Aug 09

Some SMTP servers will require various forms of authentication. One form is to authenticate based upon the sender’s e-mail address. This is the same as the Return Address. Therefore, it would be best to change the Return e-mail address to an address that matches the SMTP server’s domain. Another form of authentication is a user name and password.

Step 1: Log into your camera and click on Configuration. Go to Advanced > Mail & FTP and fill out the SMTP information.

  • SMTP (mail) server 1 = address of the DESTINATION SMTP server (SMTP server that hosts the destination address). Example –
  • SMTP login name 1 = user name of a valid account on SMTP server
  • SMTP password 1 = password of the valid user name on SMTP server
  • Recipient e-mail address = destination e-mail address.
  • Sender e-mail address = who is sending the e-mail.

Please note that SMTP #2 is for backup purposes. If the first address fails, the second will take over. Return e-mail address = e-mail address that will be notified in the event of a failed to send. If you do not want to enter a return e-mail address, put a fake address in this field. You MUST enter a valid e-mail address format ( or the pictures will not send.

In order for the SMTP authentication to work, the D-Link camera DNS fields must be from your ISP, not the router´s IP address.


Step 2: Go to Tools > Applications.

Step 3: Set desired schedule for recording; ex. All the time except for the above schedule

Step 4: Select Event Operation.

Step 5: Under Trigger Condition select which window you want to Detect motion in: the 1st, 2nd, or 3rd motion detection boxes depending on how many you created from the motion detection screen.

Step 6: Under Trigger Action select the box next to Upload snapshots while motion detected.

Step 7: Select Send snapshots by e-mail.


Step 8: Click Apply.

NOTE: This camera does not have the option to change SMTP options. The SMTP server must use standard SMTP port 25 and you will be unable to connect to an email server that uses SSL authentication.

Tags: , , , ,