Netgear WAX204 User Manual - Page 98
Outgoing Mail Server Port Number, My Mail Server
View all Netgear WAX204 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 98 highlights
WiFi 6 AX1800 Dual Band Wireless Access Point WAX204 You might be able to find this information in the configuration window of your email program. If you leave this field blank, log and alert messages are not sent. 8. In the Outgoing Mail Server Port Number field, enter the port number that the mail server uses. If you do not know the port number, leave the default port number, which is 25. 9. To send email alerts over a secure connection, select the Secure connection (use SSL) check box. 10. If your outgoing email server requires authentication, select the My Mail Server requires authentication check box, and do the following: a. In the User Name field, type the user name for the outgoing email server. b. In the Password field, type the password for the outgoing email server. 11. To send alerts when someone attempts to visit a blocked site, select the Send Alerts Immediately check box. Email alerts are sent immediately when someone attempts to visit a blocked site. 12. To send logs based on a schedule, from the Send logs according to this schedule menu, select the schedule type and specify the associated settings if applicable: • When log is full. The access point sends log messages when the log is full. • Hourly. The access point sends log messages hourly. • Daily. The access point sends log messages daily at the time that you specify. From the Time menu, select the time, and select the AM or PM radio button. • Weekly. The access point sends log messages weekly at the day and time that you specify. From the Day menu, select the day of the week. From the Time menu, select the time, and select the AM or PM radio button. The default selection from the menu is None. 13. Click the Apply button. Your settings are saved. Logs are sent automatically according to the schedule that you set. If the log fills before the specified time, it is sent. After the log is sent, it is cleared from the access point memory. If the access point cannot email the log and the log buffer fills, the access point overwrites the log. Security, Firewall, and Access 98 Rules User Manual