Netgear CBR40 User Manual - All MSOs - Page 37

My Mail Server requires authentication, Outgoing Mail Server Port Number

Page 37 highlights

Orbi WiFi System 6. In the Primary E-mail Address field, enter the email address to which logs and alerts are sent. This email address is also used for the From address. If this field is blank, log and alert messages are not sent. 7. In the Your Outgoing Mail Server field, enter the name of your ISP outgoing (SMTP) mail server (such as mail.myISP.com). You might be able to find this information in the configuration window of your email program. If you leave this field blank, log and alert messages are not sent. 8. In the Outgoing Mail Server Port Number field, enter your mail server's port number. You might be able to find this information in the configuration window of your email program. 9. If your outgoing email server requires authentication, select the My Mail Server requires authentication check box and do the following: • In the User Name field, type the user name for the outgoing email server. • In the Password field, type the password for the outgoing email server. 10. To send alerts immediately, select the Send Alerts Immediately check box. Email alerts are sent immediately when someone attempts to visit a blocked site. 11. To send logs based on a schedule, specify these settings: • From Send logs according to this schedule menu, select the schedule type. • From the Day menu, select the day. • From the Time menu, select the time, and select the am or pm radio button. 12. Click the Apply button. Your settings are saved. Logs are sent automatically. If the log fills before the specified time, it is sent. After the log is sent, it is cleared from the cable modem router memory. If the cable modem router cannot email the log and the log buffer fills, the cable modem router overwrites the log. Control Access to the Internet 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101

6.
In the
Primary E-mail Address
field, enter the email address to which logs and alerts are sent.
This email address is also used for the From address. If this field is blank, log and alert messages are
not sent.
7.
In the
Your Outgoing Mail Server
field, enter the name of your ISP outgoing (SMTP) mail server (such
as mail.myISP.com).
You might be able to find this information in the configuration window of your email program. If you leave
this field blank, log and alert messages are not sent.
8.
In the
Outgoing Mail Server Port Number
field, enter your mail server’s port number.
You might be able to find this information in the configuration window of your email program.
9.
If your outgoing email server requires authentication, select the
My Mail Server requires authentication
check box and do the following:
In the
User Name
field, type the user name for the outgoing email server.
In the
Password
field, type the password for the outgoing email server.
10.
To send alerts immediately, select the
Send Alerts Immediately
check box.
Email alerts are sent immediately when someone attempts to visit a blocked site.
11.
To send logs based on a schedule, specify these settings:
From
Send logs according to this schedule
menu, select the schedule type.
From the
Day
menu, select the day.
From the
Time
menu, select the time, and select the
am
or
pm
radio button.
12.
Click the
Apply
button.
Your settings are saved.
Logs are sent automatically. If the log fills before the specified time, it is sent. After the log is sent, it is
cleared from the cable modem router memory. If the cable modem router cannot email the log and the
log buffer fills, the cable modem router overwrites the log.
Control Access to the Internet
37
Orbi WiFi System