{"id":2897,"date":"2016-02-24T18:50:30","date_gmt":"2016-02-24T18:50:30","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2897"},"modified":"2020-05-06T10:30:04","modified_gmt":"2020-05-06T17:30:04","slug":"network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/","title":{"rendered":"Network configuration policies &#038; compliance mandates go beyond gold standard configuration files"},"content":{"rendered":"<p class=\"p1\">When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.\u00a0 Why?<\/p>\n<p class=\"p1\"><span class=\"s1\">First, what do I mean by a policy? \u00a0It\u2019s often thought of as a \u201cGold Standard\u201d configuration or list of config requirements for network devices. \u00a0Most network engineering teams have these standards and best practices, born from years of experience managing networks. \u00a0In some cases, policies are also mandated from external industry or governing agencies such as PCI, DISA STIG, NERC, FERC, or many others.\u00a0 Policy requirements exist to ensure security, reliability, optimization, and consistency of the network. \u00a0\u00a0A couple very simple examples include ensuring insecure services are disabled (such as HTTP) and authentication requirements are met on the infrastructure devices.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">So why are organizations not actively enforcing these policies?\u00a0 \u00a0Simple:\u00a0 it\u2019s complicated &amp; time consuming. \u00a0The concept seems easy enough, but the reality is far from it.\u00a0 Most consider detailed policy enforcement not practical with the exception of infrequent and partial manual checks.\u00a0 The result is recurring, wasted manual effort, security risks, network stability problems, and excessive troubleshooting time.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Perhaps the biggest challenge is that a configuration text file can\u2019t encompass all the complex, conditional situations that arise when testing requirements against a production network.\u00a0 Configuration requirements on the same make and model of device can vary from device to device, interface to interface, or other objects based simply on how the device is used, where it is in the network, what services are enabled, what it is connected to, what protocols are used, or any number of other situational variables.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Further complicating the challenge is that security configuration requirements go well beyond what is contained in the device config file.\u00a0 Two use case examples include ensuring proper OS\/Firmware versions, and evaluating rules conditionally with contextual information from SNMP, CLI show commands, or external data sources.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Infoblox NetMRI provides unique capabilities that make dealing with these complex scenarios practical, perhaps for the first time in many cases.\u00a0 All resulting from years of responding to customer feedback and needs. Check out our community site for some examples or simply reach out any time with questions.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.\u00a0 Why? First, what do I mean by a policy? \u00a0It\u2019s often thought of as a \u201cGold Standard\u201d configuration or list of config requirements for network devices. \u00a0Most network engineering teams have these standards and [&hellip;]<\/p>\n","protected":false},"author":233,"featured_media":1797,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[16,113],"class_list":{"0":"post-2897","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-infoblox","9":"tag-networking-control","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Network configuration policies &amp; compliance mandates go beyond gold standard configuration files<\/title>\n<meta name=\"description\" content=\"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network configuration policies &amp; compliance mandates go beyond gold standard configuration files\" \/>\n<meta property=\"og:description\" content=\"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-24T18:50:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lou Nardo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lou Nardo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/\"},\"author\":{\"name\":\"Lou Nardo\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e12caa9fb4a713c486b21daa166cbf50\"},\"headline\":\"Network configuration policies &#038; compliance mandates go beyond gold standard configuration files\",\"datePublished\":\"2016-02-24T18:50:30+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/\"},\"wordCount\":372,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"keywords\":[\"Infoblox\",\"Networking Control\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/\",\"name\":\"Network configuration policies & compliance mandates go beyond gold standard configuration files\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"datePublished\":\"2016-02-24T18:50:30+00:00\",\"dateModified\":\"2020-05-06T17:30:04+00:00\",\"description\":\"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/april-29.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network configuration policies &#038; compliance mandates go beyond gold standard configuration files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e12caa9fb4a713c486b21daa166cbf50\",\"name\":\"Lou Nardo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g\",\"caption\":\"Lou Nardo\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/lou-nardo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Network configuration policies & compliance mandates go beyond gold standard configuration files","description":"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/","og_locale":"en_US","og_type":"article","og_title":"Network configuration policies & compliance mandates go beyond gold standard configuration files","og_description":"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/","og_site_name":"Infoblox Blog","article_published_time":"2016-02-24T18:50:30+00:00","article_modified_time":"2020-05-06T17:30:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","type":"image\/jpeg"}],"author":"Lou Nardo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lou Nardo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/"},"author":{"name":"Lou Nardo","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e12caa9fb4a713c486b21daa166cbf50"},"headline":"Network configuration policies &#038; compliance mandates go beyond gold standard configuration files","datePublished":"2016-02-24T18:50:30+00:00","dateModified":"2020-05-06T17:30:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/"},"wordCount":372,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","keywords":["Infoblox","Networking Control"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/","url":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/","name":"Network configuration policies & compliance mandates go beyond gold standard configuration files","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","datePublished":"2016-02-24T18:50:30+00:00","dateModified":"2020-05-06T17:30:04+00:00","description":"When I ask network teams whether they are enforcing configuration policies, more often than not the reply is an awkward silence.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/april-29.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/network-configuration-policies-compliance-mandates-go-beyond-gold-standard-configuration-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Network configuration policies &#038; compliance mandates go beyond gold standard configuration files"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e12caa9fb4a713c486b21daa166cbf50","name":"Lou Nardo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1f998dccd1e88dfd702ad5686e94d4ab2859571f5ccb0cc9e6acb7e5f9c7fac?s=96&d=blank&r=g","caption":"Lou Nardo"},"url":"https:\/\/www.infoblox.com\/blog\/author\/lou-nardo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/233"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2897"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2897\/revisions"}],"predecessor-version":[{"id":2898,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2897\/revisions\/2898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1797"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}