0% found this document useful (0 votes)
5 views

Troubleshoot-TestingDebugging

The document outlines various HTTP substatus codes for Microsoft's IIS 7.0, 7.5, and 8.0 servers, specifically detailing the causes of 404 errors, such as 'Not Found' and 'Site Not Found.' It also lists other HTTP status codes including 500 Internal Server Error, 503 Service Unavailable, and 511 Network Authentication Required, explaining their meanings and contexts. This information is essential for understanding server responses and troubleshooting web issues.

Uploaded by

Dummy Login
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Troubleshoot-TestingDebugging

The document outlines various HTTP substatus codes for Microsoft's IIS 7.0, 7.5, and 8.0 servers, specifically detailing the causes of 404 errors, such as 'Not Found' and 'Site Not Found.' It also lists other HTTP status codes including 500 Internal Server Error, 503 Service Unavailable, and 511 Network Authentication Required, explaining their meanings and contexts. This information is essential for understanding server responses and troubleshooting web issues.

Uploaded by

Dummy Login
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Page 1 of 10

Page 2 of 10
Page 3 of 10
Page 4 of 10
Page 5 of 10
Microsoft's IIS 7.0, IIS 7.5, and IIS 8.0 servers define the following HTTP substatus codes to indicate a more specific cause of a 404 error:

 404.0 – Not found.


 404.1 – Site Not Found.
 404.2 – ISAPI or CGI restriction.
 404.3 – MIME type restriction.
 404.4 – No handler configured.
 404.5 – Denied by request filtering configuration.
 404.6 – Verb denied.
 404.7 – File extension denied.
 404.8 – Hidden namespace.
 404.9 – File attribute hidden.
 404.10 – Request header too long.
 404.11 – Request contains double escape sequence.

Page 6 of 10
 404.12 – Request contains high-bit characters.
 404.13 – Content length too large.
 404.14 – Request URL too long.
 404.15 – Query string too long.
 404.16 – DAV request sent to the static file handler.
 404.17 – Dynamic content mapped to the static file handler via a wildcard MIME mapping.
 404.18 – Query string sequence denied.
 404.19 – Denied by filtering rule.
 404.20 – Too Many URL Segments.

Page 7 of 10
Page 8 of 10
500 Internal Server Error

A generic error message, given when an unexpected condition was encountered and no more specific message is suitable.[63]

501 Not Implemented

The server either does not recognize the request method, or it lacks the ability to fulfil the request. Usually this implies future availability (e.g., a new feature of a web-
service API).[64]

502 Bad Gateway

Page 9 of 10
The server was acting as a gateway or proxy and received an invalid response from the upstream server.[65]

503 Service Unavailable

The server cannot handle the request (because it is overloaded or down for maintenance). Generally, this is a temporary state.[66]

504 Gateway Timeout

The server was acting as a gateway or proxy and did not receive a timely response from the upstream server.[67]

505 HTTP Version Not Supported

The server does not support the HTTP protocol version used in the request.[68]

506 Variant Also Negotiates (RFC 2295)

Transparent content negotiation for the request results in a circular reference.[69]

507 Insufficient Storage (WebDAV; RFC 4918)

The server is unable to store the representation needed to complete the request.[17]

508 Loop Detected (WebDAV; RFC 5842)

The server detected an infinite loop while processing the request (sent instead of 208 Already Reported).

510 Not Extended (RFC 2774)

Further extensions to the request are required for the server to fulfil it.[70]

511 Network Authentication Required (RFC 6585)

The client needs to authenticate to gain network access. Intended for use by intercepting proxies used to control access to the network (e.g., "captive portals" used to
require agreement to Terms of Service before granting full Internet access via a Wi-Fi hotspot).[59]

Page 10 of 10

You might also like