Network-related Problems
533
Pr
oblem
Solv
ing
15
The IP gateway address is
incorrect.
Set the correct IP gateway address when connecting to
the proxy server, or to a Web server via the IP gateway.
The subnet mask is incorrect.
Set the correct subnet mask corresponding to your
environment.
The DNS server address is
incorrect.
Confirm the DNS server address.
The DNS server selected cannot
resolve the address.
Select a DNS server that can resolve the address.
z
When connecting via the proxy server Set the IP
address of a DNS server that can resolve the address
of the proxy server.
z
When not connecting via the proxy server Set the IP
address of a DNS server that can resolve the
destination address.
The address of the address that
does not use a proxy server is
incorrect.
Confirm whether only addresses that do not use a proxy
server are set. Even if addresses not through a proxy
server are specified using the FQDN, if a server is
directly accessed using its IP address, the registered
server is not excluded. Set the address not to use a
proxy server. Likewise, even if you directly specify an
address that does not use a proxy server, if a server is
accessed with the FQDN, the registered server is not
excluded. Set an IP address with the FQDN not to use a
proxy server.
The desired server, or the proxy
server is down.
Confirm whether the desired server or the proxy server
is operating correctly.
The network cable is not
connected, or broken.
Confirm whether the network cable is correctly
connected. We recommend using a spanning-tree
configuration, with which network disconnection rarely
occurs.
Cannot communicate because
of overloading of the server
application.
Wait for a while and try accessing again.
An error occurs that is not
displayed on the control panel.
Even though an error occurs during background
processing, no message appears on the control panel.
Display the [Job Status] screen or print the Job History
Report to confirm the result.
Cannot access the proxy server,
firewall, or Web server as a
result of access control.
The following types of access control are used. Confirm
the configured access control.
z
Address (port) restriction
z
SSL restriction
z
User access restriction (including access right levels)
z
Content block
z
Scheme restriction (cannot use HTTP etc.)
z
Transfer data size restriction
z
Method restriction (cannot use POST etc.)
z
HTTP header restriction (only accepting specified
browsers etc.)
z
Time restriction (only available during a specific
period of time etc.)
Cause
Remedy
Summary of Contents for apeosport-iv C3370
Page 14: ...14...
Page 15: ...1 1Before Using the Machine...
Page 47: ...2 2Paper and Other Media...
Page 76: ...Paper and Other Media 76 Paper and Other Media 2...
Page 77: ...3 3Maintenance...
Page 127: ...4 4Machine Status...
Page 154: ...Machine Status 154 Machine Status 4...
Page 155: ...5 5Tools...
Page 365: ...6 6CentreWare Internet Services Settings...
Page 373: ...7 7Printer Environment Settings...
Page 386: ...Printer Environment Settings 386 Printer Environment Settings 7...
Page 387: ...8 8E mail Environment Settings...
Page 397: ...9 9Scanner Environment Settings...
Page 421: ...10 10Using IP Fax SIP...
Page 430: ...Using IP Fax SIP 430 Using IP Fax SIP 10...
Page 431: ...11 11Using the Internet Fax Service...
Page 438: ...Using the Internet Fax Service 438 Using the Internet Fax Service 11...
Page 439: ...12 12Using the Server Fax Service...
Page 445: ...13 13Encryption and Digital Signature Settings...
Page 465: ...14 14Authentication and Accounting Features...
Page 494: ...Authentication and Accounting Features 494 Authentication and Accounting Features 14...
Page 495: ...15 15Problem Solving...
Page 710: ...Problem Solving 710 Problem Solving 15...
Page 711: ...16 16Appendix...