{"id":3025,"date":"2015-09-04T23:14:01","date_gmt":"2015-09-04T23:14:01","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=3025"},"modified":"2022-10-19T16:31:22","modified_gmt":"2022-10-19T23:31:22","slug":"getting-to-know-your-neighbors-with-ipv6-first-hop-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/","title":{"rendered":"Getting to Know Your Neighbors with IPv6 First Hop Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2785\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\" alt=\"How Adobe Systems a Silicon Valley Pioneer Avoids Downtime and Stays Secure\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>Virtually all organizations now have IPv6-capable systems running on their networks.\u00a0 All modern mobile and computer operating systems run both IPv4 and IPv6 by default.\u00a0 These operating systems try to facilitate access to the IPv6 Internet, if at all possible, and may create IPv6-in-IPv4 tunnels to reach IPv6 content.\u00a0 Some of these processes take place regardless of user input, configuration, or notification (See\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc7123\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/tools.ietf.org\/html\/rfc7123\">RFC 7123<\/a>, Security Implications of IPv6 on IPv4 Networks). \u00a0This is what is commonly referred to as the \u201cIPv6 latent threat.\u201d\u00a0There is an active protocol in the environment that administrators are not aware of and have not yet taken any steps to secure.<\/p>\n<p>This is something to be concerned about, but is something that can be secured.\u00a0 One approach to mitigating the latent threat issue is to proceed to deploy IPv6. This proactive step helps put you in control of the IPv6 security situation. There are other approaches to mitigate these IPv6 security issues. These approaches are implemented on the local LAN and traverse the network perimeter.<\/p>\n<p>This blog post will focus on the issues and security measures used to protect the use of IPv6 on a local access network.\u00a0 Knowing the network devices that are local and within the neighbor cache (the IPv6 equivalent of the IPv4\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\">ARP<\/a>\u00a0cache) helps you learn who is on your network and using IPv6.<\/p>\n<h2 id=\"toc-hId-649790077\">Don\u2019t Be Overly Alarmed<\/h2>\n<p>The vast majority of organizations have not taken any steps to secure the IPv6-capable nodes in their environment.\u00a0 They are also unaware of how IPv6 operates on a LAN and how the protocol is different from the IPv4 protocol they have experience securing.\u00a0 IPv6 has some particular functional differences from IPv4 that may change your LAN threat-mitigation strategy.<\/p>\n<p>We do not want organizations to be overly alarmed about these types of LAN-based IPv6 threats.\u00a0 For the most part, organizations do not implement any security measures to secure their IPv4\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\">ARP<\/a>\u00a0or\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Dynamic_Host_Configuration_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Dynamic_Host_Configuration_Protocol\">DHCP<\/a>\u00a0traffic on their access networks. \u00a0Many of the same types of LAN-based attacks for IPv6 have similar or exactly the same vulnerabilities as IPv4 threats.\u00a0 If organizations have not implemented any IPv4 LAN protection measures, then they should not be\u00a0<a href=\"\/ipv6-coe\/holding-ipv6-neighbor-discovery-to-a-higher-standard-of-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">holding IPv6 Neighbor Discovery to a higher standard of security<\/a>.<\/p>\n<p>It should also be mentioned that all of these IPv6 Neighbor Discovery Protocol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Neighbor_Discovery_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Neighbor_Discovery_Protocol\">NDP<\/a>) attacks occur on the local physical\/virtual link.\u00a0 Therefore, the attacker must have physical access to the local network medium or have compromised and gained control of a system that is on the local network.\u00a0 The attackers\u2019 motivation is to stay hidden and cover up their tracks as well as preserve the access they have achieved.\u00a0 The attackers definitely do not want to alert any IT administrator that they have gained access to an internal computer.<\/p>\n<p>Reconnaissance of IPv6-capable nodes on a local LAN is not practical when the attacker uses brute-force techniques trying to guess the IPv6 addresses used by local nodes.\u00a0 However, there are methods that a resourceful attacker can use to accelerate finding IPv6-capable local nodes.\u00a0 Some of these methods are stealthy and quiet, while others are noisy and leave traces that the attacker is there.\u00a0 An attacker can pivot to other unprotected IPv4 nodes and IPv6 nodes on the local LAN if the attacker already has access to the local link.<\/p>\n<h2 id=\"toc-hId-678419228\">IPv6 NDP Threats<\/h2>\n<p>Attackers are gaining familiarity with IPv6, but most enterprise security teams are unaware of the protocol and how it works on a LAN.\u00a0 The IPv6 Neighbor Discovery Protocol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Neighbor_Discovery_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Neighbor_Discovery_Protocol\">NDP<\/a>) (defined in\u00a0<a href=\"http:\/\/tools.ietf.org\/html\/rfc4861\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/tools.ietf.org\/html\/rfc4861\">RFC 4861<\/a>) is the process that is used for IPv6 nodes on a LAN to facilitate communicating with each other.\u00a0 NDP uses Internet Control Message Protocol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_Control_Message_Protocol_version_6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_Control_Message_Protocol_version_6\">ICMPv6<\/a>) and link-local multicast communications to perform functions similar to IPv4\u2019s Address Resolution Protocol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Address_Resolution_Protocol\">ARP<\/a>).\u00a0 There are a variety of LAN-based vulnerabilities that a locally-attached attacker can try to take advantage of.\u00a0 These are also documented in IETF RFC titled \u201cOperational Neighbor Discovery Problems\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6583\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/tools.ietf.org\/html\/rfc6583\">RFC 6583<\/a>).\u00a0\u00a0<a href=\"http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/ipv6_first_hop.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/web\/about\/security\/intelligence\/ipv6_first_hop.html\">This Cisco document<\/a>\u00a0shows how these IPv6 FHS concerns can cause problems for end-nodes.<\/p>\n<p>A link-local attacker could generate malicious ICMPv6 Neighbor Solicitation (NS) or Neighbor Advertisement (NA) messages to confuse node\u2019s neighbor cache.\u00a0 This could result in a DoS condition or facilitate the attacker performing a man-in-the-middle (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\">MITM<\/a>) attack.<\/p>\n<p>A local-connected attacker could also generate ICMPv6 redirect messages to change the direction of traffic from nodes on the local LAN.\u00a0 This could also result in a DoS or MITM situation.<\/p>\n<p>The attack that should raise the most concern is one where an attacker crafts a rogue ICMPv6 Router Advertisement (RA) message and sends it out on a network that only runs IPv4.\u00a0 This RA message would cause all of the IPv6-capable devices on the local network to activate their IPv6 stacks, acquire an IPv6 address based on the information in the RA, and start to attempt to actively use IPv6.\u00a0\u00a0<a href=\"\/ipv6-coe\/why-you-must-use-icmpv6-router-advertisements-ras\/\" target=\"_blank\" rel=\"noopener noreferrer\">ICMPv6 RA messages are essential and are the first step<\/a>\u00a0in the address assignment phase (and provide the host with information about their local IPv6 default gateway).\u00a0 Spoofed RAs can renumber hosts, cause a DoS condition for a host, or launch a MITM attack.\u00a0 The problems related to Rogue RA messages are well-documented in the IETF RFC titled \u201cRogue IPv6 Router Advertisement Problem Statement\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc6104\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/tools.ietf.org\/html\/rfc6104\">RFC 6104<\/a>).<\/p>\n<h2 id=\"toc-hId-707048379\">Methods for Securing NDP<\/h2>\n<p>When we start to formulate our defensive strategy for these types of IPv6 NDP attacks, the first problem to solve is our lack visibility into how IPv6 is currently used on the LAN.\u00a0 Many organizations do not know which devices are connected to their networks.\u00a0 Knowing which nodes are connected and having an \u201cinventory of authorized and unauthorized devices\u201d are the first steps in the SANS top 20 Critical Security Controls (<a href=\"https:\/\/www.sans.org\/critical-security-controls\/controls\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/www.sans.org\/critical-security-controls\/controls\">CSC<\/a>). Common methods of determining what is on our networks involve asking the local IPv6-capable router for its IPv6 neighbor cache through either the CLI or with an SNMP GET to a specific MIB OID.\u00a0 Using something like Infoblox\u2019s\u00a0<a class=\" bf_ungated_init\" href=\"https:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-datasheet-switch-port-manager.pdf?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/www.infoblox.com\/sites\/infobloxcom\/files\/resources\/infoblox-datasheet-switch-port-manager.pdf\">Switch Port Manager<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/network-services-dns-dhcp-ipam\/network-insight?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/www.infoblox.com\/products\/network-services-dns-dhcp-ipam\/network-insight\">Network Insight<\/a>\u00a0may also provide visibility.\u00a0 Having an IP address management (<a href=\"https:\/\/en.wikipedia.org\/wiki\/IP_address_management\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/IP_address_management\">IPAM<\/a>) system that is tied into our DHCP services also provides awareness of which IP addresses are in active use.<\/p>\n<p>Organizations also lack capabilities to keep unwanted devices off their networks.\u00a0 Preventing unauthorized LAN access is typically an issue of physical security.\u00a0 Most organizations may only disable unused switch ports and connections in conference rooms and publicly-accessible spaces.\u00a0 Some organizations may use\u00a0<a href=\"http:\/\/www.cisco.com\/en\/US\/docs\/switches\/lan\/catalyst6500\/ios\/12.2SX\/configuration\/guide\/port_sec.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/en\/US\/docs\/switches\/lan\/catalyst6500\/ios\/12.2SX\/configuration\/guide\/port_sec.html\">port-security<\/a>\u00a0to limit the number of MAC addresses learned on an access port.\u00a0 Fewer organizations use\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.1X\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.1X\">IEEE 802.1X<\/a>\u00a0or\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.1AE\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.1AE\">IEEE 802.1AE<\/a>\u00a0(MACsec), Cisco Identity Services Engine (<a href=\"http:\/\/www.cisco.com\/go\/ise\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/go\/ise\">ISE<\/a>) with\u00a0<a href=\"http:\/\/www.cisco.com\/go\/trustsec\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/go\/trustsec\">TrustSec<\/a>.\u00a0 Most of the commercially-available network access ontrol (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_Access_Control\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Network_Access_Control\">NAC<\/a>) network admission control (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Network_Admission_Control\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/en.wikipedia.org\/wiki\/Network_Admission_Control\">NAC<\/a>) systems do not work with IPv6 and do not pay attention to IPv6-connected devices.<\/p>\n<p>There are several host-based monitoring solutions that can observe NS\/NA and RS\/RA messages and detect and prevent NDP attacks.\u00a0 These open source utilities include\u00a0<a href=\"http:\/\/ndpmon.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/ndpmon.sourceforge.net\/\">NDPMon<\/a>,\u00a0<a href=\"http:\/\/ramond.sourceforge.net\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/ramond.sourceforge.net\/\">Ramond<\/a>, Kame\u00a0<a href=\"http:\/\/www.kame.net\/dev\/cvsweb2.cgi\/kame\/kame\/kame\/rafixd\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.kame.net\/dev\/cvsweb2.cgi\/kame\/kame\/kame\/rafixd\/\">rafixd<\/a>,\u00a0<a href=\"http:\/\/www.honeynet.org\/node\/944\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.honeynet.org\/node\/944\">6Guard<\/a>, and\u00a0<a href=\"https:\/\/6mon.iit.cnr.it\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"https:\/\/6mon.iit.cnr.it\/\">6MoN<\/a>.\u00a0 The constraint of these solutions is that one system on every LAN would need to be running these functions.\u00a0 That may not be scalable for an organization that has many access networks.<\/p>\n<p>A better approach is to put this detection and protection into the access network devices.\u00a0 These IPv6 security measures could be implemented into the Ethernet access switch or wireless controller and protect all the down-stream end-nodes. \u00a0This detection within the access Ethernet switch is similar to how a switch performs\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snoodhcp.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snoodhcp.html\">DHCP snooping<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SY\/configuration\/guide\/sy_swcg\/ipv4_igmp_snooping.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SY\/configuration\/guide\/sy_swcg\/ipv4_igmp_snooping.html\">IGMP snooping<\/a>\u00a0(identifying hosts interested in receiving multicast traffic) and\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snooppim.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/lan\/catalyst6500\/ios\/12-2SX\/configuration\/guide\/book\/snooppim.html\">PIM snooping<\/a>\u00a0(finding the local PIM routers).<\/p>\n<p>An Ethernet switch could be configured to use a\u00a0<a href=\"http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/ios-nx-os-software\/enterprise-ipv6-solution\/whitepaper_c11-602135.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/ios-nx-os-software\/enterprise-ipv6-solution\/whitepaper_c11-602135.html\">Port-based ACL<\/a>\u00a0(PACL) to prevent an access port from sending Router Advertisement (RA) messages to other link-local nodes and thus prevent an attacker from acting like a rogue DHCPv6 server.<\/p>\n<p>An example of how this rogue RA detection and prevention can be performed within an Ethernet switch is documented in the IETF RFC titled \u201cIPv6 Router Advertisement (RA) Guard\u201d (<a href=\"http:\/\/tools.ietf.org\/html\/rfc6105\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/tools.ietf.org\/html\/rfc6105\">RFC 6105<\/a>).\u00a0 Ethernet switches would be able to learn which local IPv6 router should be legitimately sending RA messages to the nodes on the network and detect and drop RA messages being sent from end-nodes.\u00a0 Ethernet switches could also detect if RA messages are being flooded too quickly (more than the standard 200 second interval) and throttle them back.<\/p>\n<p>Other IPv6 FHS features perform snooping DHCPv6 traffic and gleaning which nodes on the network have been allocated which IPv6 addresses.\u00a0 The switch can also snoop IPv6 packets and determine if those nodes are sourcing traffic from their allocated IPv6 addresses.\u00a0 If the IPv6 packets are using IPv6 addresses other than those detected through the snooping process, then the end-node may be creating spoofed packets and they should be blocked.\u00a0 Other features involve the switch monitoring the destination address of packets and detecting multicast and other attack types.<\/p>\n<h2 id=\"toc-hId-735677530\">Vendor Support for IPv6 FHS<\/h2>\n<p>Some vendors have implemented these IPv6 FHS features into their Ethernet switch software by default.\u00a0 Therefore, customers have the flexibility to turn on these features at their leisure for no additional cost.\u00a0 Even organizations that have not implemented IPv6 might be curious if any of this nefarious NDP traffic is taking place on their LANs.\u00a0 Some vendors have been aggressive about incorporating IPv6 security features into their switches, while other vendors have been slower to embrace IPv6 FHS features and implement them.\u00a0 As with other aspects of IPv6, it is important to ask your vendor about their IPv6 features and assess if they have feature parity between what they can do to secure IPv4 and what they can do to secure IPv6.<\/p>\n<p>Modern Cisco switches have these\u00a0<a class=\" bf_ungated_init\" href=\"http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/iosswrel\/ps6537\/ps6553\/aag_c45-707354.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.cisco.com\/en\/US\/prod\/collateral\/iosswrel\/ps6537\/ps6553\/aag_c45-707354.pdf\">IPv6 FHS features<\/a>\u00a0available as part of the default IOS software. This\u00a0<a href=\"http:\/\/docwiki.cisco.com\/wiki\/Cisco_IOS_IPv6_Feature_Mapping\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/docwiki.cisco.com\/wiki\/Cisco_IOS_IPv6_Feature_Mapping\">page<\/a>\u00a0has a breakdown of the IPv6 FHS features and which IOS software version and platform support these features. This site has additional\u00a0<a href=\"http:\/\/docwiki.cisco.com\/wiki\/FHS\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/docwiki.cisco.com\/wiki\/FHS\">details about configuration<\/a>\u00a0of these IPv6 FHS features.<\/p>\n<p>HP has several classes of their switches (HP K.15.07.0002 on the 5400, 8200, 3500 series) that have\u00a0<a href=\"http:\/\/mailman.nanog.org\/pipermail\/nanog\/2011-November\/042495.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/mailman.nanog.org\/pipermail\/nanog\/2011-November\/042495.html\">IPv6 security capabilities<\/a>.\u00a0 H3C\u00a0<a href=\"http:\/\/6lab.cz\/article\/rogue-router-advertisement-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/6lab.cz\/article\/rogue-router-advertisement-attack\/\">A5800 switches<\/a>\u00a0with OS version 5.20, among other switches in their line have RA Guard.<\/p>\n<p>Brocade switches (ICX 6430\/6450, FCX, ICX 6610\/6650, FSX 800\/1600, ICX 7450\/7750 Release 08.0.20a) have\u00a0<a href=\"http:\/\/www.brocade.com\/downloads\/documents\/html_product_manuals\/FI_08020a_SECURITY\/GUID-1BA7390D-EB69-4EE0-BEB1-0DF9A6108004.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.brocade.com\/downloads\/documents\/html_product_manuals\/FI_08020a_SECURITY\/GUID-1BA7390D-EB69-4EE0-BEB1-0DF9A6108004.html\">RA Guard<\/a>\u00a0and provide examples of\u00a0<a href=\"http:\/\/www.brocade.com\/downloads\/documents\/html_product_manuals\/FI_08020a_SECURITY\/GUID-962D60FB-C215-4BF2-AA33-0449D5AC3CEC.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-cke-saved-href=\"http:\/\/www.brocade.com\/downloads\/documents\/html_product_manuals\/FI_08020a_SECURITY\/GUID-962D60FB-C215-4BF2-AA33-0449D5AC3CEC.html\">how to configure it<\/a>.<\/p>\n<p>However, there are many vendors that have no IPv6 security protection features within their Ethernet switches.\u00a0 Consumers should be aware if their network switches lack these features and prepare to obtain these capabilities to gain visibility into IPv6 activities on LANs, (and should definitely plan on doing so before they deploy IPv6).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtually all organizations now have IPv6-capable systems running on their networks.\u00a0 All modern mobile and computer operating systems run both IPv4 and IPv6 by default.\u00a0 These operating systems try to facilitate access to the IPv6 Internet, if at all possible, and may create IPv6-in-IPv4 tunnels to reach IPv6 content.\u00a0 Some of these processes take place [&hellip;]<\/p>\n","protected":false},"author":321,"featured_media":2785,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17],"tags":[51,38,15],"class_list":{"0":"post-3025","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ipv6-coe","8":"tag-ipam","9":"tag-ipv6","10":"tag-security","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Getting to Know Your Neighbors with IPv6 First Hop Security<\/title>\n<meta name=\"description\" content=\"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Getting to Know Your Neighbors with IPv6 First Hop Security\" \/>\n<meta property=\"og:description\" content=\"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-04T23:14:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T23:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Hogg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Hogg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/\"},\"author\":{\"name\":\"Scott Hogg\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\"},\"headline\":\"Getting to Know Your Neighbors with IPv6 First Hop Security\",\"datePublished\":\"2015-09-04T23:14:01+00:00\",\"dateModified\":\"2022-10-19T23:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/\"},\"wordCount\":1764,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\",\"keywords\":[\"IPAM\",\"IPv6\",\"Security\"],\"articleSection\":[\"IPv6 CoE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/\",\"name\":\"Getting to Know Your Neighbors with IPv6 First Hop Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\",\"datePublished\":\"2015-09-04T23:14:01+00:00\",\"dateModified\":\"2022-10-19T23:31:22+00:00\",\"description\":\"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg\",\"width\":660,\"height\":454,\"caption\":\"How Adobe Systems a Silicon Valley Pioneer Avoids Downtime and Stays Secure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/ipv6-coe\\\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IPv6 CoE\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/ipv6-coe\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting to Know Your Neighbors with IPv6 First Hop Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/ee71ac61fe2ea349f6e991e628d22f4c\",\"name\":\"Scott Hogg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_321_1574118215-96x96.jpg\",\"caption\":\"Scott Hogg\"},\"description\":\"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.\",\"sameAs\":[\"https:\\\/\\\/hexabuild.io\"],\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/scott-hogg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Getting to Know Your Neighbors with IPv6 First Hop Security","description":"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/","og_locale":"en_US","og_type":"article","og_title":"Getting to Know Your Neighbors with IPv6 First Hop Security","og_description":"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.","og_url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/","og_site_name":"Infoblox Blog","article_published_time":"2015-09-04T23:14:01+00:00","article_modified_time":"2022-10-19T23:31:22+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg","type":"image\/jpeg"}],"author":"Scott Hogg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Hogg","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/"},"author":{"name":"Scott Hogg","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c"},"headline":"Getting to Know Your Neighbors with IPv6 First Hop Security","datePublished":"2015-09-04T23:14:01+00:00","dateModified":"2022-10-19T23:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/"},"wordCount":1764,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg","keywords":["IPAM","IPv6","Security"],"articleSection":["IPv6 CoE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/","url":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/","name":"Getting to Know Your Neighbors with IPv6 First Hop Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg","datePublished":"2015-09-04T23:14:01+00:00","dateModified":"2022-10-19T23:31:22+00:00","description":"People should be looking to familiarize themselves further with IPv6 as it will be coming to all computer operating systems. Learn more about IPv6 here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/How-Adobe-Systems-a-Silicon-Valley-Pioneer-Avoids-Downtime-and-Stays-Secure.jpg","width":660,"height":454,"caption":"How Adobe Systems a Silicon Valley Pioneer Avoids Downtime and Stays Secure"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/ipv6-coe\/getting-to-know-your-neighbors-with-ipv6-first-hop-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IPv6 CoE","item":"https:\/\/www.infoblox.com\/blog\/category\/ipv6-coe\/"},{"@type":"ListItem","position":3,"name":"Getting to Know Your Neighbors with IPv6 First Hop Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/ee71ac61fe2ea349f6e991e628d22f4c","name":"Scott Hogg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_321_1574118215-96x96.jpg","caption":"Scott Hogg"},"description":"Scott Hogg has 30 years of network and security experience and is president of Hogg Networking with. Scott Hogg specializes in teaching Internet Protocol version 6 (IPv6) and providing implementation guidance. Scott is CCIE #5133 (Emeritus) and CISSP #4610. Scott is Chair Emeritus of the Rocky Mountain IPv6 Task Force (RMv6TF), a member of the IPv6 Center of Excellence (COE), and co-author of the Cisco Press book on IPv6 Security.","sameAs":["https:\/\/hexabuild.io"],"url":"https:\/\/www.infoblox.com\/blog\/author\/scott-hogg\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/321"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=3025"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3025\/revisions"}],"predecessor-version":[{"id":8132,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/3025\/revisions\/8132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2785"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=3025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=3025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=3025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}