Email Commands

Email Commands

Set Email-Alert Server

Description

Configures email alert settings for the server.

User Level

Admin

Syntax

set email-alert server [from <email_addr>]

 

[level emergencyalertcriticalerrorwarningnoticeinfodebug]

 

[mode onoff] [to <email_addr>] [reply-to <email_addr>]

 

[smtp-host <string>] [subject <string>]

Options from

This will be the contents of the from field in the generated email.

This field will be specified in the from field of the email message sent by the IOLAN. level

Choose the event level that triggers an email notification:

zEmergency

zAlert

zCritical

zError

zWarning

zNotice

zInfo

zDebug

The list is in decreasing order of priority (Emergency has the highest priority). You are selecting the lowest notification level; therefore, when you select Debug, you will get an email notification for all events that trigger a message.

mode

Determines whether or not email notification is turned on. Default is Off.

to

An email address or list of email addresses that will receive the email notification.

reply-to

The email address to whom all replies to the email notification should go.

smtp-host

The SMTP host (email server) that will process the email notification request. This can be either a host name defined in the IOLAN host table or the SMTP host IP address.

subject

A text string, which can contain spaces, that will display in the Subject field of the email notification.

If the text string contains spaces, enclose the string in quotes.

Show Email-Alert Server

Description Shows how the server email alert is configured.

User Level Admin

Syntax show email-alert server

Server Commands 41

Page 41
Image 41
Perle Systems CSS manual Email Commands, Set Email-Alert Server, Show Email-Alert Server

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.