{"id":347,"date":"2009-12-03T23:56:49","date_gmt":"2009-12-03T23:56:49","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2009\/12\/03\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint\/"},"modified":"2023-01-06T16:52:13","modified_gmt":"2023-01-06T16:52:13","slug":"configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html","title":{"rendered":"Check Point Per User IP Assignment Using ipassignment.conf"},"content":{"rendered":"

In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your gateway as required. This configuration file is :<\/p>\n

$FWDIR\/conf\/ipassignment.conf<\/strong><\/p>\n

This article we will outline some of the possible gotcha`s and also run through the required steps.
\nWithin this example we will provide a single user (certificate based) with a specific IP address and allow the rest of the subnet to be assigned to the rest of the users within this group.<\/p>\n

Steps<\/strong><\/p>\n

    \n
  1. Edit the file $FWDIR\/conf\/ipassignment.conf<\/strong> with the required changes.<\/li>\n<\/ol>\n
    #\r\n# file: ipassignment.conf\r\n#\r\n# This file is used to implement the IP-per-user feature.  It allows the\r\n# administrator to assign specific addresses to specific users or specific\r\n# ranges to specific groups when they connect using Office Mode or L2TP.\r\n#\r\n# The format of this file is simple:  Each line specifies the target\r\n# gateway, the IP address (or addresses) we wish to assign and the user\r\n# (or group) name as in the following examples:\r\n#\r\n# Gateway        Type   IP Address                                User Name\r\n# =============  =====  ========================================  =========================================\r\n# Paris-GW,             10.5.5.8,                                 Jean\r\n# Brasilia,      addr   10.6.5.8, wins=(192.168.3.2,192.168.3.3)  Joao  # comments are allowed\r\n# Miami,         addr   10.7.5.8, dns=(192.168.3.7,192.168.3.8)   CN=John,OU=users,O=cpmgmt.acme.com.gibeuu\r\n# Miami          range  100.107.105.110-100.107.105.119\/24        Finance\r\n# Miami          net    10.7.5.32\/28  suffix=(acct.acme.com)      Accounting\r\n#\r\n# Note that real records do not begin with a pound-sign (#), and the commas\r\n# are optional.  Invalid lines are treated as comments.  Also, the\r\n# user name may be followed by a pound-sign and a comment.\r\n#\r\n# The first item is the gateway name.  This could be a name, an IP\r\n# address or an asterisk (*) to signify all gateways.  A gateway will\r\n# only honor lines that refer to it.\r\n#\r\n# The second item is a descriptor.  It can be 'addr', 'range' or 'net'.\r\n# 'addr' specifies one IP for one user.  This prefix is optional.\r\n# 'range' and 'net' specify a range of addresses.  These prefixes are\r\n# required.\r\n#\r\n# The third item is the IP address or addresses.  In the case of a single\r\n# address, it is specified in standard dotted decimal format.\r\n# ranges can be specified either by the first and last IP address, or using\r\n# a net specification.  In either case you need to also specify the subnet\r\n# mask length ('\/24' means 255.255.255.0).  With a range, this is the subnet\r\n# mask.  With a net it is both the subnet mask and it also determines the\r\n# addresses in the range.\r\n#\r\n# After the third item come any of three keyword parameters.  These are\r\n# specifications for WINS (or NBNS) servers, for DNS servers and a DNS\r\n# suffix.  The parameters themselves are on the format 'keyword=(params)'\r\n# where the params can be one address (such as \"192.168.3.2\"), several\r\n# IP addresses (such as \"192.168.3.2,192.168.3.3\") or a string (only\r\n# for the DNS suffix.  The relevant keywords are \"dns\", \"wins\" and\r\n# \"suffix\" and they are not case-sensitive.\r\n# Inside the keyword parameters there must be no spaces or any other\r\n# extra characters.  These will cause the entire line to be ignored.\r\n#\r\n# The last item is the user name.  This can be a common name if the\r\n# user authenticates with some username\/password method (like hybrid\r\n# or MD5-Challenge) or a DN if the user authenticates with a\r\n# certificate.\r\n#\r\nfirewall-object,       addr    192.168.1.254, dns=(192.168.2.2,192.168.2.3) wins=(192.168.2.2,192.168.2.3) CN=user1,OU=users,O=firewall-manager..5e2qan\r\nfirewall-object,       range   192.168.1.1-192.168.1.253\/24, dns=(192.168.2.2,192.168.2.3) wins=(192.168.2.2,192.168.2.3)       Some-Usergroup\r\n<\/pre>\n
      \n
    1. Ensure you have selected the required option within the Check Point Object telling it to use the\u00a0 ipassignment.conf<\/strong> file.<\/li>\n
    2. Check the file using the command vpn ipafile_check ipassignment.conf<\/strong> detail\u200f<\/strong><\/li>\n
    3. Push the Policy to the Gateway and test that your changes have been successful.<\/li>\n<\/ol>\n

      Gotcha`s<\/strong><\/p>\n

        \n
      1. You cannot use the hostname of the gateway but can use the Gateway object name within the conf file.<\/li>\n
      2. You must push the policy after making changes to the ipassignment.conf file.<\/li>\n
      3. For users using certificate based authentication you will need to add the users DN.<\/li>\n
      4. The vpn ipafile_check ipassignment.conf<\/strong> detail\u200f <\/strong>command does not check the spelling of entries within the conf file nor does it check to see if the gateway\/object\/usernames exsist or are within the policy of the firewall gateway.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

        In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your gateway as required. This configuration file is : $FWDIR\/conf\/ipassignment.conf This article we will outline some of the possible gotcha`s and also run through the required steps. Within this example we will … Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"yoast_head":"\nCheck Point Per User IP Assignment Using ipassignment.conf - Fir3net<\/title>\n<meta name=\"description\" content=\"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check Point Per User IP Assignment Using ipassignment.conf - Fir3net\" \/>\n<meta property=\"og:description\" content=\"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\" \/>\n<meta property=\"og:site_name\" content=\"Fir3net\" \/>\n<meta property=\"article:published_time\" content=\"2009-12-03T23:56:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-06T16:52:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG\" \/>\n\t<meta property=\"og:image:width\" content=\"628\" \/>\n\t<meta property=\"og:image:height\" content=\"277\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rick Donato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Donato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\"},\"author\":{\"name\":\"Rick Donato\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\"},\"headline\":\"Check Point Per User IP Assignment Using ipassignment.conf\",\"datePublished\":\"2009-12-03T23:56:49+00:00\",\"dateModified\":\"2023-01-06T16:52:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\"},\"wordCount\":243,\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG\",\"articleSection\":[\"Check Point Firewalls\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\",\"url\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\",\"name\":\"Check Point Per User IP Assignment Using ipassignment.conf - Fir3net\",\"isPartOf\":{\"@id\":\"https:\/\/www.fir3net.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG\",\"datePublished\":\"2009-12-03T23:56:49+00:00\",\"dateModified\":\"2023-01-06T16:52:13+00:00\",\"description\":\"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your\",\"breadcrumb\":{\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage\",\"url\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG\",\"contentUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG\",\"width\":628,\"height\":277},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.fir3net.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.fir3net.com\/security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Firewalls\",\"item\":\"https:\/\/www.fir3net.com\/security\/firewalls\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Check Point Firewalls\",\"item\":\"https:\/\/www.fir3net.com\/security\/firewalls\/check-point\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Check Point Per User IP Assignment Using ipassignment.conf\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.fir3net.com\/#website\",\"url\":\"https:\/\/www.fir3net.com\/\",\"name\":\"Fir3net\",\"description\":\"Keeping you in the know\",\"publisher\":{\"@id\":\"https:\/\/www.fir3net.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.fir3net.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.fir3net.com\/#organization\",\"name\":\"Fir3net\",\"url\":\"https:\/\/www.fir3net.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"contentUrl\":\"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png\",\"width\":390,\"height\":88,\"caption\":\"Fir3net\"},\"image\":{\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037\",\"name\":\"Rick Donato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g\",\"caption\":\"Rick Donato\"},\"description\":\"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check Point Per User IP Assignment Using ipassignment.conf - Fir3net","description":"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html","og_locale":"en_US","og_type":"article","og_title":"Check Point Per User IP Assignment Using ipassignment.conf - Fir3net","og_description":"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your","og_url":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html","og_site_name":"Fir3net","article_published_time":"2009-12-03T23:56:49+00:00","article_modified_time":"2023-01-06T16:52:13+00:00","og_image":[{"width":628,"height":277,"url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG","type":"image\/jpeg"}],"author":"Rick Donato","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Donato","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#article","isPartOf":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html"},"author":{"name":"Rick Donato","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037"},"headline":"Check Point Per User IP Assignment Using ipassignment.conf","datePublished":"2009-12-03T23:56:49+00:00","dateModified":"2023-01-06T16:52:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html"},"wordCount":243,"publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"image":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage"},"thumbnailUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG","articleSection":["Check Point Firewalls"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html","url":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html","name":"Check Point Per User IP Assignment Using ipassignment.conf - Fir3net","isPartOf":{"@id":"https:\/\/www.fir3net.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage"},"image":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage"},"thumbnailUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG","datePublished":"2009-12-03T23:56:49+00:00","dateModified":"2023-01-06T16:52:13+00:00","description":"In order to assign individual IPs and ranges to certains remote access users, Check Point provides a configuration file allowing you to configure your","breadcrumb":{"@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#primaryimage","url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG","contentUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/2009\/12\/images_legacy_cp-ipass.PNG","width":628,"height":277},{"@type":"BreadcrumbList","@id":"https:\/\/www.fir3net.com\/Firewalls\/Checkpoint\/configuring-per-ip-assignment-using-ipassignmentconf-in-checkpoint.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fir3net.com\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.fir3net.com\/security"},{"@type":"ListItem","position":3,"name":"Firewalls","item":"https:\/\/www.fir3net.com\/security\/firewalls"},{"@type":"ListItem","position":4,"name":"Check Point Firewalls","item":"https:\/\/www.fir3net.com\/security\/firewalls\/check-point"},{"@type":"ListItem","position":5,"name":"Check Point Per User IP Assignment Using ipassignment.conf"}]},{"@type":"WebSite","@id":"https:\/\/www.fir3net.com\/#website","url":"https:\/\/www.fir3net.com\/","name":"Fir3net","description":"Keeping you in the know","publisher":{"@id":"https:\/\/www.fir3net.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fir3net.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.fir3net.com\/#organization","name":"Fir3net","url":"https:\/\/www.fir3net.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","contentUrl":"https:\/\/www.fir3net.com\/wp-content\/uploads\/Fir3net-Background-Logo-compressed.png","width":390,"height":88,"caption":"Fir3net"},"image":{"@id":"https:\/\/www.fir3net.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/ab35009601b7687ee1c5310be6038037","name":"Rick Donato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.fir3net.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d75d69a54c0ca3b32c24c3a9703b623c?s=96&d=mm&r=g","caption":"Rick Donato"},"description":"Rick Donato is a Network Automation Architect\/Evangelist and the founder of Packet Coders."}]}},"_links":{"self":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/347"}],"collection":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":2,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/347\/revisions"}],"predecessor-version":[{"id":3450,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/posts\/347\/revisions\/3450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/media\/346"}],"wp:attachment":[{"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/categories?post=347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fir3net.com\/wp-json\/wp\/v2\/tags?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}