Solved

Protocol Log Exchange 2007

Posted on 2014-02-18
3
291 Views
Last Modified: 2014-03-12
We have a receive connector to relay email sent from application. one of owner application informed me that his application failed to send an email.

I'm checked there is no report from other application owner.

Based on protocol log, (attached). the application server tried to make SMTP session with receive connector at 14:00 but SMTP session doesn't completed. On 14:01, the SMTP session able to establish and the application to send an email.

My question why the 1st SMTP session (RED) attempt failed? Where do I checked? Any log or event available.

I notice that the 1st SMTP session (RED), the remote server didn't sent "HELO" command why on 2nd SMTP session (GREEN) the application server did sent "HELO" (Row 9) and receive connector did reply to the "HELO" (Row 10). Is that the issue?

Please advice
Book1.xlsx
0
Comment
Question by:suriyaehnop
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 41

Expert Comment

by:Adam Brown
ID: 39868951
The session in Red was probably cut prematurely without notification. Basically the application probably bugged on the session and cut it off before it could send any data. There's no way to get any more data than what you have there, so there's no real way to determine the cause from your mail logs. The problem most likely lies in the sending application.
0
 
LVL 19

Author Comment

by:suriyaehnop
ID: 39881411
Then it is not Exchange server issue right
0
 
LVL 41

Accepted Solution

by:
Adam Brown earned 400 total points
ID: 39881453
Probably not.
0

Featured Post

Get Actionable Data from Your Monitoring Solution

Your communication platform is only as good as the relevance of the information you send. Ensure your alerts get to the right people every time with actionable responses. Create escalation rules that ensure everyone follows the process and nothing is left to chance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question