SMC Networks SMC790WBRA4 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 72 pages
- 2.24 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Network Router
SMC Networks SMC7904WBRA
139 pages 3.69 mb -
Network Router
SMC Networks SMC8511WG
2 pages 0.29 mb -
Network Router
SMC Networks 2.4GHz/5GHz
322 pages 4.66 mb -
Network Router
SMC Networks SMCWBR14-G
105 pages 9.2 mb -
Network Router
SMC Networks EZ Connect SMC8414-2P-SIP
2 pages 0.16 mb -
Network Router
SMC Networks SMC7004VBR V.2
61 pages 1.1 mb -
Network Router
SMC Networks SMCWBR14-N2
103 pages 2.92 mb -
Network Router
SMC Networks Console
7 pages 0.03 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation SMC Networks SMC790WBRA4. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel SMC Networks SMC790WBRA4 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation SMC Networks SMC790WBRA4 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation SMC Networks SMC790WBRA4 devrait contenir:
- informations sur les caractéristiques techniques du dispositif SMC Networks SMC790WBRA4
- nom du fabricant et année de fabrication SMC Networks SMC790WBRA4
- instructions d'utilisation, de réglage et d’entretien de l'équipement SMC Networks SMC790WBRA4
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage SMC Networks SMC790WBRA4 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles SMC Networks SMC790WBRA4 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service SMC Networks en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées SMC Networks SMC790WBRA4, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif SMC Networks SMC790WBRA4, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation SMC Networks SMC790WBRA4. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
EZ Connect N Draft 11n Wireless USB2.0 Adapte r ADS L2 BA RRIC AD E ™ 4-Ports Wire less Annex A AD SL/ ADSL2 Mo dem Router SMC7904WBR A4[...]
-
Page 2
Contents 1 Introduction ................... ................... ................... ................... ................... ................... ................. ................. ......... 1 1.1 Packing List ................... ................... ................... ................... ................... ................... ................ ....[...]
-
Page 3
xvii 3.7.8 Other ..................... ................... ................... ................... ................... ................... ................ .......... 45 3.8 Admin ..... ................... ................... ................... ................... .................... ................... ............... ............. 48 3.8.1 [...]
-
Page 4
1 Introduction The SMC7904WBRA4 supports multiple line modes. It provides four 10/100 base-T Ethernet interfaces at the user end. The device provides high-speed ADSL broadband connection to the Internet or Intranet for high-end users, such as net b ars and office users. The device provides high performance access to the Internet, downlink up to 24 [...]
-
Page 5
Front panel The following table describes the LEDs of the device. LED S tatus Color Description On The device is powered on and the initialization is normal. Off Green The device is powered off. On The device is initializing. Power Blinks Red The firmware is upgrading. On The Internet connection is normal. Blinks Data is being transmitted on the In[...]
-
Page 6
Interface Function The button of the antenna. 1.4 System Requirements Recommended system requirements are as follows: A 10/100 base-T Ethernet card is installed on your PC A hub or Switch. (attached to several PCs through one of Ethernet interfaces on the device) Operating system: W indows 98SE, W indows 2000, W indows ME, W indows XP o r W indows [...]
-
Page 7
4 PPP sess ion P AP and CHAP IP fi lter IP QoS Remote access control Line connection status test Remote management (telnet and HTTP) backup and restore of configuration file Ethernet interface supports crossover detection, auto-correction and polarity correction UPnP[...]
-
Page 8
2 Hardware Installation Step 1 Connect the Line interface of the device and the Modem interface of the splitter through a telephone cable. Connect the phone to the Phone i nterface of the s plitter through a cable. Connect the incoming line to the Line interface of the splitter . The splitter has three interfaces: – Line : Connect to a wall phone[...]
-
Page 9
6 Figure 2 (with a telephone set before the splitter) In the actual application, connection 1 is recommended. I Note: When connection 2 is used, the filter must be installed close to the telephone lines. Do not use the splitter instead of the filter . Installing a t elephone directly before the splitter may lead to a failure o f connection betw[...]
-
Page 10
3 About the Web Configuration This chapter describes how to configure the router by using the W eb-based configuration utility . 3.1 How to Access the Router The following is the detailed description of accesing the router for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 In the LOGIN page that[...]
-
Page 11
In the navigation bar , choose Setup W izard . In the Setup Wiz ard page, you can configure the VPI/VCI num ber . The Setup Wizard page guides fast and accurate configuration of the Internet connection and other important parameters. The following sections describe these various configuration parameters. Whether you configure these parameters or us[...]
-
Page 12
The following table describes the parameters of this page. Field Description (Root) SSID SSID BroadCase W ire less Mode Channel Number After configuring the wireless settings, click NEXT . The page shown in the following figure appears. In this page, you can configure the ADSL settings. The following table describes the parameters and buttons in th[...]
-
Page 13
Y ou can choose LLC or VC-Mux . VPI The virtual path between two points in an A TM netw ork, and its valid v alue is from 0 to 255. VCI The virtual channel between two points in an A TM network, ranging from 32 to 65535 (0 to 31 is reserved for local management of A T M traffic). Before you configure the protocol, you must select the country in whi[...]
-
Page 14
PPPoA If the uplink equipment supports the PPPoA encapsulation, you can set the device to initiate the PPPoA dialup. After finishing the settings, click NEXT . The page show n in the following figure appears. 1 1 [...]
-
Page 15
If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Dynamic IP If the uplink equipment supports the Dynamic IP protocol, you can set the device to initiate the dynamic IP dialup. After finishing the settings, click NEXT . The page show n in the followin[...]
-
Page 16
If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Static IP If the uplink equipment supports the S tatic IP protocol, you can set the device to initiate the static IP dialup. After finishing the settings, click NEXT . The page show n in the following [...]
-
Page 17
If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Bridge If the uplink equipment supports the Bridge protocol, you can set the device to initiate the bridge dialup. After finishing the settings, click NEXT . The page show n in the following figure app[...]
-
Page 18
If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 1483 Route If the uplink equipment supports the 1483 Route protocol, you can set the device to initiate the 1483 route dialup. 15 [...]
-
Page 19
After finishing the settings, click NEXT . The page show n in the following figure appears. If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 16 [...]
-
Page 20
I Note: After you select the country in which you are in and the correct ISP , the ADSL settings, such as protocol, connection type, VPI, and VCI appears. It is recommended to use the default values. 3.3 Status In the navigation ba r , choose S tatus . In the S tatus p age that is displayed contains: System , LAN , WLAN , W AN , Port Mapping, S tat[...]
-
Page 21
3.3.3 WLAN Choose S tatus > WLAN . The page that is displayed show s some basic wirless LAN settings of the router . 3.3.4 WAN Choose S tatus > W AN . In the W AN page, you can view basic status of W AN, default g ateway , DNS server . If you want to configure the W AN network, refer to the chapter3.6.1 W AN Interface. 18 [...]
-
Page 22
3.3.5 Port Mapping Choose S tatus > Port Mapping . In the Port Mapping page, you can view the mapping relation and the status of port mapping. 3.3.6 Statistic Choose S tatus > S tatistic. The S tatistic page that is displayed contains T raffic S tatistic and DSL S tatistic . 3.3.6.1 Traffic Statistic Choose T raffic S tatistic in the left pan[...]
-
Page 23
3.3.6.2 DSL Statistic Choose DSL S tatistic in the left p ane. The page shown in the following f igure appears. In this page, you can view the ADSL line statistics, downstream rate, upstream rate, and other information. 3.3.7 ARP Table Choose S tatus > ARP T able. In the ARP T able page, you can view the t able which shows a list of learn ed MAC[...]
-
Page 24
3.4.1 LAN Settings Choose LAN > LAN Settings . In the LAN Settings page, you c an configure the LAN network. In this page, you can change IP add ress of the router . T he default I P address is 192.168.2.1. This is the private IP addr ess of the router . This is the address under which the router can be reached in the local network. It can be fr[...]
-
Page 25
Select DHCP Proxy in the DHCP Server Setup page. The page shown in the following figure appears. The following table describes the parameters of this page. Field Description DHCP Proxy Select it, the router acts a surrogate DHCP Server and relays the DHCP re quests and reponses between the remote server and the client. DHCP Server Address Enter the[...]
-
Page 26
The following table describes the parameters in this page. Field Description DHCP Server If set to DHCP Server , the router can assign IP addresses, IP default gateway and DNS Servers to Windows95, Windows NT a nd other systems that support the DHCP client. IP Pool Range It specifies the first and the last of contiguous IP address of the IP address[...]
-
Page 27
Description Field the assigned IP addresses before the IP addresses change. Refresh Refresh the page. Close Close the page. Click MAC-based Assignment in the DHCP Server Setup page. The page shown in the following figure appears. In this page, you can assign the IP addresses on the LAN to the specific individual PC s based on their M AC address. Th[...]
-
Page 28
3.5.1 Basic Settings Choose WLAN > Basic Settings. The page s hown in the following figure appears . In this page, you can configure the parameters for wireless LAN clients that may connect to your access point. The following table describes the parameters and buttons of this page. Field Description Disable W ireless LAN Interface By default, th[...]
-
Page 29
The following table describes the parameters and buttons of this page. Field Description V ap SSID The service set identification (SSID) is a unique name to identify the router i n the wireless LAN Auth T y pe Y ou can choose Open System , Shared Key , or Auto . If you selec t Open System , you can If you select Shared Key , you can If you select A[...]
-
Page 30
The following table describes the parameters and buttons of this page. Field Description SSID T y pe Select the SSID. Encryption Y ou can choose None , WEP , W P A (TKIP) , WP A2 (AES), or W P A2 Mixed . W ire d equivalent privacy (WEP) entrypts data frames be fore transmitting over the wireless network. W i-Fi protected ac cess (WP E) is a subset [...]
-
Page 31
The following table describes the parameters and buttons of this page. Field Description SSID TYPE Select the SSID. Key Length Select 64-bit or 128-bit to use data encryption. Key Format If you choose 64-bit , you can choose ASCII (5 characters) or Hex (10 characters). If you choose 128-bit , y ou can choose ASCII (13 characters) or Hex (26 charact[...]
-
Page 32
The following table describes the parameters of this page. Field Description Fragment Threshold This is the maximum data fragment size (between 256 and 2346bytes) that can be sent in the wireless network before the router fragments the packet into smaller data frames. R TS Threshold Request to send (R TS) is designed to prevent col lisions due to h[...]
-
Page 33
The following table describes the parameters and buttons of this page. Field Description Select Access Control Mode Y ou can choose Disable , Allow Listed , or Deny Listed . Select Allow Listed , only the clients whose MAC address is l isted can access the router . Select Deny Listed , the clients whose MAC address is liste d are denied to access t[...]
-
Page 34
The following table describes the fields of this screen. Label Description Enable WDS Select it to enable the WDS function. Otherwis e, you can not configure the settings of this page. MAC Addr Enter the MAC address (in XX-XX-XX-XX-XX-XX for mat) of the AP . Comment Enter the comment to describe the AP of the MAC addr ess. Apply Change Click it to [...]
-
Page 35
The following table describes the parameters of this page. Field Description Current A TM VC T able This table shows the existed PVCs. It shows the Interface name, channel mode, VPI/VCI, encapsulation mode, local IP address, remote IP address and other information. The maximum item of this table is eight. Click it, the IP Interface-Modify page appe[...]
-
Page 36
Field Description If select Use DHCP , the router is a DHCP client, the W AN IP address is assigned by the remote DHCP server . Local IP Address It is the IP addr ess of W AN inte rface which is provided by your ISP . Remote IP Address This is the gateway IP address which is provided by your ISP . Subnet Mask It is the subnet mask of the local IP a[...]
-
Page 37
The following table describes the parameters and buttons of this page. Field Description 3.6.2 ADSL Settings Choose W AN > ADSL Settings . The page shown in the following figure appears. In this pae, you can select the DSL modulation. Mostly , you ne ed to remain this factory default settings. The router supports these modulations: G .lite , G .[...]
-
Page 38
3.7 Advance In the navigation bar , choose Advance. The Advance page that is displayed contains DNS , Fir ewall , Virtual Server , Routing , IP QOS, Anti-DOs , Port Mapping , and Other . 3.7.1 DNS Choose Advance > DNS. The DNS page that is displayed contains DNS Server and DDNS . 3.7.1.1 DNS Server Choose DNS Server in the left pane. The page sh[...]
-
Page 39
The following table describes the parameters and buttons of this page. Field Description Obtain DNS Automatically Select it, the router accepts the first received DNS assignment from one of the PPPoA, PPPoE or MER enabled PVC(s) during the connection establishment. Set DNS Manually Select it, enter the primary and optional secondar y DNS server IP [...]
-
Page 40
3.7.2 Firewall Choose Adv ance > Firewall . The Firewa ll page that i s displayed contains IP/Port Fileter , MAC Filter , and URL Blocking . 3.7.2.1 IP/Port Filter Choose IP/Port Filter in the left pane. The page shown in the following figure appears. Entries in this table are used to restrict certain types of data packets through the gateway . [...]
-
Page 41
Field Description 3.7.2.2 MAC Filter Choose MAC Filter in th e left pane. The page shown in the following figure appears. Entries in this table are used to restri ct certain types of da ta packets from your l ocal network to Internet through the gateway . These fi lters are helpful in securing or restricting your local network. Click Apply Changes [...]
-
Page 42
Field Description 3.7.2.3 URL Blocking Choose URL Blocking in the left pane. The pa ge shown in the following f igure appears. This page is used to block a fully qualified do main name (FQDN), such as tw .yahoo.comand and filtered keyword. Y ou can add or delete FQDN and filtered keyword. The following table describes the parameters and buttons of [...]
-
Page 43
Click Add to add a virtual server . The page shown in the following figure appears. The following table describes the parameters and buttons of this page. Field Description 3.7.3.2 DMZ Settings Choose DMZ Settings in the left pane. The page shown in the fo llowing figure appears. A demilitarized z one is used to provide In ternet services without s[...]
-
Page 44
3.7.4 Routing Choose Advance > Routing . The page shown in th e following figure appears. The page that is di splayed contains S tatic Route and RIP . 3.7.4.1 Static Route Choose S tatic Route in the left pane. The page shown in the following figure appears. In this page, yo u can configure the routing information. Y ou can add or delete IP rout[...]
-
Page 45
3.7.4.2 RIP Choose RIP in the left pane. The page shown in the following figure appears. If you are using this device as a RIP-enabled router to communicate wi th others who is using the Routing Information Protocol (RIP), enable the RIP . This page is used to select the interfaces on your devices that use RIP , and the version of the protocol used[...]
-
Page 46
3.7.5 IP QoS Choose Advance > IP QOS . The page shown in the following figure appears. Entries i n this table are used to assign the precedence for each incoming packet based on physical LAN port, TCP/UDP port number , and source/destination IP address/subnet masks. Click Add Rule , the page shown in the following figure appears. The following t[...]
-
Page 47
3.7.6 Anti-dos Choose Advance > Anti-Dos . The page shown in the following figure appears. Denial-of-service attack (DoS Attack) is a type o f attack on a network that is designed to bring the network to its knees by flooding it with us eless traffic. In this page, you can prevent DoS attacks. Click Apply Changes to save the settings of this pag[...]
-
Page 48
3.7.8 Other Choose Advance > Other . In the Other page that is displayed contains IGMP Proxy , UPNP , Bridge , and IP PassThrough . 3.7.8.1 IGMP Proxy Choose IGMP Proxy in the left pane. The page shown in t he following figure appears. IGMP proxy enables t he system to issue IGMP host messages on behalf of hosts that the system discovered throug[...]
-
Page 49
Click Apply Changes to save the settings of this page. 3.7.8.2 UPNP Choose UPNP in the left pane. The page shown in the following figure appears. This page is used to configure UPnP . The system acts as a daemon after you enable it. Click Apply Changes to save the settings of this page. 3.7.8.3 Bridge Choose Bridge in the left pane. The page shown [...]
-
Page 50
The following table describes the parameters and buttons of this page. Field Description Click Show MACs . The page shown in the following fi gure appears. This t able shows a list of learned MAC addresses for this bridge. 3.7.8.4 IP PassThrough Choose IP Pass Through in the lef t pane. The pa ge sh own in the f ollowing f igure appears. IP pas sth[...]
-
Page 51
3.8 Admin In the navigation bar , choose Admin . The Admin page that i s displayed contains Remote Access , Commit/Reboot , Password , Backup/Restore , Upgrade Fir eware , Time Zone , System Log , SNMP , TR069 , ACL , and Logout . 3.8.1 Remote Access Choose Admin > Remote Access . The page shown in the following fig ure appears. Y ou can enable [...]
-
Page 52
The following table describes the parameters of this page. Field Description reset to default settings Select it to reset the router to the default settings. commit current settings Select it to save the current settings and reboot the router . Reboot Reboot the router . 3.8.3 Password Choose Admin > Password . The page shown in the following fi[...]
-
Page 53
Field Description user . New Password Enter the password to which you want to change the old password. Confirmed Password Enter the new password again. 3.8.4 Backup/Restore Choose Admin > Backup/Restore . The p age shown in the following figure appears. In t his page, you can backup the current settings to a file and restore the settings from th[...]
-
Page 54
The following table describes the parameters and buttons of this page. Field Description Select File Click Browse to select the firmware file. Upload Select the firmware file and click Upload to begin upgrading the firmware. Reset Click it to begin selecting the firmware file. 3.8.6 Time Zone Choose Admin > Time Zone . The page shown in the foll[...]
-
Page 55
Refresh Refresh the system shown in the page. T ime Mode Y ou can choose Time Server or Manual . Select Time Server , the router gets the system time from the time serve r . Select Manual , you should configure the system time manually . Enable SNTP Client Update Select it, you can choose the correct SNTP server which you want. SNTP Server Choose t[...]
-
Page 56
The following table describes the parameters and buttons of this page. Field Description T rap IP Address Enter the IP address of trap IP . The trap information is sent to the host. Community name (read-only) The network administrators must use this password to read the information of this router . Community name (write-only) The network administra[...]
-
Page 57
The following table describes the parameters and buttons of this page. Field Description 3.8.10 ACL Choose Admin > ACL . The page shown in the following figure appears . In this page, you can configure the IP address in the access control list. If A CL i s enabled, only the effective IP adresses i n ACL can access the ADSL router . 54 [...]
-
Page 58
Step 1 Select Enable and click take effect . Step 2 Configure the ACL. Step 3 Click take effect to take the configuration effect. I Note: If you select Enable in ACL Capability , en sure that your host IP address is in ACL list before it t akes effect. 3.9 Diagnostic In the navigation bar , choose Diagnostic . The Diagnostic page t hat is displayed[...]
-
Page 59
Field Description Host Address Enter the IP a ddress. Go ! Click it to begin to Ping the host address. 3.9.2 ATM Loopback Choose Diagnostic > A TM Loopback . T he page shown i n the following figure appear s. I n this page, you can use VCC loopback function to check the connectivity of the VCC. 3.9.3 ADSL Choose Diagnostic > ADSL . The page s[...]
-
Page 60
57 3.9.4 Diagnostic Choose Diagnostic . The page shown in the following figure appears. In this page, you can test the DSL connection. Click Run Diagnostic T est to begin testing.[...]
-
Page 61
Appendix A Questions & Answers This section describes common problems you may enco unter and possib le solutions to them. Th e Barricade can be easily monitored through panel indicators to identify problems. 1. Question: Why all LED indicators are off? Answer: Check the connection between the power adaptor and the power socket Check the power s[...]
-
Page 62
Click start -> run (input ping demands)-> Ping 192.168.2.1 (MODEM IP address). If cannot reach the modem, please check following configuration: The type of the network cable The connection between the modem and computer Y ou computer ’ s TCP/IP configuration 6. Question: How to load the default setting after incorr ect configuration? Answer[...]
-
Page 63
Appendix B Technical Specifications External Connectors 1 push power switch 1 DC power jack 1 factory reset button 4 LAN 10/100M Auto MDI/MDIX RJ45 ports 1 W AN RJ1 1 DSL port Pr otocol Featur e Bridging/Routing RFC 1483 Bridge IEEE 802.1D transparent bridging Bridge Filtering RFC 1483 Router RIP 1 & 2 supported DHCP (RFC1541) Server, Relay Net[...]
-
Page 64
Ethernet Featur e Fully compliant with IEEE802.3/802.3u auto-negotiation function Support 10base-T , 100base-TX Support half duplex, full duplex Support back pressure flow control for half duplex, IEEE802.3x flow control for full duplex Support MDI/MDIX auto cross Management Support Support WEB/TFTP mode which use as native and long-distance editio[...]
-
Page 65
Appendix C GPL Anouncement GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software [...]
-
Page 66
The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public[...]
-
Page 67
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same[...]
-
Page 68
this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are no[...]
-
Page 69
9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of[...]
-
Page 70
REPAIR OR CORRECTION. 12. IN NO EVENT UNL ESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN Y OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT TED ABOVE, BE LIABLE TO Y OU FOR DAMAGES, INCLUDING ANY GENERAL, SP ECIAL, INCIDENTAL OR CONSE QUENTIAL DAMAGES ARISING OUT OF THE USE OR I NABILITY [...]
-
Page 71
68 The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you wo[...]
-
Page 72
SMC7904WBR A4[...]