ZyXEL Communications IPC3605N - EDITION 1.1 Manual
ZyXEL Communications IPC3605N - EDITION 1.1 Manual

ZyXEL Communications IPC3605N - EDITION 1.1 Manual

The first consumer-friendly network camera

Advertisement

Quick Links

IPC-3605N
The First Consumer-Friendly Network Camera
Edition 1.1, 2/2012
www.zyxel.com
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications IPC3605N - EDITION 1.1

  • Page 1 IPC-3605N The First Consumer-Friendly Network Camera Edition 1.1, 2/2012 www.zyxel.com Copyright © 2011 ZyXEL Communications Corporation...
  • Page 3: Table Of Contents

    Contents   Getting to know your IPC-3605N ................6     Package Contents ....................6     Features ......................7     Camera Layout ....................8     LED Status Indicator ..................9     Installation..............Error! Bookmark not defined.  ...
  • Page 4: Important Notices

    Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. FCC Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
  • Page 5: About This Manual

    About This Manual This manual is indented only for users of the ZyXEL IPC-3605N network camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, such as: Caution! Information provided with this symbol is critical to prevent damage to the product or injury to the user.
  • Page 6: Getting To Know Your Ipc-3605N

    Getting to know your IPC-3605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor. Number Contents IPC-3605N Network Camera Ethernet Cable Power Adapter Quick Installation Guide Install Disk Mounting Screw x3/ Screw Mount x3 USB Wireless Adapter...
  • Page 7: Features

    2.2 Features ZyXEL’s IPC-3605N is an easy to install product with support for H.264/MPEG- 4/MJPEG video compression formats to help ensure high quality video with reduced bandwidth consumption.  Small and smart functional design  2 megapixel/HD resolution  Dual H.264, MJPEG, or MPEG-4 video streams ...
  • Page 8: Camera Layout

    2.3 Camera Layout Number Contents Light Sensor Lens IR LEDs x6 (inside) USB Wireless Adapter Connector Audio Input Reset Button MicroSD Card Slot (on side) Microphone LED status indicator Speaker Focus adjustment ring Microphone input Power adapter port Composite video jack Ethernet port I/O (2 in/1 out) &...
  • Page 9: Led Status Indicator

    2.4 LED Status Indicator The LED status indicator consists of one red and one blue LED. Depending on the camera’s status, the LEDs will appear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LEDs will light in the following patterns: Red LEDs Blue LED Indication...
  • Page 10 2.5 Digital I/O Connector Block The I/O connector on the back of the camera provides a central interface between your home security system and various input devices. The two digital inputs are normally used with security sensors. They work by detecting a change in the state of an open or closed circuit.
  • Page 11: Installation

    Power: Attach the power adapter to the camera’s power port, and connect the plug to a power outlet. Important!  The Camera’s USB port only supports the bundled ZyXEL Wireless adapter.  After unplugging the camera’s power cable, wait at least 4 seconds before restoring power to the camera.
  • Page 12: Wireless

    3.2 Wireless While using the ZyXEL Wireless adapter, you’ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network.
  • Page 13: Wall And Ceiling Mounting

    3.3 Wall and Ceiling Mounting In order to mount the camera on the wall or ceiling, use the included screws to fix the bracket to a flat surface. After the camera has been affixed, adjust the camera to the required viewing angle. Follow the steps below to mount your camera: Step 1: Detach the metal mounting plate from the base of the camera by inserting a flat head screwdriver into the rectangular hole at the wide end of...
  • Page 14 3.4 Dismounting the Camera The following instructions will detail how to remove the camera from a mounted surface. A flat head and Phillips screwdriver will be required. Step 1: Remove the camera from the metal mounting plate by inserting a flat head screw driver into the rectangular hole on the wide end of the plastic base, and pushing downward.
  • Page 15 3.5 Disassemble/Assemble the camera stand The camera comes attached to its stand when delivered from ZyXEL. If you need to detach or reattach the stand, follow the diagrams below. To reattach the camera stand:...
  • Page 16: Initial Setup

    Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will start and guide you during the installation process of the hardware and software for your IP camera.
  • Page 17: Accessing Your Camera

    3) View the live video stream on the mobile web browser of your iPhone/iPod, Android phone, BlackBerry, PDA, or any other mobile phones with a built-in web browser. Through live Motion-JPEG video streaming, you can view your ZyXEL IP camera while on the go. This may require advanced configuration of your home router in order to view the camera remotely.
  • Page 18: Cloudenabled™ Viewing

    (http://www.apple.com/itunes). 4.2.2 Accessing via iSecurity+ Web App Once a second stream has been successfully enabled on your ZyXEL camera, you can use the iSecurity+ web app to view your video feeds. To access the app, simply navigate to http://zyxel.isecurityplus.com/login in your web browser.
  • Page 19 This page allows you to easily adjust your camera’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.
  • Page 20: Accessing Via Pc Web Browser

    5) A confirmation dialogue box will appear. Select [Install] twice to install both USActiveX.cab and IPCamClientActiveX.cab. Note: ZyXEL ActiveX only supports 32-Bit browsers. If you’re running a 64-bit Operating System, you’ll still have to run the 32-Bit version of your browser in order to access your camera.
  • Page 21 7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera.
  • Page 22 The following table describes the labels found on this screen. Number Label Description Left control panel provides control over video recording, voice communication, I/O, and snapshot Video stream Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] Video mode Allows you to change the video display between single,...
  • Page 23 4.3.1.2 Icons The following table describes the icons found on this screen. Icon Label Description Fit to browser Resizes the live video pane to fit your browser window Actual size Resizes the live video pane to the original size Brightness Adjusts the camera’s brightness.
  • Page 24 With the device configured, clicking the will allow you to speak through your microphone and be heard from the camera for 90 seconds. Note: When using the voice communication feature, you may experience various degrees of delay between transmission from the computer and playback on the camera, depending on the condition of your network environment.
  • Page 25 2) For stream-2, set the codec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Android phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live video on your mobile device. (Note: The IP required IP address is located at the bottom of the page, just above the [Save] and [Reset] buttons.)
  • Page 26: Accessing Via 3Gpp Mobile Phone

    4.3.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-compatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality.
  • Page 27: Configuration

    Configuration 5.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen.
  • Page 28: Camera Settings

    Framerate Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Quality Video quality settings. 64kpbs~3Mbps. Active Bandwidth Management Allows the IPC-3605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Video Preference Allows you to choose between a preference toward higher quality image or a higher framerate.
  • Page 29 The following table describes the labels found on this screen. Label Description Video Properties Brightness Set image brightness (1~100) Sharpness Set image sharpness (1~8) Saturation Set image saturation (1~10) White Balance Set image’s white balance to compensate for different lighting conditions.
  • Page 30: Audio Settings

    5.3 Audio Settings The Audio Settings screen allows you to enable or disable audio, as well as adjust volume. Stream-2 audio is only available for adjustment when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to settings, then select Audio from the sidebar. The following screen will appear.
  • Page 31 To access the user settings pane, navigate to Settings, then select Users from the sidebar. The following screen will appear. The following table describes the labels found within this screen. Label Description Modify/Remove Click here to Modify or Remove an existing viewer Click here to add a new viewer or administrator...
  • Page 32: Network Settings

    5.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Network from the sidebar. The following screen will appear. 5.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address configuration.
  • Page 33: Wireless Settings

    5.5.2 Wireless Settings If you have installed the ZyXEL wireless adapter, you’ll be able to set up a wireless connection from this page. To connect wirelessly, check the [Use Wireless First] box to give priority to wireless connections when the LAN network is also connected. You will also be able to choose to connect via DHCP or a static IP address and specific access point.
  • Page 34: Network Bandwidth

    5.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error messages, please refer to the troubleshooting section. 5.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate video bitrate for their network.
  • Page 35 This message indicates that the currently connected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate.
  • Page 36 The following table describes the labels on this screen. Label Description DNS Server Set the DNS server to be found via DHCP, or enter a manual DNS address NTP stands for Network Time Protocol. To synchronize your camera’s Configuration clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP server (default address is pool.ntp.org) HTTP Server...
  • Page 37 To access the UPnP screen, navigate to [Settings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Remove Windows Components, double-click “Network Services,” and check “UPnP User Interface.” 5.5.8 If you want to broadcast video using RTP (Real-time Transport Protocol), use this page to set up the port range, video/audio address, and port number.
  • Page 38: Event Setup

    represents highest priority is 46. The default DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DSCP values. The drop precedence indicates the order in which IP packets will be dropped when the network is congested. Packets with a higher drop precedence will be dropped first.
  • Page 39: Ftp Server

    The following table describes the labels found in this screen. Label Description SMTP Server Enter SMTP server information in this field (ie. smtp.gmail.com) SMTP Port Enter your SMTP server’s port information From Address Enter your full e-mail address (ie. xxxx@xx.com) To Address Enter the full e-mail address you wish to receive notifications.
  • Page 40: Http Server

    The following table describes the labels found within this screen. Label Description FTP Address Enter the address of your FTP server FTP Port Enter the port of your FTP server User Name Enter your user name here Password Enter your Password here Upload Path Enter the file path of the folder where you want snapshots to be stored.
  • Page 41 The HTTP Server page allows you to set your camera to input the URL of an HTTP server used by an NVR in order to signal your NVR that there’s an event being triggered. To access this page, navigate to [Setup] > [Event Setup] > [Event Server Setup] > [HTTP].
  • Page 42: Trigger Setup

    Clear Clear settings Cancel Cancel After you input your settings, click [Next]. The following page will appear. This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next]. The following screen will appear. This page will allow you to test your camera’s SMS functionality.
  • Page 43 To create an event trigger, click the [Create] button. The following screen will appear. The following table describes the fields in this screen. Field Description Event Trigger Set the trigger for this event. Triggers can be based on schedule, I/O port activity, or audio detection.
  • Page 44: Motion Detection

    Select the actions to be taken, then click [Finish] to complete trigger setup. 5.6.3 Motion Detection Motion Detection allows you to define up to three regions that will trigger an event if motion is detected. Select a region, sensitivity level (S1: Lowest ~ S5: Highest) from the dropdown list, and then click and drag on the video display to define the region.
  • Page 45: Recording Setup

    5.7 Recording Setup The IPC-3605N supports storage of both snapshots and video clips to local storage. To configure this function, navigate to [Setup] > [Recording Setup]. The following screen will appear. This page allows you to view your SD Card’s status, capacity, and gives you the option of formatting the card, as well as enabling recording to an SD card in the event of network failure.
  • Page 46: Recording History

    Note:  This camera uses a First In, First Out storage method. When the SD card is full, the oldest files will be automatically rewritten.  If you want to record video clips of detected motion to the SD card, you’ll need to set a motion detection region before setting up event-based recording.
  • Page 47: Multi-Camera

    5.10 Multi-Camera This page allows you to add, modify, or delete additional IP cameras on your camera list. To access this page, navigate to [Setup] > [Multi-Camera]. The following screen will appear. To add a camera, click [Add]. The following screen will appear. The following table describes the labels found within this screen.
  • Page 48 Camera The # by which this camera will be identified IP Address Enter the camera’s IP address here User Name Enter the username used to access the new camera in this field Password Enter the password used to access the new camera in this field RTSP Port Enter the camera’s RTSP port (default 554)
  • Page 49: Event Viewer

    Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type’s history, or click on image links to view event-triggered snapshots.
  • Page 50: Maintenance

    Maintenance The Maintenance screen provides information about your IP camera, access to the history log, and system maintenance functions. 7.1 Information To access the Maintenance Information screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 7.2 Log This page provides a system log for your camera.
  • Page 51: Reboot Camera

    7.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 7.3.2 Profile Management Profile Management allows users to easily set up multiple cameras. After one camera is properly configured, users can export that camera’s configuration to a profile on their PC, which can then be loaded onto other cameras.
  • Page 52: Firmware Update

    7.3.3 Firmware Update Firmware updates are available at us.zyxel.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the camera’s firmware. Once the upgrade process begins, it must not be interrupted or you risk permanently damaging your camera.
  • Page 53: Troubleshooting

    Wizard icon to launch the eaZy Wizard configuration tool. During the configuration, the eaZy Wizard will automatically scan for all of the available ZyXEL IP surveillance products installed on your LAN network (even if they are not on the same subnet).
  • Page 54: Resetting To Factory Defaults

    8.3 Resetting to Factory Defaults If you’ve forgotten your password, or your camera’s been acting generally strange, you can follow the steps below to reset the camera to its default settings. To reset the camera: 1) Press and hold the reset button (located on the camera’s rear panel) for approximately 10 seconds.
  • Page 55: Trouble With Active X

    1) ActiveX was not installed. Follow the instructions on-screen to install ActiveX, or you won’t have access to the user interface. Note: ZyXEL’s ActiveX components only support 32-bit Internet Explorer. If your computer is running a 64-bit operating system, you’ll still need to use a 32- bit browser to access the camera.
  • Page 56 If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:\Program Files. (If using 64-bit windows, look in C:\Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client.
  • Page 57: Trouble With Remote Viewing On Browser

    8.5 Trouble with Remote Viewing on Browser You can view your camera’s video streams remotely over the Internet. If you’re having trouble viewing video remotely, refer to the section below for troubleshooting tips. The above figure depicts a typical setup in which: ...
  • Page 58 3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the manufacturer of your router for setting details. Note: Your router may require a reboot after port forwarding is set. The following figure details the settings required to remotely view the IP camera.
  • Page 59: Symptoms, Causes, And Solutions

    8.6 Symptoms, Causes, and Solutions Listed below are some common problems, and their solutions. Symptom Possible Cause/Solution The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your camera. If you are certain that your camera is configured with the same subnet mask as that of your PC, you can first disconnect other cameras, then run the eaZy Wizard to scan for the camera on your network.
  • Page 60 Symptom Possible Cause/Solution Scanning and connecting to Too many wireless APs nearby. wireless AP takes a long time The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process.
  • Page 61 Symptom Possible Cause/Solution Network diagnosis shows Network connection error. error icon The network connection test verifies that the camera has successfully connected to the LAN network. When the diagnosis result shows a red exclamation mark icon, it means that the camera fails to connect to the LAN network. Check if the LAN cable is securely connected to the Ethernet port of the camera and to your hub/router, or check if the LAN cable is functioning normally.
  • Page 62 Symptom Possible Cause/Solution Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from Internet, your camera needs sufficient upload bandwidth to transmit video stream and you need sufficient download bandwidth to download video stream at the remote location.
  • Page 63: Technical Support Information

    Technical Support Information In the event of problems that cannot be solved, please contact your vendor. If you cannot contact your vendor, contact a ZyXEL office in the region in which you bought the device. Regional offices are listed at www.zyxel.com/web/contact_us.php ZyXEL communications Corporation –...
  • Page 64: Technical Specifications

    Technical Specifications Category IPC-3605N Image Sensor  Lens Focal Length: 4.0mm  Max Aperture Ratio: F1.5  Fixed Iris Focus Range 0.5m ~ INF Minimum IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective Illumination distance up to 10m) Camera...
  • Page 65 Category IPC-3605N  Software NVR Station Multiple channel management (32-channels)  Fast and intuitive camera setup  Search and playback recordings by event types  Scheduled and event-based management  Smart motion and audio detection  Web Browser Internet Explorer Remotely view and configure camera on Internet Explorer ...
  • Page 66: Open-Sourced Components

    10 Open-Sourced Components Party Software Version License Addgroup V1.13.4 Busybox, GPLv2 Adduser V1.13.4 Busybox, GPLv2 V1.13.4 Busybox, GPLv2 AVN-IPv4LL V1.13.4 Busybox V1.13.4 Busybox, GPLv2 V1.13.4 Busybox, GPLv2 Chattr V1.13.4 Busybox, GPLv2 Chgrp V1.13.4 Busybox, GPLv2 Chmod V1.13.4 Busybox, GPLv2 Chown V1.13.4 Busybox, GPLv2 ComproRTSP...
  • Page 67 Iwlist Iwpriv Kill V1.13.4 Busybox, GPLv2 V1.13.4 Busybox, GPLv2 Login V1.13.4 Busybox, GPLv2 V1.13.4 Busybox, GPLv2 Lsattr V1.13.4 Busybox, GPLv2 Mini_httpd V1.19 Mkdir V1.13.4 Busybox, GPLv2 Mkdosfs V2.11 Mknod V1.13.4 Busybox, GPLv2 Mktemp V1.13.4 Busybox, GPLv2 More V1.13.4 Busybox, GPLv2 Mount V1.13.4 Busybox, GPLv2...
  • Page 68 Libc-2.11.so V2.11 GPLv3 Libcrypt.so V2.11 GPLv3 Libcrypt.so.1 V2.11 GPLv3 Libcrypt-2.11.so V2.11 GPLv3 Libcrypto.so V0.98m Libcrypto.so.0.9.8 V0.98m Libdl.so V2.11 GPLv3 Libdl.so.2 V2.11 GPLv3 Libdl-2.11.so V2.11 GPLv3 Libgcc_s.so V4.4.0 GPLv3 Libgcc_s.so.1 V4.4.0 GPLv3 Libip4tc.a V1.4.10 Libip4tc.la V1.4.10 Libip6tc.a V1.4.10 Libip6tc.la V1.4.10 Libiptc.a V1.4.10 Libiptc.la V1.4.10...
  • Page 69 Libsockipc.so.1.2 V2.11 GPLv3 Libssl.so V0.98m Libssl.so.0.9.8 V0.98m Libstdc++.so V4.4.0 GPLv3 Libstdc++.so.6.0.11 V4.4.0 GPLv3 Libthread_db.so V4.4.0 GPLv3 Libthread_db.so.1 V2.11 GPLv3 Libthread_db-1.0.so V2.11 GPLv3 Libthreadutil.so V1.4.1 Libthreadutil.so.2 V1.4.1 Libthreadutil.so.2.0.2 V1.4.1 Libupnp.so V1.4.1 Libupnp.so.2 V1.4.1 Libupnp.so.2.0.2 V1.4.1 Libutil.so V2.11 GPLv3 Libutil.so.1 V2.11 GPLv3 Libutil-2.11.so V2.11 GPLv3...
  • Page 70: Gnu General Public License

    Pivot_root V1.13.4 Busybox, GPLv2 Poweroff V1.13.4 Busybox, GPLv2 Reboot V1.13.4 Busybox, GPLv2 Rmmod V1.13.4 Busybox, GPLv2 Route V1.13.4 Busybox, GPLv2 Runlevel V1.13.4 Busybox, GPLv2 Start-stop-daemon V1.13.4 Busybox, GPLv2 Sulogin V1.13.4 Busybox, GPLv2 Swapoff V1.13.4 Busybox, GPLv2 Swapon V1.13.4 Busybox, GPLv2 Switch_root V1.13.4 Busybox, GPLv2...
  • Page 71 gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
  • Page 72 Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
  • Page 73 refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
  • Page 74 This product contains addgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, chown, cp, cttyhack, date, dd, delgroup, deluser, df, dmesg, echo, egrep, false, fgrep, grep, gnuzip, gzip, hostname, ip, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, mknod, mktemp, more, mount, mountpoint, mv, netstat, nice, ping, ping6, ps, pwd, rm, sed, sh, sleep, stat, sty, su, sync, tar, touch, true, umount, uname, usleep, vi, watch, zcat, adjtimex, arp, blkid, depmod, devmem, fdisk, freeramdisk, fsck, fsck.minix, getty, hatl, hwclock, ifconfig, ifdown, ifup, init, insmod, klogd, logread, losetup, lsmod, makedevs, mdev, mkds.minix,...
  • Page 75 Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations.
  • Page 76 The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language.
  • Page 77 Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
  • Page 78 Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6.
  • Page 79 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
  • Page 80 Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.
  • Page 81 License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
  • Page 82 This product contains ld-2.11.so, ld-linux.so.3, libc.so, libc.so.6, libc-2.11.so, libcrypt.so, libcrypt.so.1, libcrypt-2.11.so, libdl.so, libdl.so.2, libdl-2.11.so, libgcc_s.so, libgcc_s.so.1, libm.so, libm.so.6, libm- 2.11.so, libnsl.so, libnsl.so.1, libnsl-2.11.so, libnss_dns.so, libnss_dns.so.2, libnss_dns-2.11.so, libnss_files.so, libnss_files.so.2, libnss_files-2.11.so, libpthread.so, libpthread.so.0, libpthread-2.11.so, libresolv.so, libresolv.so.2, libresolv-2.11.so, librt.so, librt.so.1, librt-2.11.so, libstdc++.so, libstdc++.so.6, libstdc++.so.6.0.11, libthread_db.so, libthread_db.so.1, libthread_db-1.0.so, libutil.so, libutil.so.1, and libutil-2.11.so under the following license: GNU GENERAL PUBLIC LICENSE...
  • Page 83 domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users. Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary.
  • Page 84 The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
  • Page 85 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code;...
  • Page 86  c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b. ...
  • Page 87 7. Additional Terms. “Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
  • Page 88 license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
  • Page 89 Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement).
  • Page 90 part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License. The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time.
  • Page 91: How To Apply These Terms To Your New Programs

    How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.

This manual is also suitable for:

Ipc-3605n

Table of Contents