{"id":2979,"date":"2016-03-29T21:13:13","date_gmt":"2016-03-29T21:13:13","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2979"},"modified":"2020-05-06T10:30:03","modified_gmt":"2020-05-06T17:30:03","slug":"building-the-technical-case-for-ipv6","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/","title":{"rendered":"Building The Technical Case for IPv6"},"content":{"rendered":"<p>IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices. But in the meantime, enterprises are still left dealing with the relative complexity of IPv6 adoption, so we\u2019re continuing our educational efforts on IPv6 (in anticipation of two companion webinars last year, we blogged on\u00a0<a href=\"\/company\/tackling-ipv6-risks-and-threats\" target=\"_blank\" rel=\"noopener noreferrer\">IPv6 Risks and Threats<\/a>).<\/p>\n<p>On March 31, Ed Horley, practice manager for Cloud Solutions at Groupware Technology, and I will be hosting a 30-minute webinar entitled\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1158101\/57D38C7FA674E63CEF70524C39F833E4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Dual-Stack IPv6 on the Corporate LAN \u2014 Managing Windows, Security, and Legacy IPv4<\/a><strong>.\u00a0<\/strong>Both Ed and I have been working on and promoting IPv6 adoption for a long time: he\u2019s the Pluralsight author of\u00a0<em>IPv6: Introduction to the Protocol<\/em>\u00a0and I wrote O\u2019Reilly\u2019s\u00a0<em>IPv6 Address Planning<\/em>.<\/p>\n<p>We\u2019ll bring you up-to-speed on how to manage the adoption of IPv6 effectively and deploy dual-stack on your internal enterprise networks with confidence, with discussions of:<\/p>\n<ul>\n<li>How and when Windows (and other operating systems) obtain IPv6\/DHCPv6 addresses to use for connections<\/li>\n<li>The tools available today to help secure the IPv6 that\u2019s already running by default on your network<\/li>\n<li>How to make sure your network infrastructure is ready to support IPv6<\/li>\n<\/ul>\n<p>Register\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1158101\/57D38C7FA674E63CEF70524C39F833E4\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0for this webinar, and be on the lookout for our follow-up webinar on April 7,\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1158105\/2C3FA008DD6521E1C5D55222842F0178\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">When Do I Really Need To Pay Attention To IPv6?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices. But in the meantime, enterprises are still left dealing with the relative complexity of IPv6 adoption, so we\u2019re continuing our educational efforts on IPv6 (in anticipation [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":2788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[16,91,31,113,137],"class_list":{"0":"post-2979","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-infoblox","9":"tag-nccm","10":"tag-networking","11":"tag-networking-control","12":"tag-policy-rules","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building The Technical Case for IPv6<\/title>\n<meta name=\"description\" content=\"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building The Technical Case for IPv6\" \/>\n<meta property=\"og:description\" content=\"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-29T21:13:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Building The Technical Case for IPv6\",\"datePublished\":\"2016-03-29T21:13:13+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/\"},\"wordCount\":243,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"keywords\":[\"Infoblox\",\"NCCM\",\"Networking\",\"Networking Control\",\"Policy Rules\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/\",\"name\":\"Building The Technical Case for IPv6\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"datePublished\":\"2016-03-29T21:13:13+00:00\",\"dateModified\":\"2020-05-06T17:30:03+00:00\",\"description\":\"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/building-the-technical-case-for-ipv6\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Building The Technical Case for IPv6\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building The Technical Case for IPv6","description":"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/","og_locale":"en_US","og_type":"article","og_title":"Building The Technical Case for IPv6","og_description":"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/","og_site_name":"Infoblox Blog","article_published_time":"2016-03-29T21:13:13+00:00","article_modified_time":"2020-05-06T17:30:03+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Building The Technical Case for IPv6","datePublished":"2016-03-29T21:13:13+00:00","dateModified":"2020-05-06T17:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/"},"wordCount":243,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","keywords":["Infoblox","NCCM","Networking","Networking Control","Policy Rules"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/","url":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/","name":"Building The Technical Case for IPv6","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","datePublished":"2016-03-29T21:13:13+00:00","dateModified":"2020-05-06T17:30:03+00:00","description":"IPv6 is the future. Beyond solving the immediate problem of IPv4 address exhaustion, it will facilitate the continued growth of the Internet to tens of billions of connected devices.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/3-Ways-to-Ruin-Your-Future-Network-with-IPv6-Unique-Local-Addresses-Part-2-of-2.jpg","width":660,"height":454,"caption":"3 Ways to Ruin Your Future Network with IPv6 Unique Local Addresses (Part 2 of 2)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/building-the-technical-case-for-ipv6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Building The Technical Case for IPv6"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2979"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2979\/revisions"}],"predecessor-version":[{"id":2980,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2979\/revisions\/2980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2788"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}