I can’t receive e-mails from my Audemat monitoring equipment: how to configure the e-mail client?In most of the cases, SMTP servers filter outgoing e-mails to prevent spam. Generally, two filtering methods are combined:
- IP address filtering: service providers restrict access to the server to their customers (thanks to their IP address),
- Sender’s e-mail address filtering: service providers only accept outgoing mail with an address belonging to their domain (email@example.com).
According to the e-mail provider’s specifications, the unit must be correctly configured otherwise you won’t receive messages to your e-mail account. The configuration is done in the remote application, in the “SMTP mail client” section.
Note that the “Network” page must be correctly configured and particularly the “DNS” parameter if you want to use server names (ex: “smtp.yourisp.com”). Please refer to the user manual.
The most frequent configuration cases are described hereafter.
E-mail sending via the SMTP server supplied by your Internet Service Provider (ISP)
You must enter the SMTP server of your Internet Service Provider (in “SMTP server address” input box).
Then, enter the sender address (in “From address”) given by the internet service provider. Generally, you can personalize this parameter as only the domain is double checked (Ex: “firstname.lastname@example.org” or “email@example.com”).
Finally, enter the recipient email (just a valid email) in the “Mail dest” input box.
E-mail sending via an SMTP server using authentication
Some Internet Service Providers offer an e-mail account using SMTP authentication (with login and password).
First, enter the SMTP server address.
Then, enter sender’s address double checking that it is authorized on this server.
Choose “Yes” for the parameter “SMTP Authentication needed” and enter your login and password.
E-mail sending using your own SMTP server
You can also create your own SMTP server (there are even some freeware applications for that). In that case, it is convenient to use authentication to prevent spammer’s abuse. However, this requires important knowledge in networks and computing.
In that case, refer to the previous part to configure your unit.