Legend dome

Solo disponible en BuenasTareas
  • Páginas : 62 (15448 palabras )
  • Descarga(s) : 0
  • Publicado : 11 de marzo de 2012
Leer documento completo
Vista previa del texto
Legend

Installation Manual

Copyright

Copyright © 2006, GE Security Inc. All rights reserved. This document may not be copied or otherwise reproduced, in whole or in part, except as specifically permitted under US and international copyright law, without the prior written consent from GE. Document number: 1052026B (February 2006)

Disclaimer

THE INFORMATION IN THIS DOCUMENT ISSUBJECT TO CHANGE WITHOUT NOTICE. GE ASSUMES NO RESPONSIBILITY FOR INACCURACIES OR OMISSIONS AND SPECIFICALLY DISCLAIMS ANY LIABILITIES, LOSSES, OR RISKS, PERSONAL OR OTHERWISE, INCURRED AS A CONSEQUENCE, DIRECTLY OR INDIRECTLY, OF THE USE OR APPLICATION OF ANY OF THE CONTENTS OF THIS DOCUMENT. FOR THE LATEST DOCUMENTATION, CONTACT YOUR LOCAL SUPPLIER OR VISIT US ONLINE AT WWW.GESECURITY.COM. Thispublication may contain examples of screen captures and reports used in daily operations. Examples may include fictitious names of individuals and companies. Any similarity to names and addresses of actual businesses or persons is entirely coincidental.

Trademarks and patents

GE and the GE monogram are registered trademarks of General Electric. Legend product and logo are trademarks of GESecurity. Other trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products.

Software license agreement

GE software supplied with GE products is proprietary and furnished under license and can be used or copied only in accordance with the license terms. THE ENCLOSED PROGRAM IS FURNISHED SUBJECT TO THE TERMS AND CONDITIONSOF THIS AGREEMENT. RETENTION OF THE PROGRAM FOR MORE THAN 30 DAYS, OPENING OF THE SEALED WRAPPER, IF ANY, SURROUNDING THE PROGRAM, OR USE OF THE PROGRAM IN ANY MANNER WILL BE CONSIDERED ACCEPTANCE OF THE AGREEMENT TERMS. IF THESE TERMS ARE NOT ACCEPTABLE, RETURN THE UNUSED PROGRAM AND ANY ACCOMPANYING DOCUMENTATION TO GE FOR A FULL REFUND OF THE LICENSE FEE PAID. (FOR INFORMATION REGARDING THERETURN OF PROGRAMS ENCODED OR INCORPORATED WITHIN EQUIPMENT, CONTACT THE NEAREST GE SALES OFFICE.)

Intended use

Use this product only for the purpose it was designed for; refer to the data sheet and user documentation. For the latest product information, contact your local supplier or visit us online at www.gesecurity.com. This equipment has been tested and found to comply with the limits for aClass A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radiocommunications. Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.

FCC compliance

iii

Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Conventionsused in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v Safety terms and symbols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi

Chapter 1.

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....
tracking img