ZyXEL Communications IPC-3605N manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications IPC-3605N, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications IPC-3605N one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications IPC-3605N. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications IPC-3605N should contain:
- informations concerning technical data of ZyXEL Communications IPC-3605N
- name of the manufacturer and a year of construction of the ZyXEL Communications IPC-3605N item
- rules of operation, control and maintenance of the ZyXEL Communications IPC-3605N item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications IPC-3605N alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications IPC-3605N, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications IPC-3605N.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications IPC-3605N item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    IPC-3605N The First Consumer-Friendly Network Camera Edition 1.11, 11/2012 www .zyxel.com Copyrigh t © 201 1 ZyXEL Communica tions Cor poration[...]

  • Page 2

    [...]

  • Page 3

    1 Contents 2  Getting to know your IPC-3605N ............................................................................... 6  2.1  Package Contents .............................................................................................. 6  2.2  Features .........................................................................[...]

  • Page 4

    Important Notices Regulatory Notice This device complies with Part 15 of the FCC Rules. Operation is subject to the following two cond itions: (1) This device m ay not cause harm ful interference , and (2) This device must acce pt any interference received, including interfe rence th at may cause undesired operation. FCC Interference Statement This[...]

  • Page 5

    About This Manual This manual is inde nted only for users of the ZyXEL IPC-3 60 5 N netw ork camera. Conventions in this Manual While using this manual, pay attention to symbols and notations used to draw attention to special situations, su ch as: Caution! Information provided with this symbol is critical to prevent dam age to the product or injury[...]

  • Page 6

    2 Getting to know your IPC-3605N 2.1 Package Contents Before setup, ensure your package contains all contents. If anything is missing, contact your distributor. Number Contents IPC-3605N Network Camera Ethernet Cable Power Adapter Quick Installation Guide Install Disk Mounting Screw x3/ Screw Mount x3 USB Wireless Adapter[...]

  • Page 7

    2.2 Features ZyXEL’s IPC-3605N is an easy to inst all product with support for H.264/MPEG- 4/MJPEG video compression formats to help ensure high quality video with reduced bandwidth consumption.  Small and smart functional design  2 megapixel/HD resolution  Dual H.264, MJPEG, or MPEG-4 video streams  Active bandwidth management  Ne[...]

  • Page 8

    2.3 Camera Layout Number Contents Light Sensor Lens IR LEDs x6 (inside) USB Wireless Adapter Connector Audio Input Reset Button MicroSD Card Slot (on side) Microphone LED status indicator Speaker Focus adjustment ring Microphone input Power adapter port Composite video jack Ethernet port I/O (2 in/1 out) & RJ-485 connecto r[...]

  • Page 9

    2.4 LED Status Indicator The LED status indicator consists of one red and one blue LED. Depending on the camera’s status, the LEDs will app ear as follows: Red IR LEDs (Left), Blue Status LED (Right) When the IP camera is turned on, the LED s will light in th e following patterns: Red LEDs Blue LED Indication On On System booting Off On Successfu[...]

  • Page 10

    2.5 Digital I/O Connector Block The I/O connector on the back of the cam era provides a central interface between your home security system and various input devices. The two digital inputs are normally used with security sensors. They work by detecting a change in the state of an open or closed circu it. You can check the status of the circuit in [...]

  • Page 11

    3 Installation 3.1 Connecting your IPC-3605N The picture below illustrates the basi c connection of your IPC-3605N camera: The following table describes the nu mbered item s: Number Contents Ethernet cable from PC to hub/router. Ethernet cable from router to camera . Use the bundled Ethernet cable to connect the LAN port of the IP camer a to the LA[...]

  • Page 12

    3.2 Wireless While using the ZyXEL Wireless adapter, you’ ll be able to connect your camera to your network via WiFi. Keep in mind that you can only have one active connection at any given time – either through LAN or a wireless network. Note: If the wireless connection drops or seems slow, try m oving your IP camera closer to the wireless acce[...]

  • Page 13

    3.3 Wall and Ceiling Mounting In order to mount the camera on the wa ll or ceiling, use the included screws to fix the bracket to a flat surface. Af ter the camera has been affixed, adjust the camera to the required viewing angle. Follow the steps below to mount your camera: Step 1: Detach the metal mounting plate from the base of the camera by ins[...]

  • Page 14

    3.4 Dismounting the Camera The following instructions will deta il how to remove the camera from a mounted surface. A flat head and Philli ps screwdriver will be required. Step 1: Remove the came ra from the metal mounting plate by inserting a flat head screw driver into the rectangular hole on the wide end of the plastic base, and pushing downward[...]

  • Page 15

    3.5 Disassemble/Assemble the camera stand The camera comes at tached to its stand when delivered from ZyXEL. If you need to detach or reattach the stand, follow the diagrams below. To reattach the camera stand:[...]

  • Page 16

    4 Initial Setup Before running the setup utility, make sure you have the IP Camera properly connected. To begin setup, insert the installation CD supplied with the camera into the CD-ROM drive of the viewing PC, and the eaZy Wizard utility will s tart and guide you during the installation process of th e hardware and software for your IP camera. 4.[...]

  • Page 17

    Accessing your camera Your camera’s video feeds can be accesse d in a number of ways, as follows. 1) Your camera is CloudEnabled™ and can be viewed from any PC running a modern web browser with the Flash plug- in installed. When you first setup your camera using the included CD, it will r egister your camera with iSecurity +. Simply point your [...]

  • Page 18

    4.2 CloudEnabled™ Viewing 4.2.1 Accessing via iSecurity+ Smartphone App iSecurity+ is an iOS/Androi d App designed to allow you to quickly and easily access, control, and view your camera’s video feeds from anywhere. The iSecurity+ can be located on the App St ore and Android Market from your device by searching “iSecurity+,” or directly fr[...]

  • Page 19

    This page allows you to easily adjust your cam era’s time zone, display and audio settings, and infrared lighting. Sharing options can be accessed from the Sharing tab at the top of the screen.[...]

  • Page 20

    4.3 Direct Viewing of your Ca mera (For Advanced Users) 4.3.1 Accessing via PC web browser Users can access their video feeds and camer a m anagement tools easily through any web browser. Simply follow these steps. 1) Open any web browser (Internet Expl orer, Safari, Firefox, Chrome, etc.) 2) Type in your camera’s IP address (eg. 192.168.1.11. Th[...]

  • Page 21

    7) You’re now ready to view and manage your camera from your web browser. Note: If your IP camera falls behind a firewall, you will need to enable ports 80 and 554 in your firewall and link them to the internal IP address of the camera. Should you have more than one, increase the values above by 1 (For example, the second camera would have ports [...]

  • Page 22

    The following table describes the labels found on this screen. Number Label Description Left control panel provides co ntrol over video recording, voice communication, I/O, and snapshot Video stream Allows you to change between stream-1 and stream-2. (Stream 2 can be enabled and configured in [Settings] > [Video] Video mode selection Allows you [...]

  • Page 23

    4.3.1.2 Icons The following table describes th e icons found on this screen. Icon Label Description Fit to browser Resizes the live vi deo pane to fit your browser window Actual size Resizes the live vi deo pane to the original size Brightness Adjusts the camera’s brightness. Microphone Volume Adjust microphone volume. Click the icon to m ute the[...]

  • Page 24

    With the device configured, clicking the will allow you to speak throug h your microphone and be heard from the cam era for 90 seconds. Note: When using the voice communication f eature, you may experience various degrees of delay between transmission fr om the com puter and playback on the camera, depending on the condition of your network environ[...]

  • Page 25

    2) For stream-2, set the cod ec to “Motion JPEG.” 3) Launch the web browser on your iPhone, Andr oid phone, or other mobile internet device, and enter [IP address]/mjpeg.html into the address field of your phone’s web browser to watch live vi deo on your mobile device. (Note: The IP required IP address is located at the bottom of the page, ju[...]

  • Page 26

    4.3.3 Accessing via 3GPP Mobile Phone You can access your IP camera via 3GPP-co mpatible mobile phones provided your camera has a stable internet connection, and your mobile devices has a stable connection to the 3G network. There are also several steps which must be taken to ensure 3GPP functionality. 1) The second video stream (locat ed at [Setup[...]

  • Page 27

    5 Configuration 5.1 Video Settings The Video Settings screen consists of all the basic settings options. To access the main setup page, click on the setup button at the top right in the live view screen. You can configure detailed settings of your IP camera here. The following table describes the labels found on this screen. Label Description Turbo[...]

  • Page 28

    Framerate Framerate. 5~30 FPS. Higher framerate is more bandwidth-intensive. Quality Video quality settings. 64kpbs~3Mbps. Active Bandwidth Management Allows the IPC-3605N to intelligently change video bitrate depending on network congestion. This avoids video deterioration and frame dropping. Video Preference Allows you to c hoose between a prefer[...]

  • Page 29

    The following table describes the labels found on this screen. Label Description Video Properties Brightness Set image brightness (1~100) Sharpness Set image sharpness (1~8) Saturation Set image saturation (1~ 10) White Balance Set image’s white balance to com pensate for different lighting conditions. Flickerless Sets Flickerless mode. 50(defaul[...]

  • Page 30

    5.3 Audio Settings The Audio Settings screen allows you to en able or disable audio, as well as adjust volume. Stream-2 audio is only available fo r adjustm ent when it is selected and 3GPP mode has been checked in video settings. To access the Audio Settings screen, go to set tings, then select Audio from the sidebar. The following screen will app[...]

  • Page 31

    To access the user settings pane, navigate to Se ttings, then select Users fro m the sidebar. The following screen will appear. The following table describes the la bels found within this screen. Label Description Modify/Remove Click here to Modify or Remove an existing viewer Add Click here to add a new viewer or administrator Allow anonymous view[...]

  • Page 32

    5.5 Network Settings The Network Settings page allows you to check your network settings and make detailed adjustments. To access the Network Settings pane, navigate to settings and select Netw ork from the sidebar. The following screen will appear. 5.5.1 Ethernet Settings The Ethernet Settings page will allow you to choose your IP address conf igu[...]

  • Page 33

    On this page, you can set the camera to obt ain an IP address via DHCP (recommended), use a manual IP address, or obtain an IP a ddress via PPPoE, for which a valid user name and password are required. 5.5.2 Wireless Settings If you have installed the ZyXEL wireless adap ter, you’ll be able to set up a wireless connection from this page. To conne[...]

  • Page 34

    5.5.3 Network Diagnostic Here you can run the diagnostic tool for your current network settings, and it will show error messages if any anomaly is detected. For further information on error m essages, please refer to the troubleshooting section. 5.5.4 Network Bandwidth This automatic network connection test helps users better define the appropriate[...]

  • Page 35

    This message indicates that the currently c onnected network has the capacity to support up to 10 network cameras of identical bit rate settings (either on Stream 1 or Stream 2). If the message shows a less favorable result, go to [Setup] > [Video] to select a lower bitrate. 5.5.5 Advanced This page allows you to adjust advanced ne twork setting[...]

  • Page 36

    The following table describes th e labels on this screen. Label Description DNS Server Set the DNS server to be found via DHCP, or enter a manual DNS address NTP Configuration NTP stands for Network Time Prot ocol. To synchronize your camera’s clock with an NTP server, choose to either obtain an NTP server address via DHCP, or use an external NTP[...]

  • Page 37

    To access the UPnP screen, navigate to [S ettings] > [Network] > [UPnP]. The following screen will appear. Note: To enable UPnP on Windows, go to Add or Remove Programs in Control Panel, then click Add/Re move Windows Components, double-click “Network Services,” and ch eck “UPnP User Interface.” 5.5.8 RTP If you want to broadcast vide[...]

  • Page 38

    represents highest priority is 46. The defau lt DSCP value is 0, which indicates normal priority (no QoS). The following is a table of recommended DS CP values. The drop precedence indicates the order in which IP packet s will be dropped when the ne twork is congested. Packets with a higher drop precedence will be dropped fi rst. Each class in the [...]

  • Page 39

    The following table describes the labels found in this screen. Label Description SMTP Server Enter SMTP server information in this field (ie. smtp.gmail.com) SMTP Port Enter your SMTP server’s port information From Address Enter your full e-mail address (ie. xxxx@xx.com ) To Address Enter the full e-mail address you wish to receive notifications.[...]

  • Page 40

    The following table describes the la bels found within this screen. Label Description FTP Address Enter the addr ess of your FTP server FTP Port Enter the port of your FTP server User Name Enter your user name here Password Enter your Password here Upload Path Enter the file path of the folder where you want snapshots to be stored. Save Save settin[...]

  • Page 41

    The HTTP Server page allows you to set your camera to input the URL of an HTTP server used by an NVR in order to signal your NVR that there’s an event being triggered. To access this page, navigate to [Setup] > [Event Setup] > [Eve nt Server Setup] > [HTTP]. The following screen will appear. 5.6.1.6 SMS Server Your IP camera is capable o[...]

  • Page 42

    Clear Clear settings Cancel Cancel After you input your settings, click [Nex t]. The following page will appear. This page allows you to input the message that will be sent when an event is triggered. Enter your message, then click [Next] . The following screen will appear. This page will allow you to test your camera’ s SMS functionality. To sen[...]

  • Page 43

    To create an event trigger, click the [Creat e] button. The following screen will appear. The following table describes th e fields in this screen. Field Des criptio n Event Trigger Set the trigger for this event. Trigg ers can be based on schedule, I/O port activity, or audio detection. Schedule If you wish to schedule an event, input the time and[...]

  • Page 44

    Select the actions to be taken, then click [ Finish] to complete trigger se tup. 5.6.3 Motion Detection Motion Detection allows you to define up to th ree regions that will trigger an event if motion is detected. Select a region, sensitivity le vel (S1: Lowest ~ S5: Highest ) from the dropdown list, and then click and drag on the video display to d[...]

  • Page 45

    5.7 Recording Setup The IPC-3605N supports storage of both snapshot s and video clips to local storage. To configure this function, navigate to [Setup] > [Recording Setup]. The following screen will appear. This page allows you to view your SD Card ’s status, capacity, and gives you the option of formatting the card, as well as enabling record[...]

  • Page 46

    Note:  This camera uses a First In, First Out storage method. W hen the SD card is full, the oldest files will be au tom atically rewritten.  If you want to record video clips of detected motion to the SD card, you’ll need to set a motion detection re gion before setting up event-based recording. 5.8 Recording Hi story The Recording History[...]

  • Page 47

    5.10 Multi-Camera This page allows you to add, modify, or delete additional IP cam eras on your camera list. To access this page, navigate to [Setup] > [Multi-Cam era]. The following screen will appear. To add a camera, click [Add] . The following screen will appear. The following table describes the la bels found within this screen.[...]

  • Page 48

    Camera The # by which this camera will be identified IP Address Enter the camera’s IP address he re User Name Enter the username used to access th e new camera in this field Password Enter the password used to access the new camera in this field RTSP Port Enter the camera ’s RTSP port (default 554) HTTP Port Enter the camera’s HTTP port (defa[...]

  • Page 49

    6 Event Viewer The Event Viewer allows you to view detailed logs of events which have been triggered. To access this page, navigate to [Setup], then select [Event Viewer] from the top panel. Select any type of event from the sidebar (Motion, I/O, Scheduled Triggers, or Audio Detection) to view that type ’s history, or click on image links to view[...]

  • Page 50

    7 Maintenance The Maintenance screen provides information about your IP camera, access to the h istory log, and system maintenance functions. 7.1 Informatio n To access the Maintenance Inform ation screen, navigate to [Setup], then select [Maintenance] from the top panel. The following screen will appear. 7.2 Log This page provides a system log for[...]

  • Page 51

    7.3.1 Reboot Camera Press the [Reboot] button to reboot your camera. 7.3.2 Profile Management Profile Management allows users to easily set up multiple c ameras. After one camera is properly configured, users can export that came ra’s configuration to a profile on their PC, which can then be loaded onto other cameras. Th is feature also serves as[...]

  • Page 52

    7.3.3 Firmware Update Firmware updates are available at us.zyxe l.com/support. After downloading the latest firmware for your camera, click the [Browse] button to locate the firmware file on your hard drive, then click the [Upgrade] button to update the cam era’s firmware. Once the upgrade process begins, it must not be inte rrupted or you risk p[...]

  • Page 53

    8 Troubleshooting During the course of insta llation, you might encounter va rious issues. The following section contains some troubleshooting proce dures to help you so lve these problems. 8.1 Reconfiguring Your Device Anytime you need to re-configure your IP camera, you can simply double-click on the eaZy Wizard icon to launch the eaZ y Wi zard c[...]

  • Page 54

    8.3 Resetting to Factory Defaults If you’ve forgotten your password, or your cam era’s been acting ge nerally strange, you can follow the steps below to reset the camera to its default settings. To reset the cam era: 1) Press and hold the reset button (locat ed on the camera’s rear panel) for approximately 10 seconds. When successf ul, you sh[...]

  • Page 55

    8.4 Trouble with Active X After launching your browser and entering your camera’s IP address, you’ll be asked for the username and password combination (D efault is admin/admin, case sensitive.) No User Interface in the Brows er This issue could have three possible causes. 1) ActiveX was not installed. Follow the instructions on-screen to insta[...]

  • Page 56

    If you’ve gone through all above steps but still can’t obtain video/audio on your browser, close all browser windows and delete the ‘IPSurveillance Embedded” folder found in C:Program Files. (If using 64-bit windows, l ook in C:Program Files (x86)), then open your browser, log into your IP camera, and reinstall the ActiveX client. If your[...]

  • Page 57

    8.5 Trouble with Remot e Viewing on Browser You can view your camera’s video streams remo tely over the Internet. If you’re having trouble viewing video remotely, refer to th e section below for troubleshooting tips. The above figure depicts a typical setup in which:  The IP camera has a static virtual IP address of 192.168.0.1  The WAN I[...]

  • Page 58

    3) Enable port forwarding on your router and allow traffic on the ports the IP camera is using. You may need to consult the ma nufacturer of your router for setting details. Note: Your router may require a reboot after port forw arding is set. The following figure details the settings r equire d to remotely view the IP cam era. After taking the abo[...]

  • Page 59

    8.6 Symptoms, Causes, and Solutions Listed below are some common pr oblems, and their sol utions. Symptom Possible Cause/Solution Problems accessing from LAN network using web browser The entered IP address is incorrect. Make sure the IP address you entered matches the IP address of your ca mera. If you are certain that your camera is configured wi[...]

  • Page 60

    Symptom Possible Cause/Solution Scanning and connecting to wireless AP takes a long time Too many wireless APs nearby. The amount of time taken to scan wireless APs depends on the number of wireless APs around the camera. If there are too many wireless APs (30 or more), it may take as long as 3 minutes to complete the scanning process. A possible w[...]

  • Page 61

    Symptom Possible Cause/Solution Network diagnosis shows error icon Network connection error. The network connection test verifies that the camera has su cce ssfully connected to the LAN network. When the diagnosis result shows a red excla mation mark icon, it means that the camera fails to connect to the LAN network. Check if the LAN cable is secur[...]

  • Page 62

    Symptom Possible Cause/Solution Part of the image becomes pixilated/Image artifacts appear Network bandwidth is insufficient. Without sufficient bandwidth, video quality will deteriorate and image errors like pixilation or frame-drop may occur. When you view your camera remotely from the Internet, your camera needs sufficient upload bandwidth to tr[...]

  • Page 63

    Symptom Possible cause/solution A warning message appears stating “Your video quality is too high for your Internet bandwidth.” Network quality is not high enough. This means the camera’s browser interface, WebVUer, could not receive a steady strea m of video data from your camera. The loss of video data might also be caused by network conges[...]

  • Page 64

    9 Technical Specifications Category IPC-3605N Camera Image Sensor Lens  Focal Length: 4.0mm  Max Aperture Ratio: F1.5  Fixed Iris Focus Range 0.5m ~ INF Min imu m Illumination IR Mode: 0 lux with built in IR LEDs on (12 LEDs in total; effective distance up to 10m) Color m ode: 1.0 lux Shutter Tim e 1/5 ~ 1/16 000 Sec Video Video Compressio[...]

  • Page 65

    Category IPC-3605N Software NVR Station  Multiple channel management (32-channels)  Fast and intuitive camera setup  Search and playba ck record ings by eve n t types  Scheduled a nd event-base d managem ent  Smart motion and audio detection Web Browser Internet Explorer (ActiveX)  Remotely view and configure camera on Inte rnet E[...]

  • Page 66

    10 Open-Sourced Components 3 r d Party Software Version License Addgroup V1.13.4 Busybox, GPLv2 Adduser V1.13.4 Busybox, GPLv2 Ash V1.13.4 Busybox, GPLv2 AVN-IPv4LL V1.13.4 GPL Busybox V1.13.4 Busybox, GPLv2 Cat V1.13.4 Busybox, GPLv2 Chattr V1.13.4 Busybox, GPLv2 Chgrp V1.13.4 Busybox, GPLv2 Chmod V1.13.4 Busybox, GPLv2 Chown V1.13.4 Busybox, GPLv[...]

  • Page 67

    Iwlist V29 GPL Iwpriv V29 GPL Kill V1.13.4 Busybox, GPLv2 Ln V1.13.4 Busybox, GPLv2 Login V1.13.4 Busybox, GPLv2 Ls V1.13.4 Busybox, GPLv2 Lsattr V1.13.4 Busybox, GPLv2 Mini_httpd V1.19 GPL Mkdir V1.13.4 Busybox, GPLv2 Mkdosfs V2.11 GPL Mknod V1.13.4 Busybox, GPLv2 Mktemp V1.13.4 Busybox, GPLv2 More V1.13.4 Busybox, GPLv2 Mount V1.13.4 Busybox, GPL[...]

  • Page 68

    Libc-2.11.so V2.11 GPLv3 Libcrypt.so V2.11 GPLv3 Libcrypt.so.1 V2.11 GPLv3 Libcrypt-2.11.so V2.11 GPLv3 Libcrypto.so V0.98m GPL Libcrypto.so.0.9.8 V0.98m GPL Libdl.so V2.11 GPLv3 Libdl.so.2 V2.11 GPLv3 Libdl-2.11.so V2.11 GPLv3 Libgcc_s.so V4.4.0 GPLv3 Libgcc_s.so.1 V4.4.0 GPLv3 Libip4tc.a V1.4.10 GPL Libip4tc.la V1.4.10 GPL Libip6tc.a V1.4.10 GPL [...]

  • Page 69

    Libsockipc.so.1.2 V2.11 GPLv3 Libssl.so V0.98m GPL Libssl.so.0.9.8 V0.98m GPL Libstdc++.so V4.4.0 GPLv3 Libstdc++.so.6.0.11 V4.4.0 GPLv3 Libthread_db.so V4.4.0 GPLv3 Libthread_db.so.1 V2.11 GPLv3 Libthread_db-1.0.so V2.11 GPLv3 Libthreadutil.so V1.4.1 GPL Libthreadutil.so.2 V1.4.1 GPL Libthreadutil.so.2.0.2 V1.4.1 GPL Libupnp.so V1.4.1 GPL Libupnp.[...]

  • Page 70

    Pivot_root V1.13.4 Busybox, GPLv2 Poweroff V1.13.4 Busybox, GPLv2 Reboot V1.13.4 Busybox, GPLv2 Rmmod V1.13.4 Busybox, GPLv2 Route V1.13.4 Busybox, GPLv2 Runlevel V1.13.4 Busybox, GPLv2 Start-stop-daemon V1.13.4 Busybox, GPLv2 Sulogin V1.13.4 Busybox, GPLv2 Swapoff V1.13.4 Busybox, GPLv2 Swapon V1.13.4 Busybox, GPLv2 Switch_root V1.13.4 Busybox, GP[...]

  • Page 71

    gratis or for a fee, you must give the recipi ents all the rights that you have. Yo u must make sure t h at t hey, too, receive or can get the source c ode. And you m u st show them these terms so they know their ri ghts. We protect y our rights wi th two st eps: (1) copy right the software, a nd (2) offer you this license which gives you legal per[...]

  • Page 72

    Program, t he distribution of t he whole must be on the te rms of this Li cense, whose perm issions for othe r licensees extend to the entire whole, an d thus to each a nd every part regardl ess of who wrote it. Thus , it is not the intent o f this section to claim rights or con t est your rights to work written entirely by you; rather, the intent [...]

  • Page 73

    refrain entirel y from dist ribution of the Pro gram. If any po rtion of thi s section is held inval id or unenforceable under any part icular circumstance, the ba lance of the section is in tended to apply and the section as a whole is intended to appl y in other circum stances. It is not the purpose of t his section to ind uce you to infri nge an[...]

  • Page 74

    This product con tains ad dgroup, adduser, ash, busybox, cat, chattr, chgrp, chmod, ch own, cp, cttyhack, date, dd, del group, deluser , df, dmesg, ech o, egrep, false , fgrep, grep, gnuzip, gzip, h ostname, i p, ipaddr, iplink, iproute, kill, ln, login, ls, lsattr, mkdir, m knod, mktemp, more, mount, mount point, mv, netstat, ni ce, ping, ping 6, [...]

  • Page 75

    Also, for eac h distributo r's protecti on, we want to make certa in that ever yone underst ands that t here is no warranty for this free librar y. If th e library is modified by someone else and passed on, we wan t its recipients to know that what they have is not the origin al version, so that any problems introdu ced by others will not refl[...]

  • Page 76

    The "Library", below, refer s to any such software lib rary or wo rk which has been distribut ed under these terms. A "wor k based on the Library " means either the Li brary or any deri vative work unde r copyright l aw: that is to say, a work containing the Li brary or a po rtion of it , either verbat im or with modificati ons [...]

  • Page 77

    Thus, it is not the intent of this sectio n to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise th e right to control the distributi on of derivative o r collective works ba sed on the Library. In addition, mere aggreg ation of another work not ba sed on the Library with the Library (or with a w[...]

  • Page 78

    Otherwise, if the work is a derivativ e of the Library, you m ay distribute the object code for the work under the terms of Section 6. Any executabl es containing that work als o fall u nder Section 6, whethe r or not they are linked directly with the Library itself. 6. As an except ion to the Sections a bove, you m ay also compile or link a "[...]

  • Page 79

    8. You ma y not copy, m odify, subli cense, link wit h, or distri bute the Library ex cept as expressly p rovided under this Lice nse. Any attempt otherwise t o copy, modi fy, sublicense, link with, or distribut e the Library is void, and will automatically ter minate your rights under this Licen se. Ho wever, parties who have received copies, or r[...]

  • Page 80

    Each version is gi ven a distinguishin g version number. If t he Library specifies a version n umber of this License which applies to it and "any later version", you h ave the option of following the terms and conditions either of that version or of any later v e rsion published by the Free Software Foundation. If the Library does n ot sp[...]

  • Page 81

    License as published by the Free Software Foundation; either version 2 of the License, or (at your op tion) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WA RRANTY; witho ut even th e implied war r anty of MERCHANTABILI TY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Li[...]

  • Page 82

    This product contains ld-2.11.so , ld-lin ux.so.3, libc. so, libc.so .6, libc-2.11.so, libcryp t.so, libcryp t.so.1, libcrypt-2.11.so, libd l.so, libdl.so.2, libdl-2 .11.so, libgcc_s.so , libgcc_s.so.1, lib m.so, libm.so.6, libm- 2.11.so, li bnsl.so, li bnsl.so.1, libnsl-2.11 .so, libnss _dns.so, l ibnss_dns .so.2, li bnss_dns-2. 11.so, libnss_file[...]

  • Page 83

    domains, we st and ready to extend this provision t o those dom ains in future versions of the GPL, as nee ded to protect the freedom of users. Finally, every program is threatened constantly by so ftware patents . States shoul d not allow pat ents to restrict develo pment and use of softwa re on gene ral-purpose com puters, but in those that do, w[...]

  • Page 84

    The “System Libraries” of an executabl e work incl ude anything, other t han the work as a whol e, that (a) is included i n the norm al form of packaging a Major Component , but whi ch is not pa rt of that Major Compone nt, and (b ) serves on ly to enable use of the work with t hat Major C omponent, or to im plement a Standard Interface for whi[...]

  • Page 85

    4. Conveying V erbatim Copies. You may con vey verbatim copies of the Program' s source code as y ou receive it, in any medium , provided that you conspicuously an d appropriately publish on each copy an appropriate cop yright notice; keep in tact all notices stating that this License and a ny non-perm issive terms added i n accord with sectio[...]

  • Page 86

     c) Convey individual copies of the obj ect cod e with a copy of the written offer to provide the Correspondi ng Source. This a lternative is allowed only occasional ly and nonc ommercially, and only if yo u received the object code wi th su ch an offer, in accord with subsection 6b.  d) Convey the object code by of fering access from a desig[...]

  • Page 87

    7. Additional Terms. “Additional perm issions” are terms that supplement the terms of this License by making exceptions fro m one or more of its conditions. Additional permissions th at are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If a[...]

  • Page 88

    license, and (b) permanently, if the copyrigh t ho lder fails to notify you of t he violation by some reaso nable means prior to 60 days after the cessation. Moreover, your license from a particular copyr igh t holder is reinstated permanently if the copyrigh t ho lder notifies you of the violation by some reasonable means, this is the first time y[...]

  • Page 89

    Each contributor gr ants you a non-ex clusive, worldw id e, royalty-free patent license under the contributor' s essential pate nt claims, to m ake, use, sell, offer for sal e, import a nd otherwi se run, modi fy and propa gate the contents o f its contri butor versi on. In the following three paragra phs, a “patent licens e” is a ny expre[...]

  • Page 90

    part which is the covere d work, but the spec ial requ irements of the GNU Affero General Public License, section 13, concerning interaction thro ugh a network will apply to the combination as su ch. 14. Revised Versions of this License. The Free Soft ware Foundati on may publ ish revise d and/or new versions of the GNU Ge neral Public License from[...]

  • Page 91

    How to Apply These Terms to Your New Programs If you devel op a new pr ogram, and you want it t o be of the greatest possible use to the publ ic, the best wa y to achieve this is to make it free software which ev eryone can redistribute and change un der these term s. To do so, attach the following notices to t he program. It is safest to attach th[...]