{"id":4392,"date":"2020-01-14T14:50:31","date_gmt":"2020-01-14T22:50:31","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=4392"},"modified":"2020-05-06T10:26:52","modified_gmt":"2020-05-06T17:26:52","slug":"infoblox-tolly-group-sd-wan-best-practices-for-security","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/","title":{"rendered":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security"},"content":{"rendered":"<p>When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud). Across the modern network ecosystem, traffic flows over SD-WAN to the network edge interfacing with and spanning sites from external and public networks to engage essential business applications, cloud services access, web browsing, Internet traffic and more. While each site has its own security needs with varying security threats, a breach at any point across the network puts the entire organization at risk.<\/p>\n<p>So, where do you start? Have you outlined a strategy? How do you create your requirements? What are key considerations and best practices? Do you implement security at each branch office, in the cloud or in the corporate datacenter? \u00a0What performance levels are acceptable at increasing levels of security infrastructure? These and many other issues are important to assess when planning how to optimize and secure access, reliability and performance for your customers and corporate and remote users.<\/p>\n<p>Fortunately, Infoblox and the Tolly Group have teamed-up to produce an SD-WAN Security Best Practices Guide to provide practical and strategic insights for identifying and mitigating security risks. Rather than providing a comprehensive deployment guide, this document identifies and describes individual SD-WAN elements that require security to help you build your strategy and better approach security issues. In particular, the document outlines some of the important considerations and options as follows:<\/p>\n<ul>\n<li>Security vs. Performance<\/li>\n<li>Security Deployment Location Choices<\/li>\n<li>Foundational Security<\/li>\n<li>SD-WAN and Security Infrastructure<\/li>\n<li>Access Control and Management Plane<\/li>\n<li>Onboarding<\/li>\n<li>Data Plane Security<\/li>\n<li>Application Programming Interface (API) Framework Security<\/li>\n<li>Perimeter Security<\/li>\n<li>Cloud-Based Gateways<\/li>\n<li>Cloud-Based Credential Storage<\/li>\n<li>Security Information and Event Management (SIEM) Integration<\/li>\n<li>Security Update Process<\/li>\n<li>Compliance<\/li>\n<li>Advanced Topics: Service Chain, IoT Security and Micro-segmentation<\/li>\n<\/ul>\n<p>No matter how well you plan in today\u2019s environment, the safest approach is to consider not if you will be attacked, but when. And if you\u2019re adopting new solutions with new features as part of a digital transformation initiative, it\u2019s important to anticipate how these features introduce potential new attack risks. That\u2019s why it\u2019s essential to leverage security technologies and engage integrated, automated SD-WAN monitoring and response on a vigilant and continued basis. Moreover, adopting a well-conceived and communicated incident response plan that includes breach remediation processes, documentation and stakeholder notification is essential.<\/p>\n<p>This SD-WAN Security Best Practices Guide can help start that process. To get your copy, select the download <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/sd-wan-best-practices-for-security\" target=\"_blank\" rel=\"noopener noreferrer\">link<\/a> and submit your request. For more information, contact your Infoblox sales rep or reseller to learn how Infoblox can help you address your specific SD-WAN security and planning needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud). Across the modern network ecosystem, traffic flows over SD-WAN to the network edge interfacing with and spanning sites from external and public networks to engage [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":1635,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[69,143,186,162,15,185],"class_list":{"0":"post-4392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-best-practices","9":"tag-cloud-networking","10":"tag-office-365","11":"tag-sd-wan","12":"tag-security","13":"tag-tolly-group","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox\/Tolly Group: SD-WAN Best Practices for Security<\/title>\n<meta name=\"description\" content=\"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infoblox\/Tolly Group: SD-WAN Best Practices for Security\" \/>\n<meta property=\"og:description\" content=\"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-14T22:50:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Infoblox\\\/Tolly Group: SD-WAN Best Practices for Security\",\"datePublished\":\"2020-01-14T22:50:31+00:00\",\"dateModified\":\"2020-05-06T17:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/\"},\"wordCount\":452,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"keywords\":[\"Best practices\",\"Cloud Networking\",\"Office 365\",\"SD-WAN\",\"Security\",\"Tolly Group\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/\",\"name\":\"Infoblox\\\/Tolly Group: SD-WAN Best Practices for Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"datePublished\":\"2020-01-14T22:50:31+00:00\",\"dateModified\":\"2020-05-06T17:26:52+00:00\",\"description\":\"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/security-banner-11.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/infoblox-tolly-group-sd-wan-best-practices-for-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infoblox\\\/Tolly Group: SD-WAN Best Practices for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security","description":"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/","og_locale":"en_US","og_type":"article","og_title":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security","og_description":"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).","og_url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/","og_site_name":"Infoblox Blog","article_published_time":"2020-01-14T22:50:31+00:00","article_modified_time":"2020-05-06T17:26:52+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security","datePublished":"2020-01-14T22:50:31+00:00","dateModified":"2020-05-06T17:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/"},"wordCount":452,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","keywords":["Best practices","Cloud Networking","Office 365","SD-WAN","Security","Tolly Group"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/","url":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/","name":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","datePublished":"2020-01-14T22:50:31+00:00","dateModified":"2020-05-06T17:26:52+00:00","description":"When planning to deploy SD-WAN, it\u2019s important to consider the factors impacting both core network services (DNS, DHCP and IP Address Management\u2014DDI) and hybrid security (on-premises, private and public cloud).","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/security-banner-11.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/infoblox-tolly-group-sd-wan-best-practices-for-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Infoblox\/Tolly Group: SD-WAN Best Practices for Security"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=4392"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4392\/revisions"}],"predecessor-version":[{"id":4393,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/4392\/revisions\/4393"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1635"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=4392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=4392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=4392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}