36
are also five types of event
—Device Cold Start, Authentication Failure, X-Ring Topology
Change, and Port Event
—available to be issued as the e-mail alert. Besides, this
function provides the authentication mechanism including an authentication step through
which the client effectively logs in to the SMTP server during the process of sending e-
mail alert.
Email Alert:
With this function being enabled, the user is allowed to configure the
detail settings for sending the e-mail alert to the SMTP server when the events
occur.
SMTP Server IP:
Assign the mail server IP address (when
Email Alert
is enabled,
this function will then be available).
Sender Email Address:
Type in an alias of the switch in complete email address
format, e.g.
, to identify where the e-mail alert comes from.
Mail Subject:
Input the subject of Email.
Authentication:
Having ticked this checkbox, the mail account, password and
confirm password column fields will then show up. Configure the email account and
password for authentication when this switch logs in to the SMTP server.
Mail Account:
Set up the email account, e.g.
, to receive the email alert.
It must be an existing email account on the mail server.
Password:
Type in the password for the email account.
Confirm Password:
Reconfirm the password.
Rcpt e-mail Address 1 ~ 6:
You can also fill each of the column fields with up to 6
e-mail accounts to receive the email alert.
Click
Apply
to have the configuration take effect.
Summary of Contents for 2204F Series
Page 23: ...16 LC connector to the transceiver ...
Page 31: ...24 ...
Page 37: ...30 IP Addressing interface ...
Page 40: ...33 SNMP Agent Configuration interface ...
Page 48: ...41 ...
Page 52: ...45 Port Statistics interfac ...
Page 59: ...52 6 17 2Aggregator Status You can check the setting of Port aggregation in Status ...
Page 64: ...57 RSTP Port Configuration interface ...
Page 67: ...60 field and click Delete to remove it ...
Page 75: ...68 6 24 2Switch Status You can see the status of VLAN setting in this function ...
Page 80: ...73 highest priority Click Apply to have the configuration take effect ...
Page 91: ...84 6 26 3 3 Port Status You can monitor the port Authorized state in this function ...
Page 92: ...85 6 26 4 MAC Filtering You can block the un authorized MAC by switch in this function ...
Page 93: ...86 6 26 5 Port Security You can block the un authorized MAC by oer port in this function ...
Page 102: ...95 Straight through cables schematic Cross over cables schematic ...