{"id":13844,"date":"2025-05-11T13:16:21","date_gmt":"2025-05-11T11:16:21","guid":{"rendered":"https:\/\/irg-net.com\/?p=13844"},"modified":"2025-05-11T15:16:21","modified_gmt":"2025-05-11T13:16:21","slug":"nsx-identity-based-firewall-part-2-implement","status":"publish","type":"post","link":"https:\/\/irg-net.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/","title":{"rendered":"NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;"},"content":{"rendered":"<p>NSX Identity Based Firewall \u2013 Part 2: Implement IDFW using Event Log Scraping _ &#8230;<\/p>\n<p><a href='https:\/\/dy.si\/1ZqdQ' target='_blank'><img src='https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320'><\/a><\/p>\n<h4><a href='https:\/\/dy.si\/1ZqdQ' style='text-decoration: none' target='_blank'>NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;<\/a><\/h4>\n<p>Welcome to part-2 of the NSX IDFW series. The last post of this series discussed the overview and architecture of NSX IDFW and the logon detection method. This post discusses how to implement NSX IDFW using Active Directory Event Scraping.<\/p>\n<hr \/>\n<p><a href='http:\/\/advocacy.broadcom.com' target='_blank'>Broadcom Social Media Advocacy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSX Identity Based Firewall \u2013 Part 2: Implement IDFW using Event Log Scraping _ &#8230; NSX Identity Based Firewall \u2013 Part 2: Implement&#8230; Welcome to part-2 of the NSX IDFW series. The last post of this series discussed the overview and architecture of NSX IDFW and the logon detection method. This post discusses how to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13844","post","type-post","status-publish","format-standard","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET\" \/>\n<meta property=\"og:description\" content=\"NSX Identity Based Firewall \u2013 Part 2: Implement IDFW using Event Log Scraping _ &#8230; NSX Identity Based Firewall \u2013 Part 2: Implement&#8230; Welcome to part-2 of the NSX IDFW series. The last post of this series discussed the overview and architecture of NSX IDFW and the logon detection method. This post discusses how to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/\" \/>\n<meta property=\"og:site_name\" content=\"irgNET\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-11T11:16:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-11T13:16:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320\" \/>\n<meta name=\"author\" content=\"vExpert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@irg_net\" \/>\n<meta name=\"twitter:site\" content=\"@irg_net\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vExpert\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/\"},\"author\":{\"name\":\"vExpert\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\"},\"headline\":\"NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;\",\"datePublished\":\"2025-05-11T11:16:21+00:00\",\"dateModified\":\"2025-05-11T13:16:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/\"},\"wordCount\":67,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\\\/?size=Box320\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/\",\"name\":\"NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\\\/?size=Box320\",\"datePublished\":\"2025-05-11T11:16:21+00:00\",\"dateModified\":\"2025-05-11T13:16:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\\\/?size=Box320\",\"contentUrl\":\"https:\\\/\\\/d3utlhu53nfcwz.cloudfront.net\\\/171901\\\/cdnImage\\\/article\\\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\\\/?size=Box320\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/index.php\\\/nsx-identity-based-firewall-part-2-implement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#website\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"name\":\"irgNET\",\"description\":\"a virtual Knowledge Base\",\"publisher\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#organization\",\"name\":\"irg-NET\",\"url\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/irg-net.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1\",\"width\":2048,\"height\":2048,\"caption\":\"irg-NET\"},\"image\":{\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/irg_net\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/h-cemre-g\u00fcnay-2b61601b4\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC8GknhO5YMAkAoVxppu6aaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/irgnet-ga3w6nfbvw.live-website.com\\\/#\\\/schema\\\/person\\\/ad045fcfa1007f9dbb8bce2f216d4e35\",\"name\":\"vExpert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g\",\"caption\":\"vExpert\"},\"sameAs\":[\"https:\\\/\\\/irg-net.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/","og_locale":"en_US","og_type":"article","og_title":"NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET","og_description":"NSX Identity Based Firewall \u2013 Part 2: Implement IDFW using Event Log Scraping _ &#8230; NSX Identity Based Firewall \u2013 Part 2: Implement&#8230; Welcome to part-2 of the NSX IDFW series. The last post of this series discussed the overview and architecture of NSX IDFW and the logon detection method. This post discusses how to [&hellip;]","og_url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/","og_site_name":"irgNET","article_published_time":"2025-05-11T11:16:21+00:00","article_modified_time":"2025-05-11T13:16:21+00:00","og_image":[{"url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320","type":"","width":"","height":""}],"author":"vExpert","twitter_card":"summary_large_image","twitter_creator":"@irg_net","twitter_site":"@irg_net","twitter_misc":{"Written by":"vExpert"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#article","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/"},"author":{"name":"vExpert","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35"},"headline":"NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;","datePublished":"2025-05-11T11:16:21+00:00","dateModified":"2025-05-11T13:16:21+00:00","mainEntityOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/"},"wordCount":67,"commentCount":0,"publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320","articleSection":["Blog"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/","name":"NSX Identity Based Firewall \u2013 Part 2: Implement... - irgNET","isPartOf":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#primaryimage"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#primaryimage"},"thumbnailUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320","datePublished":"2025-05-11T11:16:21+00:00","dateModified":"2025-05-11T13:16:21+00:00","breadcrumb":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#primaryimage","url":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320","contentUrl":"https:\/\/d3utlhu53nfcwz.cloudfront.net\/171901\/cdnImage\/article\/629499a1-bc8a-4212-98c9-fb27b9ede4f1\/?size=Box320"},{"@type":"BreadcrumbList","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/index.php\/nsx-identity-based-firewall-part-2-implement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/"},{"@type":"ListItem","position":2,"name":"NSX Identity Based Firewall \u2013 Part 2: Implement&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#website","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","name":"irgNET","description":"a virtual Knowledge Base","publisher":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#organization","name":"irg-NET","url":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","contentUrl":"https:\/\/i2.wp.com\/irg-net.com\/wp-content\/uploads\/2021\/06\/cropped-FINAL-Removed-Alpha.png?fit=2048%2C2048&ssl=1","width":2048,"height":2048,"caption":"irg-NET"},"image":{"@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/irg_net","https:\/\/www.linkedin.com\/in\/h-cemre-g\u00fcnay-2b61601b4\/","https:\/\/www.youtube.com\/channel\/UC8GknhO5YMAkAoVxppu6aaQ"]},{"@type":"Person","@id":"https:\/\/irgnet-ga3w6nfbvw.live-website.com\/#\/schema\/person\/ad045fcfa1007f9dbb8bce2f216d4e35","name":"vExpert","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c9040288c07ac1cec5cb257e278f78d3f68990d7d0a2d761f209ebd4c8cf0ae?s=96&r=g","caption":"vExpert"},"sameAs":["https:\/\/irg-net.com"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/13844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/comments?post=13844"}],"version-history":[{"count":1,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/13844\/revisions"}],"predecessor-version":[{"id":13845,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/posts\/13844\/revisions\/13845"}],"wp:attachment":[{"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/media?parent=13844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/categories?post=13844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irg-net.com\/index.php\/wp-json\/wp\/v2\/tags?post=13844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}