{"id":6235,"date":"2021-04-19T09:12:09","date_gmt":"2021-04-19T16:12:09","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6235"},"modified":"2022-10-20T13:18:11","modified_gmt":"2022-10-20T20:18:11","slug":"esni-ech-impact-on-content-filtering","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/","title":{"rendered":"ESNI\/ECH Impact on Content Filtering"},"content":{"rendered":"<p>Many organizations commonly provide content filtering that uses transparent proxies for devices &#8211; they don\u2019t own \u2013 but that are on their networks. Transparent proxies commonly use SNI data to understand whether a user is accessing inappropriate data, so if the SNI field is encrypted, it will disrupt the use of transparent proxies.<\/p>\n<p>Encrypted server name indication (ESNI) is a security feature that is used for keeping user data private while browsing. This feature prevents TLS from leaking any data by encrypting all of the messages, including the initial Client Hello message. This ensures no snooping on the TLS handshake information (such as domain) by third parties.\u00a0 It also helps prevent data on the server certificate presented by the server. ESNI encrypts the server name indication (SNI) field of the TLS handshake.\u00a0 Encrypted Client Hello (ECH) came into the picture to overcome the shortcomings of ESNI.\u00a0 \u00a0Encrypted Client Hello (ECH) no longer encrypts the SNI extension but instead encrypts an entire Client Hello message.\u00a0 This resulted in the name change from \u201cESNI\u201d to \u201cECH\u201d.<\/p>\n<p>As\u00a0 an example &#8211; \u00a0a user XYZ wants to visit a website, www.example-website.com.\u00a0 This is a TLS based website, which means the traffic is encrypted. In addition, it also uses ESNI to protect the initial Client Hello information.<\/p>\n<p>Here is a high-level exchange that occurs when a user tries to access a website with ESNI:<\/p>\n<ol>\n<li>XYZ user sends a query to a DNS server to find out the www.example-website.com IP address.<\/li>\n<li>The DNS response tells the XYZ user what is the IP address of the website with the website\u2019s ESNI public key.<\/li>\n<li>XYZ now sends an encrypted Client Hello using the website\u2019s ESNI public key.<\/li>\n<li>The Website server verifies the information and the certificate.<\/li>\n<li>After this, the normal TLS handshake completes, and the user is able to access the website. This prevents any attackers from monitoring what website is being accessed by the user.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6236\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ESNI-1.png\" alt=\"\" width=\"624\" height=\"804\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ESNI-1.png 624w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ESNI-1-233x300.png 233w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6237\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ESNI-2.png\" alt=\"\" width=\"624\" height=\"803\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ESNI-2.png 624w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ESNI-2-233x300.png 233w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><strong>Key Impact\u00a0<\/strong><\/h3>\n<p>DNS is an important piece for multiple services like Proxy\u2019s, VPN, web traffic etc. and changing anything related to the DNS can break the functionality of these things. With ECH\/ESNI, we would see an impact on the user experience, because a lot of changes are needed (application specific\/DNS configuration).<\/p>\n<p>Presently, the majority of devices use their ISP\u2019s DNS capabilities. DoH could drive a shift from ISP\/single device DNS settings to each application being able to select their own DNS provider. With ECH, customers may need to set-up content filtering on a per device\/application basis, risking inconsistent experiences.<\/p>\n<h3><strong>DNS Filtering<\/strong><\/h3>\n<p>DNS filtering provides some capabilities to augment SNI-based filtering. Filtering is an important tool which leverages DNS information to stop accidental access to malicious content (e.g. Phishing\/Malware sites). Most of the organizations use transparent proxies that are often combined with DNS filtering, to safeguard users against malicious content. However, the proxy requires unencrypted SNI to check the domain information. Using ECH will hamper this function.<\/p>\n<p>With Infoblox, we can provide a content filtering solution that is scalable and cost effective.\u00a0 It also provides the ability to dynamically identify users and apply policy decisions in near real-time.<\/p>\n<p>DNS-level traffic inspection can provide stable, scalable augmentation for SWGs (Secure Web Gateways). For example, through the Infoblox product, a provider can prevent users from accessing obviously inappropriate content, by blocking traffic at the DNS level.<\/p>\n<p>Infoblox offers differentiated functionality, such as <strong>Threat Insight<\/strong>, which can detect malware commands and control traffic hidden in DNS queries. It can also detect the presence of DNS tunneling, a common method that some students can potentially use to bypass SWG security policy limitations.<\/p>\n<p>In addition to this,<strong> Infoblox provides Subscriber Policy Enforcement and Subscriber Parental Control.<\/strong> Infoblox solutions can scale exponentially, support HTTPS traffic, provide license flexibility and a minimal hardware footprint which makes us a complete solution to counter the challenges posed by ECH\/ESNI.<\/p>\n<h3><strong>Helpful Links<\/strong><\/h3>\n<p><a href=\"https:\/\/insights.infoblox.com\/resources-deployment-guides\/infoblox-deployment-guide-enabling-and-configuring-content-filtering-without-multi-site-proxy-msp\">https:\/\/insights.infoblox.com\/resources-deployment-guides\/infoblox-deployment-guide-enabling-and-configuring-content-filtering-without-multi-site-proxy-msp<\/a><\/p>\n<p><a href=\"https:\/\/blogs.infoblox.com\/security\/infoblox-walled-garden-web-filtering\/\">https:\/\/blogs.infoblox.com\/security\/infoblox-walled-garden-web-filtering\/<\/a><\/p>\n<p><a href=\"https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-case-study-emea-based-internet-communications-provider.pdf\">https:\/\/www.infoblox.com\/wp-content\/uploads\/infoblox-case-study-emea-based-internet-communications-provider.pdf<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many organizations commonly provide content filtering that uses transparent proxies for devices &#8211; they don\u2019t own \u2013 but that are on their networks. Transparent proxies commonly use SNI data to understand whether a user is accessing inappropriate data, so if the SNI field is encrypted, it will disrupt the use of transparent proxies. Encrypted server [&hellip;]<\/p>\n","protected":false},"author":352,"featured_media":4035,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[474,475,476,360],"class_list":{"0":"post-6235","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-esni","9":"tag-ech","10":"tag-content-filtering","11":"tag-dns-security","12":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ESNI\/ECH Impact on Content Filtering<\/title>\n<meta name=\"description\" content=\"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESNI\/ECH Impact on Content Filtering\" \/>\n<meta property=\"og:description\" content=\"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-19T16:12:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T20:18:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aditya Ganjoo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aditya Ganjoo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/\"},\"author\":{\"name\":\"Aditya Ganjoo\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/f7d74aa92ae3618dcd3c5259eef762e8\"},\"headline\":\"ESNI\\\/ECH Impact on Content Filtering\",\"datePublished\":\"2021-04-19T16:12:09+00:00\",\"dateModified\":\"2022-10-20T20:18:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/\"},\"wordCount\":687,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-6.jpg\",\"keywords\":[\"ESNI\",\"ECH\",\"content filtering\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/\",\"name\":\"ESNI\\\/ECH Impact on Content Filtering\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-6.jpg\",\"datePublished\":\"2021-04-19T16:12:09+00:00\",\"dateModified\":\"2022-10-20T20:18:11+00:00\",\"description\":\"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-6.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/CDC-picture-6.jpg\",\"width\":600,\"height\":378,\"caption\":\"Set Filters\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/esni-ech-impact-on-content-filtering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ESNI\\\/ECH Impact on Content Filtering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/f7d74aa92ae3618dcd3c5259eef762e8\",\"name\":\"Aditya Ganjoo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_352_1611189596-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_352_1611189596-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_352_1611189596-96x96.jpg\",\"caption\":\"Aditya Ganjoo\"},\"description\":\"Aditya Ganjoo is a Senior Technical Marketing Engineer at Infoblox. He is currently working on SP, Openstack and DDI. Previously he was a Technical Marketing Engineer at Cisco. Aditya holds a bachelor\u2019s degree in engineering in IT and is a CCIE in Security. He resides in Bangalore and is a food connoisseur, enjoys music and Cricket.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/aditya-ganjoo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ESNI\/ECH Impact on Content Filtering","description":"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/","og_locale":"en_US","og_type":"article","og_title":"ESNI\/ECH Impact on Content Filtering","og_description":"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/","og_site_name":"Infoblox Blog","article_published_time":"2021-04-19T16:12:09+00:00","article_modified_time":"2022-10-20T20:18:11+00:00","og_image":[{"width":600,"height":378,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg","type":"image\/jpeg"}],"author":"Aditya Ganjoo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aditya Ganjoo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/"},"author":{"name":"Aditya Ganjoo","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/f7d74aa92ae3618dcd3c5259eef762e8"},"headline":"ESNI\/ECH Impact on Content Filtering","datePublished":"2021-04-19T16:12:09+00:00","dateModified":"2022-10-20T20:18:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/"},"wordCount":687,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg","keywords":["ESNI","ECH","content filtering","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/","url":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/","name":"ESNI\/ECH Impact on Content Filtering","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg","datePublished":"2021-04-19T16:12:09+00:00","dateModified":"2022-10-20T20:18:11+00:00","description":"It is common for organizations to provide content filtering using transparent proxies on their network. Learn more about the benefits of content filtering here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/CDC-picture-6.jpg","width":600,"height":378,"caption":"Set Filters"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/esni-ech-impact-on-content-filtering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"ESNI\/ECH Impact on Content Filtering"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/f7d74aa92ae3618dcd3c5259eef762e8","name":"Aditya Ganjoo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_352_1611189596-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_352_1611189596-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_352_1611189596-96x96.jpg","caption":"Aditya Ganjoo"},"description":"Aditya Ganjoo is a Senior Technical Marketing Engineer at Infoblox. He is currently working on SP, Openstack and DDI. Previously he was a Technical Marketing Engineer at Cisco. Aditya holds a bachelor\u2019s degree in engineering in IT and is a CCIE in Security. He resides in Bangalore and is a food connoisseur, enjoys music and Cricket.","url":"https:\/\/www.infoblox.com\/blog\/author\/aditya-ganjoo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6235"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6235\/revisions"}],"predecessor-version":[{"id":8159,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6235\/revisions\/8159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/4035"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}