17
INSTRUCCIONES DE SEGURIDAD IMPORTANTES
LAN inalámbrico
(VWHWHOHYLVRUKDUHFLELGRODVVLJXLHQWHVFHUWLğFDFLRQHV
:L)L&(57,),('ŗSURJUDPDGHFHUWLğFDFLöQGHOD:L)L$OOLDQFH
®
:L)L3URWHFWHG6HWXSŗSURJUDPDGHFHUWLğFDFLöQGHOD:L)L$OOLDQFH
®
)&&
(VWHGLVSRVLWLYRFXPSOHFRQHO$SDUWDGRGHODV1RUPDV)&&6XIXQFLRQDPLHQWRHVWÀVXMHWRDODVGRVFRQGLFLRQHV
VLJXLHQWHV
(VWHGLVSRVLWLYRQRGHEHUÀFDXVDULQWHUIHUHQFLDVSHUMXGLFLDOHV\GHEHUÀDFHSWDUFXDOTXLHULQWHUIHUHQFLDTXH
UHFLEDLQFOX\HQGRLQWHUIHUHQFLDVTXHSXHGDQFDXVDUXQIXQFLRQDPLHQWRQRGHVHDGR&XDOTXLHUFDPELRRPRGLğFDFLöQ
QRDSUREDGRH[SUHVDPHQWHSRUODSDUWHUHVSRQVDEOHGHODFRQIRUPLGDGSRGUâDDQXODUODDXWRUL]DFLöQGHOXVXDULRSDUD
XWLOL]DUHOHTXLSR3DUDFXPSOLUFRQORVUHTXLVLWRVGHH[SRVLFLöQDUDGLRIUHFXHQFLDVGHOD)&&HVWHGLVSRVLWLYR\VX
DQWHQDQRGHEHQFRORFDUVHQLIXQFLRQDUHQFRQMXQFLöQFRQQLQJXQDRWUDDQWHQDRWUDQVPLVRU
(OGLVSRVLWLYRSDUDODEDQGDGH0+]HVVöORSDUDXVRHQLQWHULRUHVSDUDUHGXFLUODSRVLELOLGDGGH
LQWHUIHUHQFLDVFRFDQDOGDòLQDVHQORVVLVWHPDVPöYLOHVSRUVDWÒOLWH
/DPÀ[LPDJDQDQFLDGHDQWHQDSHUPLWLGDSDUDGLVSRVLWLYRVHQODVEDQGDV0+]\0+]GHEHUÀ
FXPSOLUFRQHOOâPLWHHLUS\ORVUDGDUHVGHDOWDSRWHQFLDVHDVLJQDQFRPRXVXDULRVSULPDULRVORTXHTXLHUHGHFLUTXH
WLHQHQSULRULGDGGHODVEDQGDV0+]\0+]\HVWRVUDGDUHVSRGUâDQFDXVDULQWHUIHUHQFLDV\R
GDòDUORVGLVSRVLWLYRV/(/$1
,)(7(/
(VWHHTXLSRRSHUDDWLWXORVHFXQGDULRFRQVHFXHQWHPHQWHGHEHDFHSWDULQWHUIHUHQFLDVSHUMXGLFLDOHVLQFOX\HQGR
HTXLSRVGHODPLVPDFODVH\SXHGHQRFDXVDULQWHUIHUHQFLDVDVLVWHPDVRSHUDQGRDWLWXORSULPDULR
&217,(1(02'8/275$160,625,)(7(/,'5&36+'+
0DUFD6+$53
0RGHOR'+8%63