Datasheet

INSYS Modem 56k UL Content
Juni 05 I
1 SCOPE OF DELIVERY ...................................................4
2 GENERAL ....................................................................4
3 INITIAL OPERATION....................................................5
3.1 IMPORTANT SAFETY INSTRUCTIONS !................................... 5
3.2 INSTALLATION OVERVIEW ........................................................... 5
3.3 INSTALLATION STEPS .................................................................. 6
4 CONFIGURATION........................................................ 7
4.1 CONFIGURATION SOFTWARE HSCOMM......................................... 7
4.1.1 HSComm Operation ........................................................................... 7
4.1.2 AT Commands For Settings ................................................................ 8
4.2 SERIAL INTERFACE...................................................................... 8
4.2.1 PC Settings.......................................................................................... 9
4.2.2 INSYS Modem Settings....................................................................... 9
4.2.3 Idle Connection Control ..................................................................... 9
4.2.4 AT Commands For The Serial Line .................................................... 10
4.3 TELEPHONE INTERFACE ............................................................. 10
4.3.1 Error Correction ................................................................................ 10
4.3.2 International Settings ...................................................................... 11
4.3.3 Dial Tone Detection.......................................................................... 11
4.3.4 Auto Answer Mode........................................................................... 11
4.3.5 AT Commands For The Telephone Line ............................................ 11
4.4 ACCESS PROTECTION................................................................ 12
4.4.1 Password Protection......................................................................... 12
4.4.2 Security Callback .............................................................................. 12
4.4.3 AT Commands For Access Protection ............................................... 13
4.5 CONTROL OUTPUT................................................................... 13