Modem Commands

Posted on 2001-06-06
Last Modified: 2010-04-27
Hi all,

Does anybody know where I can get detailed documentation about modem commands and modem registers? I'm trying to setup my Courier V.Everything external modem and don't have a good reference to the commands.

I already looked on the US Robotics and 3COM sites to no avail...

Any references would be appreciated.

Question by:vorlon
LVL 32

Expert Comment

ID: 6160965
LVL 20

Accepted Solution

Dufo G. Belski earned 50 total points
ID: 6160978
Found these USR manuals.  Not your exact model but the commands don't vary much, if at all.

LVL 20

Expert Comment

by:Dufo G. Belski
ID: 6161003
There's a universal manual for all current USR 3com modems near the bottom of this page:

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.


Expert Comment

ID: 6162506
Vorlon, What OS are you using with your modem.  The 3com software is usually pretty good about setting up what you need through the use of GUIs.  If you want the info JHANCE was headed the right way but perhaps you should have been looking at another link on the same site.

jhance you probably meant to send this person to the basic commands.  I only corrected this, JHANCE had the original lead.


Expert Comment

ID: 6162783
Hi !

  Try to get hold of the book that comes with D-Link modems.It is an excellent source for all the commands and registers.

Author Comment

ID: 6164034
Thanks everyone... All answers were good...

jhance: your reference was good but incomplete for me; it did not provide the possible values to the parameters. For instance what are the possible values for n in
&Cn -- DCD Control
&Dn -- DTR Option
&Fn -- Recall Factory Profile

asyscokid: the acrobat files provided more than enough detail including the values for the parameters....

Again thanks all,

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now