{"id":1681,"date":"2018-10-22T18:03:58","date_gmt":"2018-10-22T18:03:58","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1681"},"modified":"2020-05-06T10:27:02","modified_gmt":"2020-05-06T17:27:02","slug":"dns-putting-the-d-in-defense-against-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/","title":{"rendered":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks"},"content":{"rendered":"<p>For this year\u2019s National Cybersecurity Awareness month, let&#8217;s take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks. DNS is considered part of the \u201cInternet Dial-tone.\u201d\u00a0 While your users may never have even heard of DNS, without it the Internet is effectively broken. The architectural positioning of DNS means it is in the ideal vantage point to see attacks coming and the perfect control-point to defend your environment.\u00a0By leveraging DNS-based tools, you, too, can enjoy the added security and privacy.<\/p>\n<p><span style=\"font-size: large;\"><strong>Defense-in-Depth With RPZ: A DNS Firewall<\/strong><\/span><\/p>\n<p>With rare exception, everything we do on the Internet starts with a DNS lookup, also known as a \u201cquery.\u201d The open nature of the protocol means that all Internet-connected devices share the same experience. A well-designed environment uses a nearby recursive resolver to answer all local device DNS queries. This proximity is critical for both performance and privacy. Answering queries from a cache located in your network reduces the external visibility of traffic. Getting the client answers quickly from that local cache is key to a high-performance user experience.<\/p>\n<p>If a DNS resolution fails for a popular website, your users may complain of degraded service. But if that site turns out to be a phishing site or a drive-by download page, this \u201cfailure\u201d is actually a win for the good guys. The DNS is the perfect place to establish an additional perimeter around your environment. No matter the OS or platform, every device on your network uses the DNS. Proper DNS configuration is required for normal operation, so no additional agent or configuration is required. Interrupting lookups to dangerous or suspect sites is an effective way to stop many threats.<\/p>\n<p>A favorite tool to implement this \u201cDNS Firewall\u201d capability is called Response Policy Zones (RPZ). RPZ is an add-on available for some common recursive nameservers, and enables IT administrators to configure the resolver to consult externally sourced, policy zones prior to answering every DNS lookup. These zones follow a published format that anyone can use to create and publish their own policy zones. This format enables a community of RPZ zones both free and paid from a diverse set of vendors and contributors. An administrator can mix-and-match zones based on their system\u2019s \u00a0unique requirements to effectively provide tailor-made protection.<\/p>\n<p><span style=\"font-size: large;\"><strong>RPZ: How It Works<\/strong><\/span><\/p>\n<p>The RPZ format is quite expressive, allowing the author and publisher of a policy zone to indicate any number of potential match conditions. An RPZ-enabled resolver can trigger on customizable, specified conditions such as:<\/p>\n<ul>\n<li>The IP retuned from a query matches a record in the RPZ;<\/li>\n<li>The name queried (or returned) matches a record in the RPZ;<\/li>\n<li>A nameserver consulted while satisfying this query had a name that matched a record in the RPZ; and\/or<\/li>\n<li>The IP of a name-server consulted while satisfying this query matched a record in the zone.<\/li>\n<\/ul>\n<p>Further enhancing the range of possible complexity, names in rules can also include wildcards (e.g., all hostnames under a given domain name) and IP address can be in single address or CIDR format.<\/p>\n<p>When a match is detected in the DNS query or response, the RPZ engine on the resolver takes the appropriate action based on administrator-configured policies. One common action is to interrupt the query by either simulating the response of a domain that doesn\u2019t exist (NXDOMAIN) or by ignoring the query entirely (DROP). Another action would be to replace the intended result from the authoritative server with your own result. This is useful for creating walled-gardens or triggering support activities. The query can also be configured to complete normally, which is particularly useful for white-lists or logging.<\/p>\n<p><span style=\"font-size: large;\"><strong>Privacy Matters<\/strong><\/span><\/p>\n<p>Privacy is always a key factor when considering security solution architecture. Moving your recursive resolution services from an ISP or a remote service to an internal service improves privacy. The caching provided by recursive resolvers acts as an abstraction layer. Frequent identical queries to a local resolver become one \u201ccache miss\u201d query to an authority server. \u00a0This process also replaces the source IP address of every device on your network with one set of resolver addresses. This makes it much harder for an interloper to identify the activity stream of any one user. Moving your recursive resolvers internal also enables you to leverage the security capabilities offered by RPZ.<\/p>\n<p><span style=\"font-size: large;\"><strong>Conclusion<\/strong><\/span><\/p>\n<p>RPZ provides extensive capabilities for network defense by leveraging the DNS infrastructure that many networks already provide. The combination of the rich matching capabilities and the powerful actions offered by RPZ makes it an effective addition to any defense-in-depth strategy. Add to that the optimal positioning of the DNS in every Internet transaction and you have a powerful tool for detecting and preventing any attacks that start with a DNS lookup. Moving your DNS resolution inside your network gives you increased performance and added control over the lookups that your devices make. The flexibility of RPZ responses and diversity of the available zones allow you maximum control of your network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this year\u2019s National Cybersecurity Awareness month, let&#8217;s take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks. DNS is considered part of the \u201cInternet Dial-tone.\u201d\u00a0 While your users may never have even heard [&hellip;]<\/p>\n","protected":false},"author":164,"featured_media":1149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[58,15,36],"class_list":{"0":"post-1681","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-defense","9":"tag-security","10":"tag-threats","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Putting the \u201cD\u201d in Defense Against Cyberattacks<\/title>\n<meta name=\"description\" content=\"For this year\u2019s National Cybersecurity Awareness month, let&#039;s take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"For this year\u2019s National Cybersecurity Awareness month, let&#039;s take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-22T18:03:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben April\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben April\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/\"},\"author\":{\"name\":\"Ben April\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/1457d8f5c74af6a4569815e4ed9bbfcf\"},\"headline\":\"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks\",\"datePublished\":\"2018-10-22T18:03:58+00:00\",\"dateModified\":\"2020-05-06T17:27:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/\"},\"wordCount\":857,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"keywords\":[\"Defense\",\"Security\",\"Threats\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/\",\"name\":\"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"datePublished\":\"2018-10-22T18:03:58+00:00\",\"dateModified\":\"2020-05-06T17:27:02+00:00\",\"description\":\"For this year\u2019s National Cybersecurity Awareness month, let's take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/480288900-660x454.jpg\",\"width\":660,\"height\":454,\"caption\":\"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-putting-the-d-in-defense-against-cyberattacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/1457d8f5c74af6a4569815e4ed9bbfcf\",\"name\":\"Ben April\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g\",\"caption\":\"Ben April\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/ben-april\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks","description":"For this year\u2019s National Cybersecurity Awareness month, let's take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks","og_description":"For this year\u2019s National Cybersecurity Awareness month, let's take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/","og_site_name":"Infoblox Blog","article_published_time":"2018-10-22T18:03:58+00:00","article_modified_time":"2020-05-06T17:27:02+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","type":"image\/jpeg"}],"author":"Ben April","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ben April","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/"},"author":{"name":"Ben April","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/1457d8f5c74af6a4569815e4ed9bbfcf"},"headline":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks","datePublished":"2018-10-22T18:03:58+00:00","dateModified":"2020-05-06T17:27:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/"},"wordCount":857,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","keywords":["Defense","Security","Threats"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/","name":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","datePublished":"2018-10-22T18:03:58+00:00","dateModified":"2020-05-06T17:27:02+00:00","description":"For this year\u2019s National Cybersecurity Awareness month, let's take a closer look at the defensive opportunities provided by the Domain Name System (DNS), as well as the critical role DNS plays in protecting organizations against phishing and other cyberattacks.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/480288900-660x454.jpg","width":660,"height":454,"caption":"Fixing the Cyber Security Defenses Built on Sand: NW Security Foundations for Digital Transformation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-putting-the-d-in-defense-against-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS Putting the \u201cD\u201d in Defense Against Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/1457d8f5c74af6a4569815e4ed9bbfcf","name":"Ben April","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc78d0d2da423c350b454abe00a884e9879ae33d5573d07f2a1df5a50c6f2da2?s=96&d=blank&r=g","caption":"Ben April"},"url":"https:\/\/www.infoblox.com\/blog\/author\/ben-april\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1681"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":1682,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1681\/revisions\/1682"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1149"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}