{"id":364,"date":"2018-07-23T10:55:06","date_gmt":"2018-07-23T10:55:06","guid":{"rendered":"https:\/\/secureethics.com\/?p=364"},"modified":"2018-08-04T07:07:03","modified_gmt":"2018-08-04T07:07:03","slug":"how-to-open-san-switch-java-console-in-command-line","status":"publish","type":"post","link":"https:\/\/secureethics.com\/?p=364","title":{"rendered":"How to open SAN switch java console in command line"},"content":{"rendered":"<p><strong>Step 1 :<\/strong><\/p>\n<p>Open the command prompt &#8220;cmd&#8221;<\/p>\n<p><strong>Step 2 :<\/strong><\/p>\n<p>Run the following command in cmd prompt<\/p>\n<p><span class=\"lang:default decode:true crayon-inline\">javaws &#8220;http:\/\/hostname_or_IP_Address\/switchExplorer_installed.html&#8221;<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-369 alignnone\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2018\/07\/san-1.png\" alt=\"\" width=\"979\" height=\"510\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2018\/07\/san-1.png 979w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/07\/san-1-300x156.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/07\/san-1-768x400.png 768w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/07\/san-1-520x271.png 520w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Step 1 : Open the command prompt &#8220;cmd&#8221; Step 2 : Run the following command in cmd prompt javaws &#8220;http:\/\/hostname_or_IP_Address\/switchExplorer_installed.html&#8221;<\/p>\n","protected":false},"author":1,"featured_media":369,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking"],"_links":{"self":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=364"}],"version-history":[{"count":0,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/media\/369"}],"wp:attachment":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}