Why do I see "access not allowed to application for this IP ###.###.###.###" when I try to access my organization's Transact account?
If you receive the error access not allowed to application for this IP ###.###.###.###, you need to add your IP address to the Transact Security Settings.
An Organization Administrator needs to add the IP address by navigating to the Security Settings > Access Restrictions and add the IP address.
Wait about 10 to 20 minutes for updates to propagate through the system.
Alert: Transact Orgs require that the IP address is defined in the security settings for the organization
Transact requires that the IP address is defined in the security settings for the organization. If you do test sends from a development environment, make sure that its IP address is defined in the security settings Access Restrictions section.
This setting also applies to your production environment. If you use an automated script to make a Transact call, you might not see this alert until the next time you check the script.
Why are my submissions declined due to IP address after I added the IP range?
Because Transact does not use a user name and password for authentication, the use of IP restrictions is more stringent and the functions that surround the IP range are not available.
Each specific IP address that is submitted to the Transact servers needs to be individually entered. If you enter an IP range, only the first address within the range is accepted.
What causes Transact IP address errors?
Possible causes of IP address errors are:
An organization might be attempting to send requests without configuring the correct IP address.
Your system changed its sending IP address.
Permitted IP addresses might not have synced with Acoustic Campaign yet (allow 20 minutes).
Why doesn't Transact SMTP recognize my IP address?
Transact SMTP recognizes only IP addresses that you specify in User Settings when you create a transactional message group. For security, Transact does not respond to any IP address that is not designated by you. IP-level validation is used for security.