{"id":3023,"date":"2015-09-08T23:09:35","date_gmt":"2015-09-08T23:09:35","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3023"},"modified":"2020-05-06T10:30:10","modified_gmt":"2020-05-06T17:30:10","slug":"tackling-ipv6-risks-and-threats","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/","title":{"rendered":"Tackling IPv6 Risks and Threats"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2565\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/march-31-2.jpg\" alt=\"IPv6 Security Vulnerability Scanning\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Whether you&#8217;ve embraced IPv6 or are hesitating to make the commitment, it&#8217;s critical to understand the security impacts that IPv6-capable devices already in your network may have on your business. And there\u2019s a lot to learn.<\/p>\n<p>That\u2019s why we\u2019ve put together not one but two one-hour webinars on the topic. Part one is entitled\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1043228\/76764801C1A27DB90324ABC62D29630F\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Business Risks of the IPv6 Enabled Network<\/a>\u00a0and takes place on Tuesday, September 15 at 10 a.m. PDT; the follow-up is entitled\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1043233\/DCD2A8D164B1CBB7E5F294A741AF11DD\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Securing IPv6 Against New &amp; Evolving Threats<\/a>\u00a0and takes place on Wednesday, September 30 at 10 a.m. PDT.<\/p>\n<p>Even if you haven&#8217;t deployed IPv6, it&#8217;s currently running on your network in systems like Linux, Android, BSD, and Microsoft Windows. Even though IPv6 has only been making news recently, it&#8217;s been evolving for 20 years; and hackers have had plenty of time to learn how to exploit it.<\/p>\n<p>Many factors contribute to IPv6 being vulnerable. Simply disabling the IPv6 protocol and reverting back to IPv4 may leave you no more protected (and isn&#8217;t even an option for operating systems that rely on IPv6, like Windows). Unsure what to do? Attending these webinars is a good place to start.<\/p>\n<p>In part 1 of the series, you\u2019ll learn:<\/p>\n<p>*\u00a0\u00a0 The difference between myth and reality when it comes to securing your IPv6 deployment.<\/p>\n<p>*\u00a0\u00a0 How dual-stack configurations can double your security effort-and your attack surface.<\/p>\n<p>*\u00a0\u00a0 Where you&#8217;re most vulnerable and how to gain new visibility into your IPv6 network.<\/p>\n<p>Join us to see a live demo and hear how you can ensure your business is secure with IPv6. Click\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1043228\/76764801C1A27DB90324ABC62D29630F\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0to register.<\/p>\n<p>In part 2 of the series, we&#8217;ll take a technical deep dive into attacks that can exploit IPv6 and discuss common techniques used to mitigate them. You\u2019ll learn about:<\/p>\n<p>*\u00a0\u00a0 The latent threat issue raised by software such as Linux, Android, and Microsoft Windows that enable IPv6 regardless of user input, configuration, or notification.<\/p>\n<p>*\u00a0\u00a0 IPv6 Neighbor Discovery Protocol threats.<\/p>\n<p>*\u00a0\u00a0 First-hop security countermeasures.<\/p>\n<p>Join us to see a live demo and hear best practices on how you can deploy IPv6 with security in mind. Click\u00a0<a href=\"http:\/\/event.on24.com\/wcc\/r\/1043233\/DCD2A8D164B1CBB7E5F294A741AF11DD\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">here<\/a>\u00a0to register.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you&#8217;ve embraced IPv6 or are hesitating to make the commitment, it&#8217;s critical to understand the security impacts that IPv6-capable devices already in your network may have on your business. And there\u2019s a lot to learn. That\u2019s why we\u2019ve put together not one but two one-hour webinars on the topic. Part one is entitled\u00a0Business Risks [&hellip;]<\/p>\n","protected":false},"author":319,"featured_media":2565,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[38,36],"class_list":{"0":"post-3023","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-company","8":"tag-ipv6","9":"tag-threats","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tackling IPv6 Risks and Threats<\/title>\n<meta name=\"description\" content=\"Whether you&#039;ve embraced IPv6 or are hesitating to make the commitment, it&#039;s critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling IPv6 Risks and Threats\" \/>\n<meta property=\"og:description\" content=\"Whether you&#039;ve embraced IPv6 or are hesitating to make the commitment, it&#039;s critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-08T23:09:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Coffeen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Coffeen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/\"},\"author\":{\"name\":\"Tom Coffeen\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\"},\"headline\":\"Tackling IPv6 Risks and Threats\",\"datePublished\":\"2015-09-08T23:09:35+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/\"},\"wordCount\":363,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"keywords\":[\"IPv6\",\"Threats\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/\",\"name\":\"Tackling IPv6 Risks and Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"datePublished\":\"2015-09-08T23:09:35+00:00\",\"dateModified\":\"2020-05-06T17:30:10+00:00\",\"description\":\"Whether you've embraced IPv6 or are hesitating to make the commitment, it's critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/march-31-2.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 Security Vulnerability Scanning\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/company\\\/tackling-ipv6-risks-and-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/company\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tackling IPv6 Risks and Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b299068ee4a9f542d2ad7d59a5b1d5b1\",\"name\":\"Tom Coffeen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_319_1574118081-96x96.jpg\",\"caption\":\"Tom Coffeen\"},\"description\":\"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/tom-coffeen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tackling IPv6 Risks and Threats","description":"Whether you've embraced IPv6 or are hesitating to make the commitment, it's critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/","og_locale":"en_US","og_type":"article","og_title":"Tackling IPv6 Risks and Threats","og_description":"Whether you've embraced IPv6 or are hesitating to make the commitment, it's critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.","og_url":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/","og_site_name":"Infoblox Blog","article_published_time":"2015-09-08T23:09:35+00:00","article_modified_time":"2020-05-06T17:30:10+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","type":"image\/jpeg"}],"author":"Tom Coffeen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Coffeen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/"},"author":{"name":"Tom Coffeen","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1"},"headline":"Tackling IPv6 Risks and Threats","datePublished":"2015-09-08T23:09:35+00:00","dateModified":"2020-05-06T17:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/"},"wordCount":363,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","keywords":["IPv6","Threats"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/","url":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/","name":"Tackling IPv6 Risks and Threats","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","datePublished":"2015-09-08T23:09:35+00:00","dateModified":"2020-05-06T17:30:10+00:00","description":"Whether you've embraced IPv6 or are hesitating to make the commitment, it's critical to understand the security impacts that IPv6-capable devices already in your network may have on your business.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/march-31-2.jpg","width":660,"height":454,"caption":"IPv6 Security Vulnerability Scanning"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/company\/tackling-ipv6-risks-and-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Company","item":"https:\/\/www.infoblox.com\/blog\/category\/company\/"},{"@type":"ListItem","position":3,"name":"Tackling IPv6 Risks and Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b299068ee4a9f542d2ad7d59a5b1d5b1","name":"Tom Coffeen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_319_1574118081-96x96.jpg","caption":"Tom Coffeen"},"description":"Tom Coffeen is a network engineer, architect, and author with over twenty years of internetwork design, deployment, administration, and management experience. Tom co-founded HexaBuild, an IT consultancy specializing in the advancement of cloud, IoT, and security deployment best practices through IPv6 adoption. Prior to co-founding HexaBuild, Tom was an IPv6 Evangelist and a Distinguished Architect at Infoblox. Before that Tom was the VP of network architecture at the global CDN Limelight Networks where he led their deployment of IPv6. He is also the author of O\u2019Reilly Media\u2019s IPv6 Address Planning.","url":"https:\/\/www.infoblox.com\/blog\/author\/tom-coffeen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/319"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3023"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3023\/revisions"}],"predecessor-version":[{"id":3024,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3023\/revisions\/3024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}