ZyXEL Communications IPC-4605N manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 91 pages
- 1.34 mb
Aller à la page of
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation ZyXEL Communications IPC-4605N. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel ZyXEL Communications IPC-4605N ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation ZyXEL Communications IPC-4605N décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation ZyXEL Communications IPC-4605N devrait contenir:
- informations sur les caractéristiques techniques du dispositif ZyXEL Communications IPC-4605N
- nom du fabricant et année de fabrication ZyXEL Communications IPC-4605N
- instructions d'utilisation, de réglage et d’entretien de l'équipement ZyXEL Communications IPC-4605N
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage ZyXEL Communications IPC-4605N ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles ZyXEL Communications IPC-4605N et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service ZyXEL Communications en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées ZyXEL Communications IPC-4605N, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif ZyXEL Communications IPC-4605N, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation ZyXEL Communications IPC-4605N. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
IPC-4605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www .zyxel.com Copyrigh t © 201 1 ZyXEL Communica tions Cor poration[...]
-
Page 2
[...]
-
Page 3
1 Contents 2 Getting to know your IPC-4605N ............................................................................... 6 2.1 Package Contents .............................................................................................. 6 2.2 Features .........................................................................[...]
-
Page 4
Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two cond itions: (1) This device m ay not cause harm ful interference , and (2) This device must acce pt any interference received, including interfe rence th at may cause undesired operation. FCC Interference Statement This[...]
-
Page 5
About This Manual This manual is inde nted only for users of the ZyXEL IPC-4 60 5 N netw ork camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, su ch as: Caution! Information provided with this symbol is critical to prevent dam age to the product or injury[...]
-
Page 6
2 Getting to know your IPC-4605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor. Number Contents IPC-4605N Network Camera Ethernet Cable Power Adapter Quick Installation Guide Install Disk Wall/Ceiling Mount Plate Camera Pad x4, Screw Mount x3, Screw x3 USB wireless ada[...]
-
Page 7
2.2 Features ZyXEL’s IPC-4605N sports an advanced 340- degree pan and 100-degree tilt mechanical design, ideal for deployment in warehouses, o ffices, restaurant, lobby area, or anywhere it’s important to have a wide field of view. Pan/Tilt with 10x digital zoom Day/Night functionality Dual H.264, MJPEG, or MPEG-4 video streams [...]
-
Page 8
2.3 Camera Layout Number Contents IR LEDs x6 (12 in total) Light Sensor Lens IR LEDs x6 (12 in total) Microphone LED Status Indicator USB wireless adapter connector Power connector Ethernet Port I/O box connector Audio output microSD/SDHC card slot Reset button Microphone input[...]
-
Page 9
2.4 LED Status Indicator The LED status indicator consists of a blue status indicator and red IR LEDs. The LEDs appear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LED s will light in th e following patterns: Red LEDs Blue LED Indication On On System booting Off On Successfully established network con[...]
-
Page 10
3 Installation 3.1 Connecting Your IPC-4605N The picture below illustrates the basi c connection of your IPC-4605N camera: The following table describes the nu mbered item s: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera . Use the bundled Ethernet cable to connect the LAN port of the IP camer a to the LA[...]
-
Page 11
3.2 Wireless While using the ZyXEL Wireless adapter, you’ ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try m oving your IP camera closer to the wireless acce[...]
-
Page 12
3.3 Wall and Ceiling Mounting Screw the mounting plate into the mounting surface Secure the IP cam era to the mounting pl at e Loosen the top screw on the trapezoid-shaped fastening bracket. Insert the tips of the fastening bracket into the IP camera as shown. Return fastening bracket to its orig inal position. Use a screwdriver to tighten the fast[...]
-
Page 13
4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will s tart and guide you during the installation process of th e hardware and software for your IP camera.[...]
-
Page 14
5 Accessing your camera Your camera’s video feeds can be accesse d in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug- in installed. When you first setup your camera using the included CD, it will r egister your camera with iSecurity +. Simply point you[...]
-
Page 15
5.1 CloudEnabled™ Viewing 5.1.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Androi d App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App St ore and Android Market from your device by searching “iSecurity+,” or directly fr[...]
-
Page 16
This page allows you to easily adjust your cam era’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.[...]
-
Page 17
5.2 Direct Viewing of your Ca mera (For Advanced Users) 5.2.1 Accessing via PC web browser Users can access their video feeds and camer a m anagement tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Expl orer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. Th[...]
-
Page 18
7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports [...]
-
Page 19
The following table describes the labels found on this screen. Number Label Description Left control panel provides co ntrol over video recording, voice communication, I/O, Pan/Tilt, and snapshot Video stream Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] PTZ speed set the pan [...]
-
Page 20
clicking on the video pane and selecting “Fullscreen” Channel Select a channel from th e drop-down list, or click on the arrow icon to switch to the next/previous channel. X-Axis Adjust the camera’s position on the X-Axis Y-Axis Adjust the camera’s position on the Y-Axis 5.2.1.2 Icons The following table describes th e icons found on this s[...]
-
Page 21
Open Open a file browser to s earch and playback video files captured by the camera Digital Zoom Digital zoom button. Available zoom: 1~10x Switch Channel Click the Left/Right arrow to switch channel Crosshair/Arrow The crosshair allows you to move your cursor over a point on the live view and make that point the new center of view. The arrow moves[...]
-
Page 22
With the device configured, clicking the will allow you to speak throug h your microphone and be heard from the cam era for 90 seconds. Note: When using the voice communication f eature, you may experience various degrees of delay between transmission fr om the com puter and playback on the camera, depending on the condition of your network environ[...]
-
Page 23
2) For stream-2, set the cod ec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Andr oid phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live vi deo on your mobile device. (Note: The IP required IP address is located at the bottom of the page, ju[...]
-
Page 24
5.2.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-co mpatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (locat ed at [Setup[...]
-
Page 25
6 Configuration 6.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Description Turbo[...]
-
Page 26
Framerate Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Quality Video quality settings. 64kpbs~3Mbps. Active Bandwidth Management Allows the IPC-4605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Video Preference Allows you to c hoose between a prefer[...]
-
Page 27
The following table describes the labels found on this screen. Label Description Video Properties Brightness Set image brightness (1~100) Sharpness Set image sharpness (1~8) Saturation Set image saturation (1~ 10) White Balance Set image’s white balance to com pensate for different lighting conditions. Flickerless Sets Flickerless mode. 50(defaul[...]
-
Page 28
6.3 Audio Settings The Audio Settings screen allows you to en able or disable audio, as well as adjust volume. Stream-2 audio is only available for adjus tment when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to set tings, then select Audio from the sidebar. The following screen will appe[...]
-
Page 29
To access the user settings pane, navigate to Se ttings, then select Users fro m the sidebar. The following screen will appear. The following table describes the la bels found within this screen. Label Description Modify/Remove Click here to Modify or Remove an existing viewer Add Click here to add a new viewer or administrator Allow anonymous view[...]
-
Page 30
6.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Netw ork from the sidebar. The following screen will appear. 6.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address conf igu[...]
-
Page 31
On this page, you can set the camera to obt ain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP a ddress via PPPoE, for which a valid user name and password are required. 6.5.2 Wireless Settings If you have installed the ZyXEL wireless adap ter, you’ll be able to set up a wireless connection from this page. To conne[...]
-
Page 32
6.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error m essages, please refer to the troubleshooting section. 6.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate[...]
-
Page 33
This message indicates that the currently c onnected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 6.5.5 Advanced This page allows you to adjust advanced ne twork setting[...]
-
Page 34
The following table describes th e labels on this screen. Label Description DNS Server Set the DNS server to be found via DHCP, or enter a manual DNS address NTP Configuration NTP stands for Network Time Prot ocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP[...]
-
Page 35
To access the UPnP screen, navigate to [S ettings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Re move Windows Components, double-click “Network Services,” and ch eck “UPnP User Interface.” 6.5.8 RTP If you want to broadcast vide[...]
-
Page 36
represents highest priority is 46. The defau lt DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DS CP values. The drop precedence indicates the order in which IP packet s will be dropped when the ne twork is congested. Packets with a higher drop precedence will be dropped fi rst. Each class in the [...]
-
Page 37
To add preset points, follow these steps: 1) Use the directional buttons to navigate your IP camera to the desired position 2) Enter a position name into the “Position Name” field. 3) Press the “Add” button. a. If you would like to designate th is as your camera’s ‘Hom e’ position, check the ‘Use the current position as “home”?[...]
-
Page 38
6.6.1.3 PTZ Position Reset The PTZ Position reset menu allows you to rese t the PTZ functionality back to factory defaults. There are two reset buttons: Button Function Calibrate PTZ Back to Factory Default Ca librates Pan/Tilt position back to factory defaults Reset PTZ Home Position Back to Factory Default Resets the camera’s Home position back[...]
-
Page 39
6.7 Event Setup From this page, your camera can be programm ed to respond to events – such as detected motion, or a triggered I/O device – and send a snapshot directly to your e-m ail account, ftp server, image server, notification server, HT TP server, or SMS serv er in order to warn you about what’s happened. 6.7.1 Event Servers This page p[...]
-
Page 40
To Address Enter the full e-mail address you wish to receive notifications. Authentication Method Login or Plain. For most e-mail servers, select Login. User Name Enter your full username (ie. xxxx@xxx.com) Password Enter your e-mail account’s password Subject Enter the subject line you want alert e- mails to have. Save Save settings Clear Clear [...]
-
Page 41
6.7.1.3 Image Server This page allows you to set the file name that will be used wh en snapshots are taken. To access this page, navigate to [Setup] > [Event Setup] > [Event Server Setup] > [Image]. The following screen will appear. 6.7.1.4 Notify Server This page allows you to input a message that notifies a server that an event was trigg[...]
-
Page 42
The following table describes the la bels found within this screen. Field Des criptio n Service Provider Your SMS gateway service provider. (Default: Clickatell) User Name Your user name API ID API ID provided by your service provider Target country The country c ode for the recipient’s phone number Target Cell Phone recipient’s mobile phone nu[...]
-
Page 43
This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next] . The following screen will appear. This page will allow you to test your camera’ s SMS functionality. To send yourself a test SMS, click the [Send me a SMS messa ge via the SMS Gateway] button. Click [Finish] to complete [...]
-
Page 44
To create an event trigger, click the [Creat e] button. The following screen will appear. The following table describes th e fields in this screen. Field Des criptio n Event Trigger Set the trigger for this event. Trigg ers can be based on schedule, I/O port activity, or audio detection. Schedule If you wish to schedule an event, input the time and[...]
-
Page 45
6.7.3 Motion Detection Motion Detection allows you to define up to th ree regions that will trigger an event if motion is detected. Select a region, sensitivity le vel (S1: Lowest ~ S5: Highest ) from the dropdown list, and then click and drag on the video display to de fine the region. Click [S ave] for settings to take effect. 6.7.4 I/O Status Th[...]
-
Page 46
This page allows you to view your SD Card ’s status, capacity, and gives you the option of formatting the card, as well as enabling recording to an SD card in the event of network failure. Click [Next] to continue. The following screen will appear. This page allows you to configure the circum stances in which recording to the SD card will occur. [...]
-
Page 47
6.9 Recording Hi story The Recording History page allows users to ma nage video clips that have been recorded by the camera. You’ll see a playba ck m enu as displayed below. .The following table describes the la bels found within this screen. Label Description Playback Click to download then play the selected clip Download Click to download the s[...]
-
Page 48
6.11 Multi-Camera This page allows you to add, modify, or delete additional IP cam eras on your camera list. To access this page, navigate to [Setup] > [Multi-Cam era]. The following screen will appear. To add a camera, click [Add] . The following screen will appear. The following table describes the la bels found within this screen. Camera The [...]
-
Page 49
7 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type ’s history, or click on image links to view[...]
-
Page 50
8 Maintenance The Maintenance screen provides information about your IP camera, access to the h istory log, and system maintenance functions. 8.1 Informatio n To access the Maintenance Inform ation screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 8.2 Log This page provides a system log for[...]
-
Page 51
8.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 8.3.2 Profile Management Profile Management allows users to easily set up multiple c ameras. After one camera is properly configured, users can export that came ra’s configuration to a profile on their PC, which can then be loaded onto other cameras. Th is feature also serves as[...]
-
Page 52
8.3.3 Reset All Settings to Default This will reset your camera to its factory default settings. All changes you’ve made will be lost. 8.3.4 Firmware Update Firmware updates are available at us.zyxe l.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then [...]
-
Page 53
9 Troubleshooting During the course of insta llation, you might encounter va rious issues. The following section contains some troubleshooting proce dures to help you so lve these problems. 9.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZ y Wi zard c[...]
-
Page 54
9.3 Resetting to Factory Defaults If you’ve forgotten your password, or your cam era’s been acting ge nerally strange, you can follow the steps below to reset the camera to its default settings. To reset the cam era: 1) Press and hold the reset button (locat ed on the camera’s rear panel) for approximately 10 seconds. When successf ul, you sh[...]
-
Page 55
9.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (D efault is admin/admin, case sensitive.) No User Interface in the Brows er This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to insta[...]
-
Page 56
If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:Program Files. (If using 64-bit windows, l ook in C:Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your[...]
-
Page 57
9.5 Trouble with Remot e Viewing on Browser You can view your camera’s video streams remo tely over the Internet. If you’re having trouble viewing video remotely, refer to th e section below for troubleshooting tips. The above figure depicts a typical setup in which: The IP camera has a static virtual IP address of 192.168.0.1 The WAN I[...]
-
Page 58
3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the ma nufacturer of your router for setting details. Note: Your router may require a reboot after port forw arding is set. The following figure details the settings r equire d to remotely view the IP cam era. After taking the abo[...]
-
Page 59
9.6 Symptoms, Causes, and Solutions Listed below are some common pr oblems, and their sol utions. Symptom Possible Cause/Solution Problems accessing from LAN network using web browser The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your ca mera. If you are certain that your camera is configured wi[...]
-
Page 60
Symptom Possible Cause/Solution Scanning and connecting to wireless AP takes a long time Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process. A possible w[...]
-
Page 61
Symptom Possible Cause/Solution Network diagnosis shows error icon Network connection error. The network connection test verifies that the camera has su ccessfully connected to the LAN network. When the diagnosis result shows a red excla mation mark icon, it means that the camera fails to connect to the LAN network. Check if the LAN cable is secure[...]
-
Page 62
Symptom Possible Cause/Solution Part of the image becomes pixilated/Image artifacts appear Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to tr[...]
-
Page 63
Symptom Possible cause/solution A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady strea m of video data from your camera. The loss of video data might also be caused by network conges[...]
-
Page 64
10 Technical Specifications Category IPC-4605N Camera Image Sensor Lens Focal Length: 4.0mm Max Aperture Ratio: F1.5 Fixed Iris Pan Range -170 ° ~ +170°; total of 340 de grees Tilt Range -10 ° ~ +90°; to tal of 100 de grees Max Speed Pan 90 °/sec., Tilt 70°/sec. Zoom 10x Digital zoom Angle of View 60 ° horizontal Focus Range 0.5m[...]
-
Page 65
Category IPC-4605N Software NVR Station Multiple channel management (32-channels) Fast and intuitive camera setup Search and playba ck record ings by eve n t types Scheduled a nd event-base d managem ent Smart motion and audio detection Web Browser Internet Explorer (ActiveX) Remotely view and configure camera on Inte rnet E[...]
-
Page 66
11 Open-Sourced Components 3 r d Party Software Version License Addgroup V1.13.4 Busybox, GPLv2 Adduser V1.13.4 Busybox, GPLv2 Ash V1.13.4 Busybox, GPLv2 AVN-IPv4LL V1.13.4 GPL Busybox V1.13.4 Busybox, GPLv2 Cat V1.13.4 Busybox, GPLv2 Chattr V1.13.4 Busybox, GPLv2 Chgrp V1.13.4 Busybox, GPLv2 Chmod V1.13.4 Busybox, GPLv2 Chown V1.13.4 Busybox, GPLv[...]
-
Page 67
Iwlist V29 GPL Iwpriv V29 GPL Kill V1.13.4 Busybox, GPLv2 Ln V1.13.4 Busybox, GPLv2 Login V1.13.4 Busybox, GPLv2 Ls V1.13.4 Busybox, GPLv2 Lsattr V1.13.4 Busybox, GPLv2 Mini_httpd V1.19 GPL Mkdir V1.13.4 Busybox, GPLv2 Mkdosfs V2.11 GPL Mknod V1.13.4 Busybox, GPLv2 Mktemp V1.13.4 Busybox, GPLv2 More V1.13.4 Busybox, GPLv2 Mount V1.13.4 Busybox, GPL[...]
-
Page 68
Libc-2.11.so V2.11 GPLv3 Libcrypt.so V2.11 GPLv3 Libcrypt.so.1 V2.11 GPLv3 Libcrypt-2.11.so V2.11 GPLv3 Libcrypto.so V0.98m GPL Libcrypto.so.0.9.8 V0.98m GPL Libdl.so V2.11 GPLv3 Libdl.so.2 V2.11 GPLv3 Libdl-2.11.so V2.11 GPLv3 Libgcc_s.so V4.4.0 GPLv3 Libgcc_s.so.1 V4.4.0 GPLv3 Libip4tc.a V1.4.10 GPL Libip4tc.la V1.4.10 GPL Libip6tc.a V1.4.10 GPL [...]
-
Page 69
Libsockipc.so.1.2 V2.11 GPLv3 Libssl.so V0.98m GPL Libssl.so.0.9.8 V0.98m GPL Libstdc++.so V4.4.0 GPLv3 Libstdc++.so.6.0.11 V4.4.0 GPLv3 Libthread_db.so V4.4.0 GPLv3 Libthread_db.so.1 V2.11 GPLv3 Libthread_db-1.0.so V2.11 GPLv3 Libthreadutil.so V1.4.1 GPL Libthreadutil.so.2 V1.4.1 GPL Libthreadutil.so.2.0.2 V1.4.1 GPL Libupnp.so V1.4.1 GPL Libupnp.[...]
-
Page 70
Pivot_root V1.13.4 Busybox, GPLv2 Poweroff V1.13.4 Busybox, GPLv2 Reboot V1.13.4 Busybox, GPLv2 Rmmod V1.13.4 Busybox, GPLv2 Route V1.13.4 Busybox, GPLv2 Runlevel V1.13.4 Busybox, GPLv2 Start-stop-daemon V1.13.4 Busybox, GPLv2 Sulogin V1.13.4 Busybox, GPLv2 Swapoff V1.13.4 Busybox, GPLv2 Swapon V1.13.4 Busybox, GPLv2 Switch_root V1.13.4 Busybox, GP[...]
-
Page 71
gratis or for a fee, you must give the recipi ents all the rights that you have. Yo u must make sure t h at t hey, too, receive or can get the source c ode. And you m u st show them these terms so they know their ri ghts. We protect y our rights wi th two st eps: (1) copy right the software, a nd (2) offer you this license which gives you legal per[...]
-
Page 72
Program, t he distribution of t he whole must be on the te rms of this Li cense, whose perm issions for othe r licensees extend to the entire whole, an d thus to each a nd every part regardl ess of who wrote it. Thus , it is not the intent o f this section to claim rights or con t est your rights to work written entirely by you; rather, the intent [...]
-
Page 73
refrain entirel y from dist ribution of the Pro gram. If any po rtion of thi s section is held inval id or unenforceable under any part icular circumstance, the ba lance of the section is in tended to apply and the section as a whole is intended to appl y in other circum stances. It is not the purpose of t his section to ind uce you to infri nge an[...]
-
Page 74
This product con tains ad dgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, ch own, cp, cttyhack, date, dd, del group, deluser , df, dmesg, ech o, egrep, false , fgrep, grep, gnuzip, gzip, h ostname, i p, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, m knod, mktemp, more, mount, mount point, mv, netstat, ni ce, ping, ping 6, [...]
-
Page 75
Also, for eac h distributo r's protecti on, we want to make certa in that ever yone underst ands that t here is no warranty for this free librar y. If th e library is modified by someone else and passed on, we wan t its recipients to know that what they have is not the origin al version, so that any problems introdu ced by others will not refl[...]
-
Page 76
The "Library", below, refer s to any such software lib rary or wo rk which has been distribut ed under these terms. A "wor k based on the Library " means either the Li brary or any deri vative work unde r copyright l aw: that is to say, a work containing the Li brary or a po rtion of it , either verbat im or with modificati ons [...]
-
Page 77
Thus, it is not the intent of this sectio n to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise th e right to control the distributi on of derivative o r collective works ba sed on the Library. In addition, mere aggreg ation of another work not ba sed on the Library with the Library (or with a w[...]
-
Page 78
Otherwise, if the work is a derivativ e of the Library, you m ay distribute the object code for the work under the terms of Section 6. Any executabl es containing that work als o fall u nder Section 6, whethe r or not they are linked directly with the Library itself. 6. As an except ion to the Sections a bove, you m ay also compile or link a "[...]
-
Page 79
8. You ma y not copy, m odify, subli cense, link wit h, or distri bute the Library ex cept as expressly p rovided under this Lice nse. Any attempt otherwise t o copy, modi fy, sublicense, link with, or distribut e the Library is void, and will automatically ter minate your rights under this Licen se. Ho wever, parties who have received copies, or r[...]
-
Page 80
Each version is gi ven a distinguishin g version number. If t he Library specifies a version n umber of this License which applies to it and "any later version", you h ave the option of following the terms and conditions either of that version or of any later v e rsion published by the Free Software Foundation. If the Library does n ot sp[...]
-
Page 81
License as published by the Free Software Foundation; either version 2 of the License, or (at your op tion) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WA RRANTY; witho ut even th e implied war r anty of MERCHANTABILI TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Li[...]
-
Page 82
This product contains ld-2.11.so , ld-lin ux.so.3, libc. so, libc.so .6, libc-2.11.so, libcryp t.so, libcryp t.so.1, libcrypt-2.11.so, libd l.so, libdl.so.2, libdl-2 .11.so, libgcc_s.so , libgcc_s.so.1, lib m.so, libm.so.6, libm- 2.11.so, li bnsl.so, li bnsl.so.1, libnsl-2.11 .so, libnss _dns.so, l ibnss_dns .so.2, li bnss_dns-2. 11.so, libnss_file[...]
-
Page 83
domains, we st and ready to extend this provision t o those dom ains in future versions of the GPL, as nee ded to protect the freedom of users. Finally, every program is threatened constantly by so ftware patents . States shoul d not allow pat ents to restrict develo pment and use of softwa re on gene ral-purpose com puters, but in those that do, w[...]
-
Page 84
The “System Libraries” of an executabl e work incl ude anything, other t han the work as a whol e, that (a) is included i n the norm al form of packaging a Major Component , but whi ch is not pa rt of that Major Compone nt, and (b ) serves on ly to enable use of the work with t hat Major C omponent, or to im plement a Standard Interface for whi[...]
-
Page 85
4. Conveying V erbatim Copies. You may con vey verbatim copies of the Program' s source code as y ou receive it, in any medium , provided that you conspicuously an d appropriately publish on each copy an appropriate cop yright notice; keep in tact all notices stating that this License and a ny non-perm issive terms added i n accord with sectio[...]
-
Page 86
c) Convey individual copies of the obj ect cod e with a copy of the written offer to provide the Correspondi ng Source. This a lternative is allowed only occasional ly and nonc ommercially, and only if yo u received the object code wi th su ch an offer, in accord with subsection 6b. d) Convey the object code by of fering access from a desig[...]
-
Page 87
7. Additional Terms. “Additional perm issions” are terms that supplement the terms of this License by making exceptions fro m one or more of its conditions. Additional permissions th at are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If a[...]
-
Page 88
license, and (b) permanently, if the copyrigh t ho lder fails to notify you of t he violation by some reaso nable means prior to 60 days after the cessation. Moreover, your license from a particular copyr igh t holder is reinstated permanently if the copyrigh t ho lder notifies you of the violation by some reasonable means, this is the first time y[...]
-
Page 89
Each contributor gr ants you a non-ex clusive, worldw id e, royalty-free patent license under the contributor' s essential pate nt claims, to m ake, use, sell, offer for sal e, import a nd otherwi se run, modi fy and propa gate the contents o f its contri butor versi on. In the following three paragra phs, a “patent licens e” is a ny expre[...]
-
Page 90
part which is the covere d work, but the spec ial requ irements of the GNU Affero General Public License, section 13, concerning interaction thro ugh a network will apply to the combination as su ch. 14. Revised Versions of this License. The Free Soft ware Foundati on may publ ish revise d and/or new versions of the GNU Ge neral Public License from[...]
-
Page 91
How to Apply These Terms to Your New Programs If you devel op a new pr ogram, and you want it t o be of the greatest possible use to the publ ic, the best wa y to achieve this is to make it free software which ev eryone can redistribute and change un der these term s. To do so, attach the following notices to t he program. It is safest to attach th[...]