
CAUTION:
• Since Sublogs are basically stored in volatile memory, almost all information will be lost by turning OFF and then ON
the power. Therefore, it is important to perform log collection operation without turning OFF and then ON the power
while the symptom occurs.
• Once the Sublog files are collected, they are deleted from the host machine. In the case of collecting Sublogs
consecutively, the number of continuous log files may be fewer than usual.
■ Key Operation Logs
The key operation log function is used to collect user's key operation logs in order to distinguish between a host machine failure
and a user's operation mistake when, for example, a fax transmission error occurred.
If it cannot be denied the possibility that the user operation caused the error, collect the key operation logs.
Key operation logs are not recorded by default, therefore, the function needs to be enabled.
In order to save key operation logs, configure the setting of the following Settings/Registration menu to ON (enabled).
[Management Settings] > [Device Management] > [Store Key Operation Log]
Only when the foregoing setting is enabled, it is judged that user's permission has been obtained, and user operation logs start
to be recorded.
User operation logs are saved together with Sublogs and collected as logs contained in Sublog files.
Among the saved user operation logs, the confidential information shown below is masked.
• Password entered from the software keyboard
• PIN, PIN code, etc. entered from the Numeric Keypad
• Information that is hidden by turned letters on the UI screen
CAUTION:
Be sure to obtain user's permission in advance to record key operation logs for analyzing problems.
NOTE:
• When logs are output, passwords, PIN, and turned letters are masked, and these confidential information never leak out.
• Collect this log when it is determined that analysis of the firmware debug log is required.
■ Network Packet Logs
With this function, network packet data sent from or received by the host machine is collected (captured) in the HDD without the
need for special equipment.
When it is expected that the trouble was caused by network, collect network packet logs.
Note that this function is not a standard function because packet data on the network contains customer information. To use this
function, it needs to be activated as a license option and then enabled in service mode.
CAUTION:
When collecting network packet logs using this function, be sure to obtain user's permission in advance by explaining about
it.
CAUTION:
In the case of a heavy-load network environment, some of the packets may be left uncollected.
6. Troubleshooting
351
Summary of Contents for imageRUNNER ADVANCE C255 Series
Page 1: ...Revision 2 0 imageRUNNER ADVANCE C355 C255 Series Service Manual ...
Page 17: ...Product Overview 1 Product Lineup 7 Option 8 Features 11 Specifications 14 Parts Name 18 ...
Page 127: ...Periodical Service 3 Periodically Replacement Parts 117 Consumable parts 118 ...
Page 154: ...4 Remove the Screws 5x 5 Remove the Rear Cover 1 4 Parts Replacement and Cleaning 143 ...
Page 257: ...1 Free the Harness 1 Harness Guide A 1x 1 A 4 Parts Replacement and Cleaning 246 ...
Page 376: ...Error Jam Alarm 7 Overview 366 EError Code 369 Jam Code 457 Alarm Code 464 ...
Page 469: ...Host Machine Cassette PS12 PS11 PS01 PS04 PS05 PS14 PS10 PS101 7 Error Jam Alarm 458 ...
Page 490: ...85 0005 For R D A Operation B Cause C Remedy 7 Error Jam Alarm 479 ...
Page 890: ...4 4x TP M3x6 5 3x 6 2x TP M3x6 7 8 9 Installation 879 ...
Page 891: ...9 1x 10 1x 11 2x 12 4x 13 9 Installation 880 ...
Page 903: ...17 9 Installation 892 ...
Page 914: ...5 6 2x Screw w washer M3x14 7 4x TP M3x6 9 Installation 903 ...
Page 923: ...3 2x 4 Short 1x 5 1x NOTE The removed screw will be used in step 7 6 1x 9 Installation 912 ...
Page 930: ...9 10 11 1x 12 13 9 Installation 919 ...
Page 931: ...14 2x 15 16 2x 17 6x 18 4x 9 Installation 920 ...
Page 932: ... Installing the NFC kit C1 1 1x 2 1x 3 TP M3x4 1x 9 Installation 921 ...