Solved

SuSE Linux 9.0 Pro and ANY modem...

Posted on 2003-11-26
4
440 Views
Last Modified: 2010-04-21
I recently loaded SuSE Linux 9.0 Pro on my machine, and the long and short of it is that NO MODEM will work with it.

I've set up the Earthlink account correctly; I setup KPPP correctly (both from my own knowledge and from the KPPP Help File); I utilized the setserial command and created symbolic links from /dev/ttyS0 to /dev/modem; I've done darn near everything that is obvious.  However, no matter what I do, when I go into KPPP and do a 'Modem Query', it will find the modem, and say "Modem Ready" but when it finishes querying the AT's, it brings up a box and displays....nothing.  Nothing on any of the AT lines.  This is the case for ANY modem.  I got this for 3 separate modems.  Once with a Win/Linmodem, once with an external Creative Modem Blaster Flash 56K (parallel connection), and once with a US Robotics 5610B controller based modem.  (This last modem had NO problems being setup under RH9.)

Can anyone help?
0
Comment
Question by:johnstaggs
4 Comments
 
LVL 24

Expert Comment

by:shivsa
Comment Utility

u can try to create devices one more time and see if it works.

cd dev; ./MAKEDEV -v ttyS0

MAKEDEV is a script to create devices.  It's located on redhat boxes at /dev/MAKEDEV and you can find more info with:
man 8 MAKEDEV(it should be on suse too.)
0
 
LVL 40

Accepted Solution

by:
jlevie earned 125 total points
Comment Utility
The first two modems you've tried seem a bit iffy to me as they are non-standard items. The US Robotics should work if the hardware is correctly detected. The first thing I'd suggest is that you disable the any on-board COM ports and that you see if your BIOS allows disabling on PnP mode. Frequently that's all that's necessary to get a controller based PCI modem to work. Then I'd suggest that you use 'dmesg' to see if the system detected the modem and what tty device has been allocated to it.
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
Comment Utility


No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Delete/No Refund
Please leave any comments here within the next four days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

khkremer
EE Cleanup Volunteer
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This article will explain how to establish a SSH connection to Ubuntu through the firewall and using a different port other then 22. I have set up a Ubuntu virtual machine in Virtualbox and I am running a Windows 7 workstation. From the Ubuntu vi…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now