this period of
Turns off the WiFi radio if no devices have been connected for this period of
Turns off the WiFi radio if no devices have been connected for this period of
Homepage
Brightness
last longer.)
See Setting the LCD Brightness.
Timeout on
Battery
Timeout on AC
Timeout on USB
WiFi Sleep on
Battery
before the device turns off.
Choose the shortest period to make your battery last longer. See Set the Sleep
(Inactivity) Timer.
before the device turns off.
Choose the shortest period to make your battery last longer.
computer, before the device turns off.
Choose the shortest period to make your battery last longer.
time, while the device is on battery power. (Choose 5 minutes to make your
battery last longer.).
WiFi Sleep on
AC
WiFi Sleep on
USB
Settings 41
time, while the device is connected to the AC charger. (Choose 5 minutes to
make your battery last longer.) .
time, while the device is tethered to the computer. (Choose 5 minutes to make
your battery last longer.).
Page 47
Item
Description
AC779S
Manager
The URL used to show the home page.
AC779S
The password used to show the home page. See Change the Mobile Hotspot
Show Password
Shows or hides the password on this screen.
Manager
Password
\ Hide Password
Manager Password.
Change the Mobile Hotspot Manager Password
For security reasons, you should change the Mobile Hotspot Manager password on a regular basis.
Note: If you forget the Mobile Hotspot Manager password, you’ll need to reset your device to its default
settings and go through the device setup. (See What Do I Do if I Forget the Administrator Password?)
1. In the Mobile Hotspot Manager, click Settings > General > Device.
2. Click Show Password.
3. In the Mobile Hotspot Manager Password field, type the new password (1–31 letters, numbers,
and symbols).
4. Click Submit.
Set the Sleep (Inactivity) Timer
Use this feature to prolong the battery life by making your device go to sleep (turn off the WiFi radio) if no
devices are connected to WiFi for a period of time.
You can adjust this setting on the Mobile Hotspot Manager’s Settings > General > Device page.
1. In the Mobile Hotspot Manager, click Settings > General > Device.
2. Beside the timeouts you want to set (WiFi Sleep on Battery, WiFi Sleep on AC, WiFi Sleep on USB), select the desired timeout periods. (A smaller value helps prolong the battery life.)
3. Click Submit.
Set the Language
The mobile hotspot’s LCD screen and the Mobile Hotspot Manager can be viewed in English or Spanish.
You can set the default language (for the LCD and the Mobile Hotspot Manager) in the Mobile Hotspot
Manager’s Settings > General > Device page, and you can temporarily change the Mobile Hotspot
Manager’s language using the language selection box beside the Logout link at the top of the screen.
Settings 42
Page 48
Set the Default Language
The default language is the language that will be used on the mobile hotspot’s LCD screen, and
whenever you first open the Mobile Hotspot Manager.
1. In the Mobile Hotspot Manager, click Settings > General > Device.
2. Beside the Default Language, select English or Español.
3. Click Submit.
Temporarily Set the Mobile Hotspot Manager Language
You can temporarily change the language used to display the Mobile Hotspot Manager on your computer.
If you close the browser completely, the next time you open the Mobile Hotspot Manager, the default
language will be used.
■ In the language box at the top right corner of the screen, select the language to use temporarily.
Set the LCD Timeout
Use this feature to select the delay times before the LCD automatically turns off while the hotspot is
running on battery power, connected to the AC charger, or tethered via USB.
You can adjust these settings on the Mobile Hotspot Manager’s Settings > General > Device page.
Note: The LCD turns on if an alert occurs.
1. In the Mobile Hotspot Manager, click Settings > General > Device.
2. Beside the timeouts you want to set (Timeout on Battery, Timeout on AC, Timeout on USB),
select the desired timeout periods. (A smaller value helps prolong the battery life.)
3. Click Submit.
Set the LCD Brightness
Use this feature to adjust your screen’s brightness to suit your surroundings and to prolong the battery
life.
You can adjust this setting on the Mobile Hotspot Manager’s Settings > General > Device page.
1. In the Mobile Hotspot Manager, click Settings > General > Device.
2. Beside Screen Brightness, select the desired brightness level (Bright or Dim). (Choose Dim to
prolong the battery life.)
3. Click Submit.
Software and Reset Tab
From this tab, you can save your current device settings and restore them later, update your software,
reset your device to default settings, and set your device startup options.
Settings 43
Page 49
■ In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
Item
Description
Download /
Click Save to make a copy (export) of the hotspot’s current configuration, so
Click Choose file to use a previously saved copy of your device configuration.
Click Check for update to see if a new version of your device’s software has
You can:
● Back up and restore your hotspot’s configuration, if needed. See Export Settings and Import
Settings.
● Update your device’s software. See Update the Mobile Hotspot Software and Firmware.
● Reset some or all of your device’s settings. See Reset Your Devic e.
● Configure the hotspot to install tethering drivers (if needed) when the device is connected via
USB to a Windows or Mac system. See TRU-Install.
The following information is displayed.
Backup Settings
Restore Settings
Software Update
that you can restore it later if needed. See Export Settings.
See Import Settings.
been released, and if it has, download and install it. The last time you checked
is shown on the screen (Last checked at). See
Software and Firmware.
Note: Software downloads count against your plan’s data limit.
Update the Mobile Hotspot
Settings 44
Page 50
Item
Description
●Factory Reset – Click to reset your device to factory default settings
and clear your account details. See Reset Your Device. (You can do
Select the check box to install tethering drivers (if needed) when the device is
this only with assistance from your Internet service provider.)
Reset
Startup options
●Settings Reset – Click to reset your device to factory default settings,
but leave your account details unchanged. See Reset Your Device.
●Clear Programming – Click to clear your account details. See Reset
Your Device.
connected via USB to a Windows or Mac system. See TRU-Install.
Export Settings
Settings include configuration information for your device, network, and Mobile Hotspot Manager
interface.
You can, for example, export (save) the current configuration, and then make some changes and test
them. You can then import (restore) the saved configuration.
To export the settings to a text file:
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
2. In the Download / Backup Settings section, click Save.
3. Save the file to an appropriate location in your computer. By default, the file (export.cfg) is saved
to your Downloads folder.
Import Settings
This feature lets you restore a saved configuration.
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
2. In the Restore Settings section, click Choose File or Browse (the button name depends on the
browser you are using).
3. Navigate to the folder where your previously saved configuration file is stored.
4. Select your configuration file and click Open to restore your device with the imported settings.
Note: Your device may reset, and you may need to reconnect to WiFi and the Internet. (See Connect with
WiFi (WLAN).)
Settings 45
Page 51
Update the Mobile Hotspot Software and Firmware
From time to time, updates may become available for your device, and your device will receive an alert.
You can also check for new updates manually.
The updates may improve performance and add or modify features. The updates may include the
following:
● Device firmware
● The Mobile Hotspot Manager interface
● Other files
Download Software Updates
You can download software updates from the Mobile Hotspot Manager.
When a software update becomes available, if your device is connected to an LTE network, the update
downloads automatically and an Alert message appears on your device and the Mobile Hotspot Manager.
In the Mobile Hotspot Manager, view the alert and click Install now to install the update. Your device
reboots automatically to use the new software. Any devices that were previously connected will have to
be reconnected.
You can also check for updates manually without having received an alert.
There are two ways to get the software update from the Mobile Hotspot Manager. You can get it from the
Alert message, or from the Software and Reset page.
To get the update from the Alert:
1. In the Mobile Hotspot Manager home page, view the Alert message.
2. In the Alert message for the available update, click Install Now.
3. Follow the onscreen instructions.
To get the update from the Software and Reset page:
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
2. Click Check for update. If an update is available, an Install Now button appears.
3. Click Install Now.
4. Click Continue.
Settings 46
Page 52
Reset Your Device
In some cases, you may want or need to clear your account information to use your device with another
account, reset most settings (except for your account and network activation), or reset your device to its
factory default settings.
You can clear these settings from the Mobile Hotspot Manager’s Software and Reset page.
Clear Account Details Only
If you want to use your device with another account, you need to clear your current account.
You can clear these settings from the Mobile Hotspot Manager’s Software and Reset page.
Note: All connected devices will be disconnected and your device will reboot automatically. You will have
to activate your device with your new account before they can reconnect.
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
2. Below Clear Programming, click Reset.
3. Click Begin Reset.
Reset Device Settings Only
If you want to reset your device to its default behavior, but don’t want to change your account or network
activation, you need to reset your device settings.
You can reset these settings using the Power button or from the Mobile Hotspot Manager’s Software
and Reset page.
Note: All connected devices will be disconnected and your device will reboot automatically. After the
reset finishes, they can reconnect.
Reset device settings using the Power button
■ Press and hold the Power button for 15 seconds.
Reset device settings using the Mobile Hotspot Manager
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
2. Below Settings Reset, click Reset.
3. Click Begin Reset.
Reset to Factory Default Settings
In some cases you will need to reset your device’s software to its factory default settings.
WARNING: If you reset the software to default settings, you must go through the device setup, as if
you’ve just purchased your device.
Settings 47
Page 53
You’ll need to reset the software to default settings if:
● You’ve forgotten the administrator password.
● You’ve changed the DHCP settings such that your device is inoperable. (For example, there’s no
communication with your dev ice.)
You can reset your device to factory settings from the Mobile Hotspot Manager’s Software and Reset
page or Support page.
Note: All connected devices will be disconnected and your device will reboot automatically.
Note: You can do a factory reset of your device only w ith as sis tanc e from your Internet service provider.
Contact your Internet service provider's Customer Service to obtain an SPC code that you will need to
enter to perform the reset.
1. In the Mobile Hotspot Manager, click Settings > General > Software and Reset.
– or –
Click Support.
2. Below Fa ct or y Reset , click Reset.
3. Enter the MSL code provided by your Internet service provider, and then click Submit.
4. Click Begin Reset.
System Logs
Technical support staff may need you to configure system logging in this tab for the purpose of error
diagnosis.
Note: You should adjust settings in this tab only under the direction of technical support staff.
1. In the Mobile Hotspot Manager, click Settings > General > System Logs.
You can:
Settings 48
Page 54
● Enable logging
Item
Description
Update Profile
Click to update the network profile.
This feature enables locking of the UICC/SIM and provides another level of
Manual
This is an advanced configuration feature. Use only when instructe d by your
Advanced
Use only when instructed by your Internet service provider.
● Clear logs
● Download logs
Network Preferences
From this tab, you can configure your device’s configuration for selecting networks and receive network
configuration updates from your Internet service provider.
■ In the Mobile Hotspot Manager, click Settings > Network > Preferences.
You can:
■ Update the network profile
The following information is displayed.
UICC/SIM Lock
Configuration
Settings
security for users to secure information of their SIMs.
Internet service provider.
Settings 49
Page 55
Access Point Name (APN)
Item
Description
Name
Network carrier name.
APN
The operator’s access point name (obtained from the operator).
To connect to a different carrier’s network, your device must be configured with an access point name
(APN) for that carrier. The APN is checked by the carrier to determine the type of network connection to
establish.
Note: Your NETGEAR Fuse Mobile Hotspot comes with the APN preconfigured.
In this tab, you can add APNs for the networks you want to connect to.
■ In the Mobile Hotspot Manager, click Settings > Network > APN.
The list of all APNs that have been set up includes the following information.
Adjust the Access Point Name
Your device comes preconfigured with the access point names (APN) for your Internet service provider's
LTE networks.
To add an APN for another network:
1. In the Mobile Hotspot Manager, click Settings > Network > APN.
2. In the blank line, enter the APN details:
Name – Enter a short description (for example, the carrier name).
APN – Enter the APN you obtained from the carrier.
3. Click the button beside the new APN entry.
To select the APN to be used:
■ Select the Active button at the beginning of the entry.
To remove an APN from the list:
■ Click the button beside the APN entry.
Settings 50
Page 56
SIM Security
Item
Description
Status
Indicates whether you are connected to an LTE network.
Connection type
The type of address to be set: IPv4 or IPv6 or IPv4v6 (both).
PS service type
Indicates the LTE service type.
If you are using a SIM that has security enabled, you can disable SIM security from this tab.
This tab shows the current status of this security feature (Inactive or Active), and allows you to disable
SIM security if it has been enabled.
Note: The SIM PIN is required to disable SIM security.
In the Mobile Hotspot Manager, click Settings > Network > SIM Security.
If the SIM has security enabled, SIM sec ur i ty will be Active. Cl ic k Disable to disable SIM
security.
The following information is displayed.
Network Status Details
This tab shows you details about the current mobile broadband connection (LTE).
■ In the Mobile Hotspot Manager, click Settings > Network > Status Details.
The information that is displayed depends on your current connection.
Settings 51
Page 57
Item
Description
RSRP
The signal strength of the LTE network (Reference Signal Received Power).
RSRQ
The signal quality of the LTE network (Reference Signal Received Quality).
Signal to Interference Noise Ratio based on Reference Signals (narrowband
Cell ID
The LTE cell that is currently serving the hotspot.
TX Power
The transmitter power. A higher number is better.
IP Address
The IP address (32-bit value) of the 4G LTE connection.
IPv6 Address
This is a 128-bit va lue.
Channel UL
The channel that is used to upload to the 4G LTE network.
Channel DL
The channel that is used to download from the 4G LTE network.
The International Mobile Station Identity is an identifier of a device on the
Current radio
The LTE band being used for the connection.
Reject Code
Technical support staff may request this value from you.
ICCID
The Integrated Circuit Card ID.
RSRQ is the ratio between the RSRP and the Received Signal Strength
Indicator (RSSI).
RS-SINR
IMSI
band
and wideband).
network.
Router Basic Settings
From this tab you can configure the router’s UPnP feature, LAN settings, and DMZ settings.
Settings 52
Page 58
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
Item
Description
UPnP
Current state of the Universal Plug and Play feature (On or Off). (See Enable
LAN
IP Address
The routing hardware’s IP address on the LAN.
Netmask
The routing hardware’s internal LAN subnet mask.
USB IP Address
The IP address assigned to the hotspot by the computer to which it is tethered.
VPN
VPN connections are enabled (On) or disabled (Off). See Enable VPN
DHCP Server
This field enables (On) or disables (Off) DHCP. See DHCP.
This specifies the starting and ending address of the range of IP addresses
2. You can make changes to any of these fields. When you finish, click Submit.
The following information is displayed.
UPnP
Passthrough
UPnP.)
Passthrough.
DHCP IP Range
Settings 53
available for your device to dynamically (that is, not permanently) assign to
computers connected to it. See
DHCP.
Page 59
Item
Description
DHCP lease time
This is the amount of time, in minutes, a computer can use its assigned IP
This specifies how the DNS servers (that the DHCP clients are to communicate
Address of a manual DNS server. (This field appears only if DNS Mode is
Address of a manual DNS server. (This field appears only if DNS Mode is
DMZ
DMZ Enabled
Enable / disable the demilitarized zone.
If the DMZ is enabled, this is the IP address of a single computer used to
DNS mode
address before it is required to renew the lease. After this time is up, the
computer is automatically assigned a new dynamic IP address. See
Enter a number between 2 and 10080.
with) are obtained.
Manual – The routing hardware assigns DHCP clients the DNS
servers specified in the DNS 1 and DNS 2 fields.
Use this option to access a DNS server that provides customized
addressing or if you have a local DNS server on your network.
Note: The DNS 1 and DNS 2 fields appear only if DNS Mode is Manual.
Auto – The DNS server specified by your Internet service provider
is used.
DHCP.
DNS 1
DNS 2
DMZ Address
Manual.)
Manual.)
receive all unsolicited incoming connections.
DMZ
You can select one computer to receive all unsolicited incoming connections.
The IP address of the DMZ (demilitarized zone) is the default recipient of incoming packets (from the
Internet) that are not handled by port forwarding rules or NAT’d connections:
● If port forwarding is enabled, incoming traffic is routed according to the port forwarding rules or
NAT’d connections.
● If incoming traffic was not routed as a result of the above:
If DMZ is enabled, then incoming traffic is routed to the computer that uses the IP address
specified by the DMZ settings.
Settings 54
Page 60
If DMZ is not enabled, the incoming traffic is blocked.
Note: Putting a computer in the DMZ opens all the ports of that computer, and exposes that computer to
various security risks. Use this option only as a last resort — if possible, use other options instead (for
example, port forwarding).
Enable DMZ
Before you can use or configure DMZ, you must enable it.
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. Next to DMZ Enabled, select On.
3. Click Submit.
Configure the DMZ Address
Specify which computer is to receive all unsolicited incoming connections.
Note: DMZ must currently be enabled.
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. In the DMZ Address field, enter the IP address of the computer that you want exposed to the
Internet. (If you don’t know how to find the IP address, see Find the IP Address.)
3. Click Submit.
Enable VPN Passthrough
If you want to connect to a corporate network using their VPN (Virtual Private Network), you need to
enable VPN Passthrough.
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. Beside VPN Passthrough, select On.
3. Click Submit.
Enable UPnP (Universal Plug and Play)
UPnP provides simple and robust connectivity among consumer electronics, intelligent appliances, and
mobile devices from many different vendors. (For more information, visit www.upnp.org.)
Note: If UPnP is enabled, there are potential security risks.
Before you can use UPnP, you must enable it.
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. Next to UPnP, select On.
3. Click Submit.
Settings 55
Page 61
DHCP
DHCP (Dynamic Host Control Protocol) automatically assigns an IP address to each device on the
network and manages other network configuration information for devices connected to your network.
You do not need to manually configure the IP address on each device that’s on your network.
The assigned IP addresses are not permanent (as opposed to when using static IP).
Most ISPs (Internet service providers) use DHCP.
Normally, you should enable DHCP, in which case you must configure each device on the network with
one of the following:
● TCP/IP settings set to “Obtain an IP address automatically.”
● TCP/IP bound to the Ethernet connection with DHCP.
If DHCP is disabled, you must configure each device on the network with:
● Fixed (permanent/static) IP address.
● DNS server addresses (provided by your Internet service provider).
Enable DHCP
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. Next to DHCP Serv er, select Enabled.
3. You can set the following DHCP settings:
DHCP IP Range — This is the starting and ending address of the range of IP addresses
available for your device to dynamically (that is, not permanently) assign to computers
connected to it.
The start address must be 192.168.1.10 or above.
The ending address must be 192.168.1.50 or below.
DHCP Lease Time — This is the amount of time, in minutes, a computer can use its
assigned IP address before it is required to renew the lease. After this time is up, the
computer is automatically assigned a new dynamic IP address.
Enter a number between 2 and 10080.
DNS Mode — This specifies how the DNS servers (that the DHCP clients are to
communicate with) are obtained.
4. Click Submit.
Settings 56
Page 62
Set the DNS Mode
The DNS Mode setting specifies how the DNS servers (that the DHCP clients are to communicate with)
are obtained.
1. In the Mobile Hotspot Manager, click Settings > Router > Basic.
2. Set DNS Mode to one of the following:
Auto — The DNS server specified by your Internet service provider is used.
Manual — The routing hardware assigns to DHCP clients the DNS servers specified in the
DNS 1 and DNS 2 fields. (These fields appear when Manual is selected.)
Use this option to access a DNS server that provides customized addressing or if you have a
local DNS server on your network.
3. Click Submit.
Port Forwarding
Port forwarding lets you forward incoming traffic to specific ports and devices (per their local IP address)
on your network. (Normally, incoming traffic is blocked.)
■ In the Mobile Hotspot Manager, click Settings > Router > Port Forwarding.
You can:
● Enable or disable port forwarding.
Note: You must enable port forwarding before you can view and update the port forwarding list.
● Enter port forwarding details for an application.
For example, you can configure port forwarding so that:
● You can access your Remote Desktop from the Internet (by specifying the WAN [public] IP
address that your device is using).
● Internet users can access a Web, FTP, or email server, or gaming or Internet application hosted
by your computer.
● Remove an application from the port forwarding list.
Settings 57
Page 63
Note: Port forwarding creates a security risk. When not required, port forwarding should be disabled.
Item
Description
Port Forwarding
Indicates whether port forwarding is on (Enable) or off (Disable).
List of forwarded ports – This list appears only if port forwarding is on. Each port displays:
Label
A name describing the application us ing the port.
IP
The IP address of the server being accessed.
The port that is forwarded. If the application uses more than one port, each port
Protocol
The protocol (TCP, UDP, etc.) being used for this application.
Note: Port forwarding does not apply to normal browsing, file downloading, or running most online games
or other applications hosted on the Internet. (Some online games require port forwarding.)
The following information is displayed.
Port
must be forwarded separately.
Enable Port Forwarding
Before you can use or configure port forwarding, you must enable it.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Forwarding.
2. Next to Port Forwarding, select Enable.
3. Click Submit.
Enable Port Forwarding for an Application
You can enable port forwarding for certain application types.
Note: Port forwarding must currently be enabled.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Forwarding.
2. In the blank row of the list, enter a label that describes the application (for example,
“RandomEmailApp”).
3. In the IP field, enter the IP address of the server to be accessed.
4. In the Port field, enter the port used by the application. (If the application uses more than one
port, each port must be forwarded separately.)
5. In the Protocol list, click the protocol(s) used for this application (TCP, UDP).
Settings 58
Page 64
6. Click the button to add this row to the list.
Item
Description
●No Filtering – All applications are allowed to access the Internet.
7. Click Submit.
Disable Port Forwarding for an Application
If you want to stop forwarding any ports, you can remove them from the forwarding list.
Note: Port forwarding must currently be enabled.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Forwarding.
2. Click the button beside the row that you want to remove.
3. Click Submit.
Port Filtering
Port filtering lets you specify which applications (for example, http, ftp, email servers) can access the
Internet by either allowing (White List) or preventing (Black List) access.
Note: Only one list can be active, either a Black List or a White List. The Black List and White List are
separate – if you change the Port Filtering type, the corresponding list is displayed.
■ In the Mobile Hotspot Manager, click Settings > Router > Port Filtering.
You can:
● Enable port filtering.
● Add an application to a port filtering list.
● Remove an application from the port filtering list.
The following information is displayed.
Port Filtering
● Black List – No applications in the list can access the Internet.
● White List – Only the applications in the list can access the Internet.
Settings 59
Page 65
Item
Description
List of filtered ports – This list appears only if port filtering is on. Each port displays:
Label
A name describing the application us ing the port.
Port
The port that the application uses to access the Internet.
Protocol
The protocol (TCP, UDP, etc.) being used by the application.
Enable Port Filtering
Before you can use or configure port filtering, you must enable it.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Filtering.
2. In the Port Filtering list, select Black List to prevent specific applications from using the Internet,
or White List to allow only specific applications to use the Internet.
3. Click Submit.
Enable Port Filtering for an Application
You can enable port filtering for certain application types.
Note: Port filtering must currently be enabled.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Filtering.
2. In the Label field, enter a name that describes the application being filtered (for example,
“RandomEmailApp”).
3. In the Port field, enter the port used by the application.
4. In the Protocol list, click the protocol(s) used for this application (TCP, UDP, or both).
5. Click the button to add this filter to the list.
6. Click Submit.
Disable Port Filtering for an Application
If you currently have port filtering enabled and some ports already in the list (Black List or White List), you
can remove any of those rows.
Note: Port filtering must currently be enabled.
1. In the Mobile Hotspot Manager, click Settings > Router > Port Filtering.
2. Make sure you’ve enabled the correct port filtering type (Black List or White List).
Settings 60
Page 66
3. To remove an application from the list click the beside the row that you want to remove.
Item
Description
Account Details
My number
The hotspot’s telephone number.
4. Click Submit.
About Page
View information about your device and account.
■ In the Mobile Hotspot Manager home page, click the About link in the top right corner.
The following information is displayed.
Settings 61
Page 67
Item
Description
MSID
The Mobile Station ID associated with your phone number.
MEID
The MEID of your device (displayed on the packaging and inside the battery
ICCID
The serial number of the SIM.
IMEI
The device’s unique IMEI (International Mobile Equipment Identity) code.
WiFi Details
WiFi name
The hotspot’s Main WiFi network name.
WiFi password
The hotspot’s Main WiFi network password.
The MAC address of the LTE module. Each wireless device has a unique MAC
Encryption
The security standard used for the WiFi network.
WiFi Devices
Number of devices currently connected to the hotspot’s WiFi networks.
Max WiFi
Maximum number of devices that can connect to the hotspot’s Main WiFi
Max Guest WiFi
Maximum number of devices that can connect to the hotspot’s Guest WiFi
Indicates whether the WiFi network name is being broadcast. (See WiFi
Firmware
FW Version
The hotspot’s firmware version.
FW Build Date
The date the firmware version was created.
Web App
The Mobile Hotspot Manager version.
Bootloader
The version of the software that starts up your device.
Open Source
compartment).
MAC Address
Devices
Devices
Broadcast
Network Name
address (assigned by its manuf act urer ).
network. (See also Set the Maximum Number of WiFi Devices.)
network. (See also Set the Maximum Number of WiFi Devices.)
Options Tab.) You could choose to not broadcast, and give the WiFi name
directly to users.
Version
Version
Settings 62
Page 68
Item
Description
View Credits &
Licenses
Display the credits and licenses.
Device
Model
The manufacturer’s name for your device.
Mobile Hotspot
URL for the Mobile Hotspot Manager Web app.
Power State
The hotspot’s power state (Online, Offline).
The hotspot’s temperature. If your device is too warm, make sure the area is
Current voltage
The amount of power the hotspot is currently using.
Battery charge
The amount of charge remaining in the battery. (See Charge the Ba ttery.)
The current operating condition of the battery (Charging, No Battery, Normal,
Battery
The battery’s temperature. If the battery is getting too warm, turn your device off
WWAN Info
Activation Date
The date that the hotspot was activated on the Mobile network.
Refurbished
The date that your device was refurbished (if applicable).
IP Address
The IP address of the WWAN radio.
IPv6 Address
LTE APN NI
4G network identifier.
Lifetime LTE
The total amount of data sent and received while connected to LTE networks.
Network Status
Manager
Current
temperature
level
Battery status
temperature
Date
well-ventilated and air can circulate around your device to cool it. (See
Environmental Specifications.)
Low, Critical).
and do not connect it to the charger.
Transferred
Settings 63
Page 69
Item
Description
View Details
Click the link to jump to the Settings > Network > Status Details page.
View Network Activation Information
You can check whether network access is activated.
1. In the Mobile Hotspot Manager home page, click About in the top right corner of the page.
2. Check the Activation Date in the WWAN Info section. This is the date that the hotspot was
activated on the Mobile network.
Settings 64
Page 70
Appendix
The following topics address areas of support for your mobile hotspot, including frequently asked
questions, tips, troubleshooting, technical specifications, and legal information.
Frequently Asked Questions
Find out answers to questions you ma y have.
How can I tell I’m connected to LTE?
There are a few ways you can tell whether you are connected to a network.
When you’re connected to a network (LTE):
■ In the Mobile Hotspot Manager (http://MyHotSpot), the LTE icon appears in the Status section on
the left side of the page, and the connection status is shown on the Network > Status Details Tab.
If the device is not connected to a network, an alert will appear on the device and in the Mobile Hotspot
Manager.
What do I do if I forget the Main or Guest WiFi password?
There are a couple of things you can do if you forget the Main WiFi password.
● On the LCD screen:
The Main WiFi password appears on the home page (if you have not configured it to be
hidden). See Show or Hide the Main WiFi Network Name and Password on LCD Home
Screen.
● Log in to the Mobile Hotspot Manager Web page with the administrator password. In the Mobile
Hotspot Manager, click WiFi > Options.
Here is what you can do if you forget the Guest WiFi password.
● On the LCD screen, cycle through the screens (press the Power button once to switch to the next
screen) to the Guest WiFi screen. If Guest WiFi is enabled, the password will be shown.
Note: Remember that if you have chosen to randomize the Guest WiFi password, it changes each time
the Guest WiFi network is turned on. (See Randomize the Guest WiFi Password.)
What do I do if I forget the Administrator Password?
Here's what to do if you forget the Administrator Password.
● Reset the software to default settings. You will need to call your Internet service provider's
Customer Support for assistance. (See Reset Your Device.)
Appendix 65
Page 71
If the Connection is “Always On,” am I always being billed?
No. The connection to the network goes dormant after a period of inactivity, but the connection can be reestablished faster than having to reconnect. Billing occurs only when data is passed across the network.
What is WPS?
WiFi Protected Setup (WPS) provides a fast, simple, and secure way to connect WPS-enabled devices to
your WiFi network. You don’t have to give the name (SSID) and WiFi password of your network to other
users.
The WPS feature is available on certain cameras, printers, smartphones, and laptops. These devices
have either a hardware button or a WPS-related option in the software. Please consult the user
documentation of your device.
Please see Connect Through WPS.
If a wireless device has a WPS button or a WPS software option, must I use it to
connect with WiFi?
If this is the only way your device provides to connect through WiFi, then you must use the WPS button or
the WPS software option. Some laptops support two methods — a WPS button or software option, and
WiFi network manager software where you can connect by entering the WiFi network name (SSID) and
password, as described in Find and Select the Mobile H ots pot WiFi Network.
Please consult the user documentation of your device.
How do I access my corporate network through a VPN?
Once you complete a wireless connection, you may need to launch an extranet client provided by your
company and supply the appropriate user name and password to gain access. For support, contact your
company help desk.
Are terminal sessions supported?
Terminal sessions (for example, via Telnet or SSH) are not supported.
Tips
This section provides information on getting the most out of your device and your network connection.
Extending Battery Life
There are several ways you can extend the battery life.
● When you’re not using your device, turn it off.
● Connect your device through the micro-USB cable to your computer, and turn of f WiFi. (See Turn
WiFi On or Off When Tethered.)
● Adjust the LCD — do one or more of the following:
Appendix 66
Page 72
Decrease the brightness of the LCD. (See Set the LCD Brightness.)
Set the LCD to turn off sooner. (See Set the LCD Timeout.)
● Use a shorter WiFi inact ivit y tim eout per iod. ( See Set the Sleep (Inactivity) Timer.)
● Limit the number of WiFi devices. (See Set the Maximum Number of WiFi Devices.)
Mobile Hotspot Location
Follow these guidelines in placing your device.
● Avoid moisture or extreme temperatures.
● For improved reception, place your device near a closed window.
● Place your device within easy reach of a reliable power supply and the computer to which it will
be connected.
Improving Signal Strength
There are several ways you can improve the signal strength.
● Make sure you’re inside a network coverage area.
● Try reorienting your device.
● Move your device and your computer to another location — you may be in or near a structure that
is blocking the signal. Every obstacle (for example, walls, ceilings, furniture) between the
NETGEAR Fuse Mobile Hotspot and other wireless devices decreases the signal strength.
● Place your device in a centralized location, as high as possible in the room.
● Make sure there’s plenty of space around your device to provide the best signal reception.
● Keep your device at least 3–6 feet away from electrical devices that generate RF interference (for
example, microwaves, TVs, 2.4 GHz cordless phones, cellular phones, baby monitors, wireless
speakers). If you’re not using these electrical devices, turn them off.
● If possible, place your devices so that the signal passes through open doorways or drywall, as
opposed to concrete, brick, metal, walls with insulation, and so on.
● If you cannot obtain service, contact your Internet service provider — a network or account
problem may be preventing you from obtaining service.
Improving WiFi Performance
There are several ways you can improve WiFi performance.
● Try a different channel number. (See Change the WiFi Channel.)
● Check whether any device updates are available. (See Update Mobile Hotspot Software and
Firmware.)
Appendix 67
Page 73
● See the tips in Improving Signal Strength.
● Limit the number of WiFi devices. (See Set the Maximum Number of WiFi Devices.)
Windows XP and Windows 7 Users
1. Open the Device Manager.
In Windows XP:
• Click Start > Settings > Control Panel.
• Double-click System.
• Click Hardware.
• Click Device Manager.
In Windows 7:
• Click Start > Control Panel.
• Click Device Manager.
2. Double-click Network adapters.
3. Double-click the WiFi client network adapter of your computer — for example, “Intel(R) WiFi Link
5100 AGN” in the image below.
4. If the WiFi client network adapter is by Intel, click Advanced and, in the Property list, click
Power Management and move the slider all the way to the right (to Highest). Click OK.
– or –
If the WiFi client network adapter is not by Intel, select a configuration with minimal power savings
(to maximize throughput).
Note: The above settings are often controlled by 3rd-party value-add applications and may be
automatically changed. If WiFi performance improves for a while after you perform the above steps, but
then declines, recheck the above settings.
Security Tips
Follow these tips to minimize security risks.
Appendix 68
Page 74
● Change the WiFi network name (SSID) and WiFi password on a regular basis. (See WiFi Options
Tab.)
● Disable SSID Broadcast. (See WiFi Options Tab.)
● Use the highest level of WiFi security that your devices support. (See Change the WiFi Security.)
● Change the login password. (See Change the Mobile Hotspot Manager Password.)
● Use MAC filtering to specify computers that are or aren’t allowed to connect to the network. (See
Manage the Block List (MAC Filtering).)
Find the MAC Address
You’ll need to know the MAC address of a device in a couple of cases.
■ Allowing or denying computers access to the network. (See Manage the Block List (MAC
Filtering).)
The steps to finding the MAC address of a device vary, depending on your operating system.
Windows
1. Open a command prompt window.
Click Start and Run.
Type cmd or command, and click OK.
2. At the command prompt, type ipconfig/all and press Enter.
3. Write down the physical address for the entry that relates to the wireless network connection; it
appears as a series of numbers and letters — this is the MAC address of your wireless adapter.
Mac OS X
1. From the Apple menu, select System Preferences.
2. Select Network.
3. Select the adapter that is connecting to the routing hardware.
4. Select Advanced.
5. Select Ethernet. The Ethernet ID is listed. This is the same as the MAC address.
Linux
Please see the user documentation of the Linux distribution.
Other Operating Sy stems
Please see the user documentation for your operating system or computer.
Appendix 69
Page 75
Find the IP Address
You’ll need to know the IP address of a device when configuring certain features.
● Port forwarding
● DMZ
The steps to finding the IP address of a device vary, depending on your operating system.
Windows
1. Open a command prompt window.
2. Type cmd or command, and click OK.
3. At the command prompt, type ipconfig and press Enter.
4. Write down the IP address for the entry that relates to the wireless network connection. (The IP
address might be listed under “Ipv4 Address,” or something similar.)
Mac OS X
1. From the Apple menu, select System Preferences.
2. Select Network.
3. Select the wireless adapter. The IP address is displayed in the right pane.
Other Operating Sy stems
Please see the user documentation for your operating system or computer.
Troubleshooting
Learn about various troubleshooting tips, and what to do when a specific message is displayed.
General Tips
Here are some general tips to get you started.
● If some settings are preventing you from connecting to WiFi, connect to your device through the
micro-USB cable, and then change the settings. (See Connect with the Micro-USB Cable.)
● Go to to devicehelp.boostmobile.com to access troubleshooting and other resources.
● The knowledge base at the NETGEAR website (support.netgear.com) may also be useful.
LCD Is Dark
The following table describes situations that can cause the LCD to be dark (that is, not displaying any text
or icons), and recommends appropriate actions.
Appendix 70
Page 76
Device state
LCD state
Your action
On
On, but dormant
(inactivity timeout)
Press the Power button on your device.
Off
Off
Turn your device on:
● Make sure that a battery is inserted into your
device.
● Press the Power button on your device until the
device turns on.
If the LCD is still dark, use the micro-USB cable to connect your device to the AC charger or to a
computer.
Insufficient Signal Strength
If you have insufficient signal strength, an icon is displayed on your device’s home screen, and in the
Mobile Hotspot Manager’s Connection Details section.
Insufficient signal strength, indicated by , may occur because:
● You are outside network coverage areas.
● You are in or near a structure that is blocking the signal.
● You are near a device that is causing radio signal interference.
● A network or account problem is preventing you from obtaining service.
See also Improving Signal Stren gth.
Cannot Connect to WiFi
If your computer cannot connect to the Main or Guest WiFi network of the NETGEAR Fuse Mobile
Hotspot, there are several things you should check.
Make sure that:
● The maximum number of WiFi devices has not been reached. The number of connected WiFi
● You’re connecting to the correct WiFi network (SSID), and you’re using the correct WiFi
● Nobody has changed the name or password of the WiFi network.
● WiFi is not disabled because your device is tethered. (See Turn WiFi On or Off When Tethered.)
devices is displayed on the LCD screen. To set the maximum number of devices, see Set the
Maximum Number of WiFi Devices.)
password.
Appendix 71
Page 77
● Your computer supports the type of WiFi security that the network is set to use.
Note: All the devices used with the NETGEAR Fuse Mobile Hotspot must support the selected security
type.
● Your computer supports WiFi 802.11g (if Connection Rate is set in the WiFi Options Tab to
802.11g only).
● Your computer has not been blocked through MAC filtering. (See Manage the Block List (MAC
Filtering).)
Tip: If some settings are preventing you from connecting to WiFi, connect to your device through the
micro-USB cable, and then change the settings. (See Connect with the Micro-USB Cable.)
Cannot Connect Through USB
If your computer cannot connect to the NETGEAR Fuse Mobile Hotspot through the micro-USB cab le, go
through the following steps.
■ Make sure that you've installed the device driver, as described in Making a Tethered Connection.
Cannot Display the Home Page
Your Web browser may display an error message when you try to display the home page. The error
message depends on your Web browser.
● “Could not connect to remote server” (Opera)
● “Internet Explorer cannot display the webpage” (Internet Explorer)
● “Oops! This link appears to be broken” (Google Chrome)
● “Safari can’t open the page” (Safari)
● “The connection has timed out” (Firefox)
Check the following:
● Your device is turned on. (See Turn Your Device On and Off.)
● You have established a connection to your device (through WiFi or through the micro-USB cable).
● Make sure you’re typing the correct address in the Web browser.
If the home page is still not displayed, try http://192.168.1.1 or, if you’re using custom routing
settings, replace “192.168.1.1” with the appropriate IP address.
● The Web browser is a recent version, and Java-enabled. The following are recommended:
Internet Explorer
Mozilla Firefox
®
(version 8.0 or later)
®
(version 4.0 or later)
Google Chrome™ (version 17 or later)
Appendix 72
Page 78
Apple Safari
®
(version 5.0 or later)
Apple Safari
Android Browser (Android OS 2.2 or later)
● If your computer has other adapters (for example, Ethernet) connected to other networks, disable
or remove them from your computer.
● If Internet security software is running on your computer, disable it and see whether the error
message still occurs. Some firewall software may block access to the home page.
● If DHCP is enabled on your device, make sure DHCP is enabled on your computer. (See DHCP.)
● Check your Web browser settings:
1. Open the Control Panel in Windows.
2. Double-click Internet Options.
3. From the Security tab, restore the default settings.
4. From the Connections tab, select Never dial a connection.
5. From the Advanced tab, restore the default settings.
6. Close and reopen your Web browser.
®
Mobile (version iOS 4.0)
● Disconnect your device from your computer (if you’re using the micro-USB cable). Remove the
battery from your device. Reinsert the battery.
If, after checking all of the above, you still cannot display the home page, consider resetting the software
to default settings. (See Reset Your Device.)
Cannot Connect to the Mobile Broadband Network
If this message is displayed, go through the following steps.
● Make sure your computer is connected to your device (through the micro-USB cable or WiFi).
(See Connect with WiFi (WLAN) or Making a Tethered Connection.)
● Make sure you’re in a network coverage area.
● Try the tips in Improving Signal Strength.
● Check with your Internet service provider — a network or account problem may be preventing
your device from obtaining service.
Cannot Check for Updates
Make sure your device is connected to the AC charger or computer through the micro-USB cable.
Note: If you’ll be using USB for data transfer (and not just for charging your device), you must install the
device driver. (See Making a Tethered Connection.)
Appendix 73
Page 79
Technical Specifications
Item
Description
Approvals
FCC
Size: 2500 mAh
Maximum: ~900 mA
LTE:
LTE:
This section lists the electrical, radio frequency, and other parameters of your device for those who
require technical information.
Radio Frequency and Electrical Specifications
This section lists the radio frequency and electrical parameters of your device.
Duration for full charge (AC charger / PC USB cable): 2.5 hours
Battery
Current
Transmit
Charge life:
● Up to 10 hours of active time
● Up to 237 hours standby time
Standby current:
■ ~6.5 mA (LTE)
● Band 25: 1850-1915 MHz
● Band 26: 814-849 MHz
● Band 41 (TDD): 2496-2690 MHz
● Roaming B2 (1900 MHz), B4 (1700 M H z) , B5 (850 MHz), B12 (700
● NETGEAR and the NETGEAR logo are trademarks of NETGEAR, Inc.
● 132 g (with battery)
Appendix 76
Page 82
®
● Windows
● Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.
is a registered trademark of Microsoft Corporation.
● Linux
● WiFi, WPA, and WPA2 are registered marks of the WiFi Alliance.
● QUALCOMM
● Other trademarks are the property of the respective owners.
®
is the registered trademark of Linus Torvalds in the U.S. and other countries.
®
is a registered trademark of QUALCOMM Incorporated.
Patents
This product contains technology developed by or for NETGEAR, Inc.
This product includes technology licensed from QUALCOMM
®
.
Licenses
A large amount of the source code to this product is available under various free and open source
licenses. Most is available under one or more versions of the GNU General Public License and/or GNU
Limited General Public License.
The remainder of the open source software which is not under the GPL is available under one of a variety
of more permissive licenses. Those that require reproduction of the license text in the distribution are
listed in the sections that follow starting with Fontconfig License.
02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users. This General Public License applies to
most of the Free Software Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by the GNU Library General Public
License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs; and that you know you can do these things.
Appendix 77
Page 83
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask
you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the source
code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives
you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone understands that there
is no warranty for this free software. If the software is modified by someone else and passed on, we want
its recipients to know that what they have is not the original, so that any problems introduced by others
will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free
use or not licensed at all.
The precise terms and conditions for copying, distribution, and modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COP YING , DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright
holder saying it may be distributed under the terms of this General Public License. The “Program”, below,
refers to any such program or work, and a “work based on the Program” means either the Program or any
derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language. (Hereinafter, translation is
included without limitation in the term “modification.”) Each licensee is addressed as “you.”
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program is
covered only if its contents constitute a work based on the Program (independent of having been made
by running the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any
medium, provided that you conspicuously and appropriatel y publish on eac h co p y an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and give any other recipients of the Program a copy of this License along with
the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on
the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions: a) You must cause the modified files to carry
Appendix 78
Page 84
prominent notices stating that you changed the files and the date of any change. b) You must cause any
work that you distribute or publish, that in whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c)
If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the
user how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on
the Program, the distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;
rather, the intent is to exercise the right to control the distribution of derivative or collective works based
on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work
based on the Program) on a volume of a storage or distribution medium does not bring the other work
under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the
following: a) Accompany it with the complete corresponding machine-readable source code, which must
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party,
for a charge no more than your cost of physically performing source distribution, a complete machinereadable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2
above on a medium customarily used for software interchange; or, c) Accompany it with the information
you received as to the offer to distribute corresponding source code. (This alternative is allowed only for
noncommercial distribution and only if you received the program in object code or executable form with
such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an
executable work, complete source code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control compilation and installation of the
executable. However, as a special exception, the source code distributed need not include anything that
is normally distributed (in either source or binary form) with the major components (compiler, kernel, and
so on) of the operating system on which the executable runs, unless that component itself accompanies
the executable.
If distribution of executable or object code is made by offering access to copy from a designated place,
then offering equivalent access to copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the source along with the object code.
Appendix 79
Page 85
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under
this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so long as such parties remain
in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work
based on the Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the Program
subject to these terms and conditions. You may not impose any further restrictions on the recipients'
exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of
this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License
and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For
example, if a patent license would not permit royalty-free redistribution of the Program by all those who
receive copies directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the
balance of the section is intended to apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or
to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the
free software distribution system, which is implemented by public license practices. Many people have
made generous contributions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or she is willing to
distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the origi nal copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries, so that distribution is permitted
only in or among countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail
to address new problems or concerns.
Appendix 80
Page 86
Each version is given a distinguishing version number. If the Program specifies a version number of this
License which applies to it and “any later version”, you have the option of following the terms and
conditions either of that version or of any later version published by the Free Software Foundation. If the
Program does not specify a version number of this License, you may choose any version ever published
by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best
way to achieve this is to make it free software which everyone can redistribute and change under these
terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source
file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright"
line and a pointer to where the full notice is found.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
Appendix 81
Page 87
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without
even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write
to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
details.
The hypothetical commands ‘show w’ and ‘show c’ should show the appropriate parts of the General
Public License. Of course, the commands you use may be called something other than ‘show w’ and
‘show c’; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a
"copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program ‘Gnomovision’ (which makes
passes at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your
program is a subroutine library, you may consider it more useful to permit linking proprietary applications
with the library. If this is what you want to do, use the GNU Library General Public License instead of this
License.
The GNU General Public License is a free, copyleft license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to
share and change the works. By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change all versions of a program--to make sure it remains free software for all its
Appendix 82
Page 88
users. We, the Free Software Foundation, use the GNU General Public License for most of our software;
it applies also to any other work released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to
surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or
if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to
the recipients the same freedoms that you received. You must make sure that they, too, receive or can
get the source code. And you must show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software,
and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free
software. For both users' and authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the software inside
them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting
users' freedom to change the software. The systematic pattern of such abuse occurs in the area of
products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have
designed this version of the GPL to prohibit the practice for those products. If such problems arise
substantially in other domains, we stand ready to extend this provision to those domains in future
versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to
restrict development and use of software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could make it effectively proprietary. To
prevent this, the GPL assures that patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution, and modification follow.
TERMS AND CONDITIONS
0. Definitions
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor
masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed
as “you.” “Licensees” and “recipients” may be individuals or organizations.
Appendix 83
Page 89
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright
permission, other than the making of an exact copy. The resulting work is called a “modified version” of
the earlier work or a work “based on” the earlier work.
A “covered work” means either the unmodified Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you directly or
secondarily liable for infringement under applicable copyright law, except executing it on a computer or
modifying a private copy. Propagation includes copying, distribution (with or without modification), making
available to the public, and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive copies.
Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a
convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells
the user that there is no warranty for the work (except to the extent that warranties are provided), that
licensees may convey the work under this License, and how to view a copy of this License. If the interface
presents a list of user commands or options, such as a menu, a prominent item in the list meets this
criterion.
1. Source Code.
The “source code” for a work means the preferred form of the work for making modifications to it. “Object
code” means any non-source form of a work.
A “Standard Interface” means an interface that either is an official standard defined by a recognized
standards body, or, in the case of interfaces specified for a particular programming language, one that is
widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is
included in the normal form of packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that Major Component, or to implement a
Standard Interface for which an implementation is available to the public in source code form. A “Major
Component”, in this context, means a major essential component (kernel, window system, and so on) of
the specific operating system (if any) on which the executable work runs, or a compiler used to produce
the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code needed to
generate, install, and (for an executable work) run the object code and to modify the work, including
scripts to control those activities. However, it does not include the work's System Libraries, or generalpurpose tools or generally available free programs which are used unmodified in performing those
activities but which are not part of the work. For example, Corresponding Source includes interface
definition files associated with source files for the work, and the source code for shared libraries and
dynamically linked subprograms that the work is specifically designed to require, such as by intimate data
communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other
parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
Appendix 84
Page 90
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and are
irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a covered work is covered by this
License only if the output, given its content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as
your license otherwise remains in force. You may convey covered works to others for the sole purpose of
having them make modifications exclusively for you, or provide you with facilities for running those w orks,
provided that you comply with the terms of this License in conveying all material for which you do not
control copyright. Those thus making or running the covered works for you must do so exclusively on your
behalf, under your direction and control, on terms that prohibit them from making any copies of your
copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below.
Sublicensing is not allowed; section 10 makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under any applicable law
fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological
measures to the extent such circumvention is effected by exercising rights under this License with respect
to the covered work, and you disclaim any intention to limit operation or modification of the work as a
means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any non-permissive terms added in accord with
section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients
a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or
warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from the Program, in
the form of source code under the terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions
added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices."
Appendix 85
Page 91
c) You must license the entire work, as a whole, under this License to anyone who comes into possession
of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the
whole of the work, and all its parts, regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not invalidate such permission if you have
separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the
Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not
make them do so.
A compilation of a covered work with other separate and independent works, which are not by their nature
extensions of the covered work, and which are not combined with it such as to form a larger program, in
or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its
resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what
the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to
apply to the other parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that
you also convey the machine-readable Corresponding Source under the terms of this License, in one of
these ways:
a) Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily
used for software interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer
spare parts or customer support for that product model, to give anyone who possesses the object code
either (1) a copy of the Corresponding Source for all the software in the product that is covered by this
License, on a durable physical medium customarily used for software interchange, for a price no more
than your reasonable cost of physically performing this conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the
Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you
received the object code with such an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer
equivalent access to the Corresponding Source in the same way through the same place at no further
charge. You need not require recipients to copy the Corresponding Source along with the object code. If
the place to copy the object code is a network server, the Corresponding Source may be on a different
server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the Corresponding Source. Regardless of
what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as
long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the
object code and Corresponding Source of the work are being offered to the general public at no charge
under subsection 6d.
Appendix 86
Page 92
A separable portion of the object code, whose source code is excluded from the Corresponding Source
as a System Library, need not be included in conveying the object code work.
A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is
normally used for personal, family, or household purposes, or (2) anything designed or sold for
incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases
shall be resolved in favor of coverage. For a particular product received by a particular user, “normally
used” refers to a typical or common use of that class of product, regardless of the status of the particular
user or of the way in which the particular user actually uses, or expects or is expected to use, the product.
A product is a consumer product regardless of whether the product has substantial commercial, industrial
or non-consumer uses, unless such uses represent the only significant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, authorization keys, or other
information required to install and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must suffice to ensure that the continued
functioning of the modified object code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or specifically for use in, a User Product,
and the conveying occurs as part of a transaction in which the right of possession and use of the User
Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is
characterized), the Corresponding Source conveyed under this section must be accompanied by the
Installation Information. But this requirement does not apply if neither you nor any third party retains the
ability to install modified object code on the User Product (for example, the work has been installed in
ROM).
The requirement to provide Installation Information does not include a requirement to continue to provide
support service, warranty, or updates for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a network may be denied when the
modification itself materially and adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with this section must
be in a format that is publicly documented (and with an implementation available to the public in source
code form), and must require no special password or key for unpacking, reading or copying.
7. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by making exceptions from
one or more of its conditions. Additional permissions that are applicable to the entire Program shall be
treated as though they were included in this License, to the extent that they are valid under applicable
law. If additional permissions apply only to part of the Program, that part may be used separately under
those permissions, but the entire Program remains governed by this License without regard to the
additional permissions.
When you convey a copy of a covered work, you ma y at your option remove any additional perm iss ions
from that copy, or from any part of it. (Additional permissions may be written to require their own removal
in certain cases when you modif y the work.) You ma y place add ition al per missions on material, added by
you to a covered work, for which you have or can give appropriate copyright permission.
Appendix 87
Page 93
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if
authorized by the copyright holders of that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;
or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in
the Appropriate Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such
material be marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service
marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material
(or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that
these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the meaning of
section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed
by this License along with a term that is a further restriction, you may remove that term. If a license
document contains a further restriction but permits relicensing or conveying under this License, you may
add to a covered work material governed by the terms of that license document, provided that the further
restriction does not survive such relice nsing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant source files,
a statement of the additional terms that apply to those files, or a notice indicating where to find the
applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license,
or stated as exceptions; the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any
attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this
License (including any patent licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder is
reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your
license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable
means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder
notifies you of the violation by some reasonable means, this is the first time you have received notice of
violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30
days after your receipt of the notice.
Appendix 88
Page 94
Termination of your rights under this section does not terminate the licenses of parties who have received
copies or rights from you under this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary
propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to
receive a copy likewise does not require acceptance. However, nothing other than this License grants you
permission to propagate or modify any covered work. These actions infr inge copyright if you do not
accept this License. Therefore, by modifying or propagating a covered work, you indicate your
acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license from the original
licensors, to run, modify and propagate that work, subject to this License. You are not responsible for
enforcing compliance by third parties with this License.
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of
one, or subdividing an organization, or merging organizations. If propagation of a covered work results
from an entity transaction, each party to that transaction who receives a copy of the work also receives
whatever licenses to the work the party's predecessor in interest had or could give under the previous
paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in
interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this
License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights
granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a
lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing
the Program or any portion of it.
11. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on
which the Program is based. The work thus licensed is called the contributor's “contributor version.”
A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor,
whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by
this License, of making, using, or selling its contributor version, but do not include claims that would be
infringed only as a consequence of further modification of the contributor version. For purposes of this
definition, “control” includes the right to grant patent sublicenses in a manner consistent with the
requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's
essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate
the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or commitment, however
denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not
Appendix 89
Page 95
to sue for patent infringement). To “grant” such a patent license to a party means to make such an
agreement or commitment not to enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the
work is not available for anyone to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means, then you must either (1) cause the
Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent
license for this particular work, or (3) arrange, in a manner consistent with the requirements of this
License, to extend the patent license to downstream recipients. “Knowingly relying” means you have
actual knowledge that, but for the patent license, your conveying the covered work in a country, or your
recipient's use of the covered work in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by
procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the
covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work,
then the patent license you grant is autom atic all y exten ded to all recipients of the covered work and
works based on it.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the
exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted
under this License. You may not convey a covered work if you are a party to an arrangement with a third
party that is in the business of distributing software, under which you make payment to the third party
based on the extent of your activity of conveying the work, and under which the third party grants, to any
of the parties who would receive the covered work from you, a discriminatory patent license (a) in
connection with copies of the covered work conveyed by you (or copies made from those copies), or (b)
primarily for and in connection with specific products or compilations that contain the covered work,
unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to
infringement that may otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot
convey a covered work so as to satisfy simultaneously your obligations under this License and any other
pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to
terms that obligate you to collect a royalty for further conveying from those to whom you convey the
Program, the only way you could satisfy both those terms and this License would be to refrain entirely
from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or combine any covered
work with a work licensed under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this License will continue to apply to the
part which is the covered work, but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the combination as such.
14. Revised Versions of this License.
Appendix 90
Page 96
The Free Software Foundation may publish revised and/or new versions of the GNU General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may differ
in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that a certain numbered
version of the GNU General Public License “or any later version” applies to it, you have the option of
following the terms and conditions either of that numbered version or of any later version published by the
Free Software Foundation. If the Program does not specify a version number of the GNU General Public
License, you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU General Public License
can be used, that proxy's public statement of acceptance of a version permanently authorizes you to
choose that version for the Program.
Later license versions may give you additional or different permissions. However, no additional
obligations are imposed on any author or copyright holder as a result of your choosing to follow a later
version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE
QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect
according to their terms, reviewing courts shall apply local law that most closely approximates an absolute
waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability
accompanies a copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
Appendix 91
Page 97
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best
way to achieve this is to make it free software which everyone can redistribute and change under these
terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source
file to most effectively state the exclusion of warranty; and each file should have at least the “copyright”
line and a pointer to where the full notice is found.
General Public License as published by the Free Software Foundation, either version 3 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
without even the implied warrant y of MERCHA NTABILITY or FITNESS FOR A PARTICU LAR
PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program. If
not, see http://www.gnu.org/licenses/.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short notice like this when it starts in an
The hypothetical commands `show w' and `show c' should show the appropriate parts of the General
Public License. Of course, your program's commands might be different; for a GUI interface, you would
use an “about box.”
You should also get your employer (if you work as a programmer) or school, if any, to sign a “copyright
disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the
GNU GPL, see http://www.gnu.org/licenses/.
The GNU General Public License does not permit incorporating your program into proprietary programs. If
your program is a subroutine library, you may consider it more useful to permit linking proprietary
applications with the library. If this is what you want to do, use the GNU Lesser General Public License
instead of this License. But first, please read http://www.gnu.org/philosophy/why-not-lgpl.html.
not allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library
Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software
packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
You can use it too, but we suggest you first think carefully about whether this license or the ordinary
General Public License is the better strategy to use in any particular case, based on the explanations
below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish); that you receive source code or can get it if you want it; that you can
change the software and use pieces of it in new free programs; and that you are informed that you can do
these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to
ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients
all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If
you link other code with the library, you must provide complete object files to the recipients, so that they
can relink them with the library after making changes to the library and recompiling it. And you must show
them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this
license, which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library.
Also, if the library is modified by someone else and passed on, the recipients should know that what they
have is not the original version, so that the original author's reputation will not be affected by problems
that might be introduced by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make
sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive
Appendix 93
Page 99
license from a patent holder. Therefore, we insist that any patent license obtained for a version of the
library must be consistent with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License.
This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite
different from the ordinary General Public License. We use this license for certain libraries in order to
permit linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of
the two is legally speaking a combined work, a derivative of the original library. The ordinary General
Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The
Lesser General Public License permits more lax criteria for linking other code with the library.
We call this license the "Lesser" General Public License because it does Less to protect the user's
freedom than the ordinary General Public License. It also provides other free software developers Less of
an advantage over competing non-free programs. These disadvantages are the reason we use the
ordinary General Public License for many libraries. However, the Lesser license provides advantages in
certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a
certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be
allowed to use the library. A more frequent case is that a free library does the same job as widely used
non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we
use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of
people to use a large body of free software. For example, permission to use the GNU C Library in nonfree programs enables many more people to use the whole GNU operating system, as well as its variant,
the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that
the user of a program that is linked with the Library has the freedom and the wherewithal to run that
program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to
the difference between a "work based on the library" and a "work that uses the library." The former
contains code derived from the library, whereas the latter must be combined with the library in order to
run.
TERMS AND CONDITIONS FOR COP YING , DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice
placed by the copyright holder or other authorized party saying it may be distributed under the terms of
this Lesser General Public License (also called "this License"). Each licensee is addressed as "you."
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked
with application programs (which use some of those functions and data) to form executables.
The "Library," below refers to any such software library or work which has been distributed under these
terms. A "work based on the Library" means either the Library or any derivative work under copyright law:
that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or
Appendix 94
Page 100
translated straightforwardly into another language. (Hereinafter, translation is included without limitation in
the term "modification.")
"Source code" for a work means the preferred form of the work for making modifications to it. For a
library, complete source code means all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running a program using the Library is not restricted, and output from such a
program is covered only if its contents constitute a work based on the Library (independent of the use of
the Library in a tool for writing it). Whether that is true depends on what the Library does and what the
program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on
the Library, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files
and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the
terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an
application program that uses the facility, other than as an argument passed when the facility is
invoked, then you must make a good faith effort to ensure that, in the event an application does
not supply such function or table, the facility still operates, and performs whatever part of its
purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well-defined
independent of the application. Therefore, Subsection 2d requires that any application-supplied function
or table used by this function must be optional: if the application does not supply it, the square root
function must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Library, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on
the Library, the distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Appendix 95
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.