Canon imageRUNNER ADVANCE 715iF III Series Service Manual page 275

Hide thumbs Also See for imageRUNNER ADVANCE 715iF III Series:
Table of Contents

Advertisement

Type
Main Controller
DCON
RCON
Cases Where Debug Logs Need to Be Collected
• When the result of identification of the cause shows that the trouble was caused by host machine (firmware, hardware-related
controller)
• When the failure occurs only at the customer's site and cannot be reproduced by the department in charge of quality
management or Canon Inc.
■ Sublogs
Sublog is the general term for the unified logs for analyzing problem in which operation histories of software modules are compiled
as debug logs.
When a problem relating to the host machine occurs in the field and it is difficult to identify the cause of it at the user site, collecting
Sublogs and sending them to Design Dept./R&D can improve the efficiency of analyzing the problem and reduce the time it takes
to deal with the problem.
CAUTION:
• Sublogs are basically stored in volatile memory. Therefore, almost all information will be erased by turning OFF and
ON the power before saving the log data. When obtaining the log data, make sure to implement the operation to save
the log data (manually saving log) before turning OFF and ON the power.
• I order to prevent failure of collecting necessary information because the log is overwritten with the succeeding process,
be sure to collect the Sublog while the symptom has occurred or immediately after the occurrence.
• Once the Sublog files are collected, they are deleted from the machine. In the case of collecting Sublogs consecutively,
the number of continuous log files may be fewer than usual.
■ Key operation logs
This function collects the history of key operations in order to distinguish between a failure of the Main machine and an operation
error of the user in the case of trouble of erroneous fax transmission.
If it cannot be denied the possibility that the user operation caused the error, collect the key operation logs.
The key operation log are stored/recovered in a form included in the Sublog files.
The following confidential information in the stored key operation log is masked.
• Personal identification number, PIN code, password, etc., to be entered
• Information that is hidden by turned letters on the UI screen
CAUTION:
To obtain permission from a user in advance for recording key operations for failure analysis.
■ Network Packet Logs
CAUTION:
Performance, etc. deteriorate while this function is being used.
Only when it is expected that the trouble was caused by network, collect network packet logs.
This function collects the transmitted and received network packet data as a debug log in the storage (capture).
NOTE:
To use this function, you need to register a license, so you need to ask the Support Dept. of the sales company to issue a license.
Automatic logs
Yes (more detailed than continu-
ous logs)
Yes
Yes
Manual logs
Yes (more detailed than continu-
ous logs)
Yes
Yes
264
6. Troubleshooting
Continuous logs
Yes
No
No

Advertisement

Table of Contents
loading

Table of Contents