SMC Networks SMC790WBRA4 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones SMC Networks SMC790WBRA4. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica SMC Networks SMC790WBRA4 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual SMC Networks SMC790WBRA4 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales SMC Networks SMC790WBRA4, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones SMC Networks SMC790WBRA4 debe contener:
- información acerca de las especificaciones técnicas del dispositivo SMC Networks SMC790WBRA4
- nombre de fabricante y año de fabricación del dispositivo SMC Networks SMC790WBRA4
- condiciones de uso, configuración y mantenimiento del dispositivo SMC Networks SMC790WBRA4
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de SMC Networks SMC790WBRA4 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de SMC Networks SMC790WBRA4 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico SMC Networks en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de SMC Networks SMC790WBRA4, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo SMC Networks SMC790WBRA4, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual SMC Networks SMC790WBRA4. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    EZ Connect N Draft 11n Wireless USB2.0 Adapte r ADS L2 BA RRIC AD E ™ 4-Ports Wire less Annex A AD SL/ ADSL2 Mo dem Router SMC7904WBR A4[...]

  • Página 2

    Contents 1 Introduction ................... ................... ................... ................... ................... ................... ................. ................. ......... 1 1.1 Packing List ................... ................... ................... ................... ................... ................... ................ ....[...]

  • Página 3

    xvii  3.7.8 Other ..................... ................... ................... ................... ................... ................... ................ .......... 45 3.8 Admin ..... ................... ................... ................... ................... .................... ................... ............... ............. 48 3.8.1 [...]

  • Página 4

    1 Introduction The SMC7904WBRA4 supports multiple line modes. It provides four 10/100 base-T Ethernet interfaces at the user end. The device provides high-speed ADSL broadband connection to the Internet or Intranet for high-end users, such as net b ars and office users. The device provides high performance access to the Internet, downlink up to 24 [...]

  • Página 5

    Front panel The following table describes the LEDs of the device. LED S tatus Color Description On The device is powered on and the initialization is normal. Off Green The device is powered off. On The device is initializing. Power Blinks Red The firmware is upgrading. On The Internet connection is normal. Blinks Data is being transmitted on the In[...]

  • Página 6

    Interface Function The button of the antenna. 1.4 System Requirements Recommended system requirements are as follows: A 10/100 base-T Ethernet card is installed on your PC A hub or Switch. (attached to several PCs through one of Ethernet interfaces on the device) Operating system: W indows 98SE, W indows 2000, W indows ME, W indows XP o r W indows [...]

  • Página 7

    4  PPP sess ion P AP and CHAP IP fi lter IP QoS Remote access control Line connection status test Remote management (telnet and HTTP) backup and restore of configuration file Ethernet interface supports crossover detection, auto-correction and polarity correction UPnP[...]

  • Página 8

    2 Hardware Installation Step 1 Connect the Line interface of the device and the Modem interface of the splitter through a telephone cable. Connect the phone to the Phone i nterface of the s plitter through a cable. Connect the incoming line to the Line interface of the splitter . The splitter has three interfaces: – Line : Connect to a wall phone[...]

  • Página 9

    6  Figure 2 (with a telephone set before the splitter) In the actual application, connection 1 is recommended. I Note: When connection 2 is used, the filter must be installed close to the telephone lines. Do not use the splitter instead of the filter . Installing a t elephone directly before the splitter may lead to a failure o f connection betw[...]

  • Página 10

    3 About the Web Configuration This chapter describes how to configure the router by using the W eb-based configuration utility . 3.1 How to Access the Router The following is the detailed description of accesing the router for the first time. Step 1 Open the Internet Explorer (IE) browser and enter http://192.168.2.1 . Step 2 In the LOGIN page that[...]

  • Página 11

    In the navigation bar , choose Setup W izard . In the Setup Wiz ard page, you can configure the VPI/VCI num ber . The Setup Wizard page guides fast and accurate configuration of the Internet connection and other important parameters. The following sections describe these various configuration parameters. Whether you configure these parameters or us[...]

  • Página 12

    The following table describes the parameters of this page. Field Description (Root) SSID SSID BroadCase W ire less Mode Channel Number After configuring the wireless settings, click NEXT . The page shown in the following figure appears. In this page, you can configure the ADSL settings. The following table describes the parameters and buttons in th[...]

  • Página 13

    Y ou can choose LLC or VC-Mux . VPI The virtual path between two points in an A TM netw ork, and its valid v alue is from 0 to 255. VCI The virtual channel between two points in an A TM network, ranging from 32 to 65535 (0 to 31 is reserved for local management of A T M traffic). Before you configure the protocol, you must select the country in whi[...]

  • Página 14

    PPPoA If the uplink equipment supports the PPPoA encapsulation, you can set the device to initiate the PPPoA dialup. After finishing the settings, click NEXT . The page show n in the following figure appears. 1 1 [...]

  • Página 15

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Dynamic IP If the uplink equipment supports the Dynamic IP protocol, you can set the device to initiate the dynamic IP dialup. After finishing the settings, click NEXT . The page show n in the followin[...]

  • Página 16

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Static IP If the uplink equipment supports the S tatic IP protocol, you can set the device to initiate the static IP dialup. After finishing the settings, click NEXT . The page show n in the following [...]

  • Página 17

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. Bridge If the uplink equipment supports the Bridge protocol, you can set the device to initiate the bridge dialup. After finishing the settings, click NEXT . The page show n in the following figure app[...]

  • Página 18

    If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 1483 Route If the uplink equipment supports the 1483 Route protocol, you can set the device to initiate the 1483 route dialup. 15 [...]

  • Página 19

    After finishing the settings, click NEXT . The page show n in the following figure appears. If you ensure the configuration is co rrect, click FINISH . Then the configuration takes effect. Y o u can check the configuration in the W AN page. 16 [...]

  • Página 20

    I Note: After you select the country in which you are in and the correct ISP , the ADSL settings, such as protocol, connection type, VPI, and VCI appears. It is recommended to use the default values. 3.3 Status In the navigation ba r , choose S tatus . In the S tatus p age that is displayed contains: System , LAN , WLAN , W AN , Port Mapping, S tat[...]

  • Página 21

    3.3.3 WLAN Choose S tatus > WLAN . The page that is displayed show s some basic wirless LAN settings of the router . 3.3.4 WAN Choose S tatus > W AN . In the W AN page, you can view basic status of W AN, default g ateway , DNS server . If you want to configure the W AN network, refer to the chapter3.6.1 W AN Interface. 18 [...]

  • Página 22

    3.3.5 Port Mapping Choose S tatus > Port Mapping . In the Port Mapping page, you can view the mapping relation and the status of port mapping. 3.3.6 Statistic Choose S tatus > S tatistic. The S tatistic page that is displayed contains T raffic S tatistic and DSL S tatistic . 3.3.6.1 Traffic Statistic Choose T raffic S tatistic in the left pan[...]

  • Página 23

    3.3.6.2 DSL Statistic Choose DSL S tatistic in the left p ane. The page shown in the following f igure appears. In this page, you can view the ADSL line statistics, downstream rate, upstream rate, and other information. 3.3.7 ARP Table Choose S tatus > ARP T able. In the ARP T able page, you can view the t able which shows a list of learn ed MAC[...]

  • Página 24

    3.4.1 LAN Settings Choose LAN > LAN Settings . In the LAN Settings page, you c an configure the LAN network. In this page, you can change IP add ress of the router . T he default I P address is 192.168.2.1. This is the private IP addr ess of the router . This is the address under which the router can be reached in the local network. It can be fr[...]

  • Página 25

    Select DHCP Proxy in the DHCP Server Setup page. The page shown in the following figure appears. The following table describes the parameters of this page. Field Description DHCP Proxy Select it, the router acts a surrogate DHCP Server and relays the DHCP re quests and reponses between the remote server and the client. DHCP Server Address Enter the[...]

  • Página 26

    The following table describes the parameters in this page. Field Description DHCP Server If set to DHCP Server , the router can assign IP addresses, IP default gateway and DNS Servers to Windows95, Windows NT a nd other systems that support the DHCP client. IP Pool Range It specifies the first and the last of contiguous IP address of the IP address[...]

  • Página 27

    Description Field the assigned IP addresses before the IP addresses change. Refresh Refresh the page. Close Close the page. Click MAC-based Assignment in the DHCP Server Setup page. The page shown in the following figure appears. In this page, you can assign the IP addresses on the LAN to the specific individual PC s based on their M AC address. Th[...]

  • Página 28

    3.5.1 Basic Settings Choose WLAN > Basic Settings. The page s hown in the following figure appears . In this page, you can configure the parameters for wireless LAN clients that may connect to your access point. The following table describes the parameters and buttons of this page. Field Description Disable W ireless LAN Interface By default, th[...]

  • Página 29

    The following table describes the parameters and buttons of this page. Field Description V ap SSID The service set identification (SSID) is a unique name to identify the router i n the wireless LAN Auth T y pe Y ou can choose Open System , Shared Key , or Auto . If you selec t Open System , you can If you select Shared Key , you can If you select A[...]

  • Página 30

    The following table describes the parameters and buttons of this page. Field Description SSID T y pe Select the SSID. Encryption Y ou can choose None , WEP , W P A (TKIP) , WP A2 (AES), or W P A2 Mixed . W ire d equivalent privacy (WEP) entrypts data frames be fore transmitting over the wireless network. W i-Fi protected ac cess (WP E) is a subset [...]

  • Página 31

    The following table describes the parameters and buttons of this page. Field Description SSID TYPE Select the SSID. Key Length Select 64-bit or 128-bit to use data encryption. Key Format If you choose 64-bit , you can choose ASCII (5 characters) or Hex (10 characters). If you choose 128-bit , y ou can choose ASCII (13 characters) or Hex (26 charact[...]

  • Página 32

    The following table describes the parameters of this page. Field Description Fragment Threshold This is the maximum data fragment size (between 256 and 2346bytes) that can be sent in the wireless network before the router fragments the packet into smaller data frames. R TS Threshold Request to send (R TS) is designed to prevent col lisions due to h[...]

  • Página 33

    The following table describes the parameters and buttons of this page. Field Description Select Access Control Mode Y ou can choose Disable , Allow Listed , or Deny Listed . Select Allow Listed , only the clients whose MAC address is l isted can access the router . Select Deny Listed , the clients whose MAC address is liste d are denied to access t[...]

  • Página 34

    The following table describes the fields of this screen. Label Description Enable WDS Select it to enable the WDS function. Otherwis e, you can not configure the settings of this page. MAC Addr Enter the MAC address (in XX-XX-XX-XX-XX-XX for mat) of the AP . Comment Enter the comment to describe the AP of the MAC addr ess. Apply Change Click it to [...]

  • Página 35

    The following table describes the parameters of this page. Field Description Current A TM VC T able This table shows the existed PVCs. It shows the Interface name, channel mode, VPI/VCI, encapsulation mode, local IP address, remote IP address and other information. The maximum item of this table is eight. Click it, the IP Interface-Modify page appe[...]

  • Página 36

    Field Description If select Use DHCP , the router is a DHCP client, the W AN IP address is assigned by the remote DHCP server . Local IP Address It is the IP addr ess of W AN inte rface which is provided by your ISP . Remote IP Address This is the gateway IP address which is provided by your ISP . Subnet Mask It is the subnet mask of the local IP a[...]

  • Página 37

    The following table describes the parameters and buttons of this page. Field Description 3.6.2 ADSL Settings Choose W AN > ADSL Settings . The page shown in the following figure appears. In this pae, you can select the DSL modulation. Mostly , you ne ed to remain this factory default settings. The router supports these modulations: G .lite , G .[...]

  • Página 38

    3.7 Advance In the navigation bar , choose Advance. The Advance page that is displayed contains DNS , Fir ewall , Virtual Server , Routing , IP QOS, Anti-DOs , Port Mapping , and Other . 3.7.1 DNS Choose Advance > DNS. The DNS page that is displayed contains DNS Server and DDNS . 3.7.1.1 DNS Server Choose DNS Server in the left pane. The page sh[...]

  • Página 39

    The following table describes the parameters and buttons of this page. Field Description Obtain DNS Automatically Select it, the router accepts the first received DNS assignment from one of the PPPoA, PPPoE or MER enabled PVC(s) during the connection establishment. Set DNS Manually Select it, enter the primary and optional secondar y DNS server IP [...]

  • Página 40

    3.7.2 Firewall Choose Adv ance > Firewall . The Firewa ll page that i s displayed contains IP/Port Fileter , MAC Filter , and URL Blocking . 3.7.2.1 IP/Port Filter Choose IP/Port Filter in the left pane. The page shown in the following figure appears. Entries in this table are used to restrict certain types of data packets through the gateway . [...]

  • Página 41

    Field Description 3.7.2.2 MAC Filter Choose MAC Filter in th e left pane. The page shown in the following figure appears. Entries in this table are used to restri ct certain types of da ta packets from your l ocal network to Internet through the gateway . These fi lters are helpful in securing or restricting your local network. Click Apply Changes [...]

  • Página 42

    Field Description 3.7.2.3 URL Blocking Choose URL Blocking in the left pane. The pa ge shown in the following f igure appears. This page is used to block a fully qualified do main name (FQDN), such as tw .yahoo.comand and filtered keyword. Y ou can add or delete FQDN and filtered keyword. The following table describes the parameters and buttons of [...]

  • Página 43

    Click Add to add a virtual server . The page shown in the following figure appears. The following table describes the parameters and buttons of this page. Field Description 3.7.3.2 DMZ Settings Choose DMZ Settings in the left pane. The page shown in the fo llowing figure appears. A demilitarized z one is used to provide In ternet services without s[...]

  • Página 44

    3.7.4 Routing Choose Advance > Routing . The page shown in th e following figure appears. The page that is di splayed contains S tatic Route and RIP . 3.7.4.1 Static Route Choose S tatic Route in the left pane. The page shown in the following figure appears. In this page, yo u can configure the routing information. Y ou can add or delete IP rout[...]

  • Página 45

    3.7.4.2 RIP Choose RIP in the left pane. The page shown in the following figure appears. If you are using this device as a RIP-enabled router to communicate wi th others who is using the Routing Information Protocol (RIP), enable the RIP . This page is used to select the interfaces on your devices that use RIP , and the version of the protocol used[...]

  • Página 46

    3.7.5 IP QoS Choose Advance > IP QOS . The page shown in the following figure appears. Entries i n this table are used to assign the precedence for each incoming packet based on physical LAN port, TCP/UDP port number , and source/destination IP address/subnet masks. Click Add Rule , the page shown in the following figure appears. The following t[...]

  • Página 47

    3.7.6 Anti-dos Choose Advance > Anti-Dos . The page shown in the following figure appears. Denial-of-service attack (DoS Attack) is a type o f attack on a network that is designed to bring the network to its knees by flooding it with us eless traffic. In this page, you can prevent DoS attacks. Click Apply Changes to save the settings of this pag[...]

  • Página 48

    3.7.8 Other Choose Advance > Other . In the Other page that is displayed contains IGMP Proxy , UPNP , Bridge , and IP PassThrough . 3.7.8.1 IGMP Proxy Choose IGMP Proxy in the left pane. The page shown in t he following figure appears. IGMP proxy enables t he system to issue IGMP host messages on behalf of hosts that the system discovered throug[...]

  • Página 49

    Click Apply Changes to save the settings of this page. 3.7.8.2 UPNP Choose UPNP in the left pane. The page shown in the following figure appears. This page is used to configure UPnP . The system acts as a daemon after you enable it. Click Apply Changes to save the settings of this page. 3.7.8.3 Bridge Choose Bridge in the left pane. The page shown [...]

  • Página 50

    The following table describes the parameters and buttons of this page. Field Description Click Show MACs . The page shown in the following fi gure appears. This t able shows a list of learned MAC addresses for this bridge. 3.7.8.4 IP PassThrough Choose IP Pass Through in the lef t pane. The pa ge sh own in the f ollowing f igure appears. IP pas sth[...]

  • Página 51

    3.8 Admin In the navigation bar , choose Admin . The Admin page that i s displayed contains Remote Access , Commit/Reboot , Password , Backup/Restore , Upgrade Fir eware , Time Zone , System Log , SNMP , TR069 , ACL , and Logout . 3.8.1 Remote Access Choose Admin > Remote Access . The page shown in the following fig ure appears. Y ou can enable [...]

  • Página 52

    The following table describes the parameters of this page. Field Description reset to default settings Select it to reset the router to the default settings. commit current settings Select it to save the current settings and reboot the router . Reboot Reboot the router . 3.8.3 Password Choose Admin > Password . The page shown in the following fi[...]

  • Página 53

    Field Description user . New Password Enter the password to which you want to change the old password. Confirmed Password Enter the new password again. 3.8.4 Backup/Restore Choose Admin > Backup/Restore . The p age shown in the following figure appears. In t his page, you can backup the current settings to a file and restore the settings from th[...]

  • Página 54

    The following table describes the parameters and buttons of this page. Field Description Select File Click Browse to select the firmware file. Upload Select the firmware file and click Upload to begin upgrading the firmware. Reset Click it to begin selecting the firmware file. 3.8.6 Time Zone Choose Admin > Time Zone . The page shown in the foll[...]

  • Página 55

    Refresh Refresh the system shown in the page. T ime Mode Y ou can choose Time Server or Manual . Select Time Server , the router gets the system time from the time serve r . Select Manual , you should configure the system time manually . Enable SNTP Client Update Select it, you can choose the correct SNTP server which you want. SNTP Server Choose t[...]

  • Página 56

    The following table describes the parameters and buttons of this page. Field Description T rap IP Address Enter the IP address of trap IP . The trap information is sent to the host. Community name (read-only) The network administrators must use this password to read the information of this router . Community name (write-only) The network administra[...]

  • Página 57

    The following table describes the parameters and buttons of this page. Field Description 3.8.10 ACL Choose Admin > ACL . The page shown in the following figure appears . In this page, you can configure the IP address in the access control list. If A CL i s enabled, only the effective IP adresses i n ACL can access the ADSL router . 54 [...]

  • Página 58

    Step 1 Select Enable and click take effect . Step 2 Configure the ACL. Step 3 Click take effect to take the configuration effect. I Note: If you select Enable in ACL Capability , en sure that your host IP address is in ACL list before it t akes effect. 3.9 Diagnostic In the navigation bar , choose Diagnostic . The Diagnostic page t hat is displayed[...]

  • Página 59

    Field Description Host Address Enter the IP a ddress. Go ! Click it to begin to Ping the host address. 3.9.2 ATM Loopback Choose Diagnostic > A TM Loopback . T he page shown i n the following figure appear s. I n this page, you can use VCC loopback function to check the connectivity of the VCC. 3.9.3 ADSL Choose Diagnostic > ADSL . The page s[...]

  • Página 60

    57  3.9.4 Diagnostic Choose Diagnostic . The page shown in the following figure appears. In this page, you can test the DSL connection. Click Run Diagnostic T est to begin testing.[...]

  • Página 61

    Appendix A Questions & Answers This section describes common problems you may enco unter and possib le solutions to them. Th e Barricade can be easily monitored through panel indicators to identify problems. 1. Question: Why all LED indicators are off? Answer: Check the connection between the power adaptor and the power socket Check the power s[...]

  • Página 62

    Click start -> run (input ping demands)-> Ping 192.168.2.1 (MODEM IP address). If cannot reach the modem, please check following configuration: The type of the network cable The connection between the modem and computer Y ou computer ’ s TCP/IP configuration 6. Question: How to load the default setting after incorr ect configuration? Answer[...]

  • Página 63

    Appendix B Technical Specifications External Connectors 1 push power switch 1 DC power jack 1 factory reset button 4 LAN 10/100M Auto MDI/MDIX RJ45 ports 1 W AN RJ1 1 DSL port Pr otocol Featur e Bridging/Routing RFC 1483 Bridge IEEE 802.1D transparent bridging Bridge Filtering RFC 1483 Router RIP 1 & 2 supported DHCP (RFC1541) Server, Relay Net[...]

  • Página 64

    Ethernet Featur e Fully compliant with IEEE802.3/802.3u auto-negotiation function Support 10base-T , 100base-TX Support half duplex, full duplex Support back pressure flow control for half duplex, IEEE802.3x flow control for full duplex Support MDI/MDIX auto cross Management Support Support WEB/TFTP mode which use as native and long-distance editio[...]

  • Página 65

    Appendix C GPL Anouncement GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software [...]

  • Página 66

    The precise terms and conditions for copying, distribution and modification follow. GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public[...]

  • Página 67

    These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same[...]

  • Página 68

    this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are no[...]

  • Página 69

    9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of[...]

  • Página 70

    REPAIR OR CORRECTION. 12. IN NO EVENT UNL ESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN Y OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT TED ABOVE, BE LIABLE TO Y OU FOR DAMAGES, INCLUDING ANY GENERAL, SP ECIAL, INCIDENTAL OR CONSE QUENTIAL DAMAGES ARISING OUT OF THE USE OR I NABILITY [...]

  • Página 71

    68  The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you wo[...]

  • Página 72

    SMC7904WBR A4[...]