If you are collecting your email from a mailbox on our servers (i.e. you
aren't using mail forwarding) there are four basic pieces of information
required to configure any mail software to pick up your email. Different
email software applications may give these varying names, but all will be
similar. In the following example, we will pretend your username is 'fred'
and your domain name is 'example.com'. Obviously you should swap these for
your own username and domain.
1) Incoming Mail Server (POP3 Mail Server)
In the case of our mail system, the mail server name you should use to
collect email from is:
NOTE: this is only for receiving email, for sending outgoing email you
should use the SMTP server provided by your Internet Service Provider.
2) POP3 Username
POP3 usernames on our mail system MUST include your full domain name. The
username is in the following special format:
So, in the case of a user account called "fred" for the domain
name "example.com" the username will be:
NOTE: Some email clients, such as older versions of Eudora, require this in the
format user:domain (a colon instead of the @ sign between user and domain name).
For example: fred:example.com
3) POP3 Password
The POP3 password is the easy bit! That is set up from your email administration
pages and can be changed from there if desired.
NOTE: your default mailbox will have the same password as your main
account login, but can of course be changed via the mail admin system.
4) Outgoing Mail Server (SMTP Mail Server)
Your mail software will also usually expect an SMTP mail server for outgoing
email. This should be set to your Internet Service provider's SMTP mail
server and you should ask them for the necessary details. it is entirely
correct and normal to use your ISP's outgoing mail server, as only they
can verify and authenticate your connection (since you are dialed up via
them) and so protect against mail server abuse by spammers. To offer an
outgoing mail service we would have to operate an 'open relay' mail system
(that is, one open to all IP address ranges) and this would rapidly be exploited