{"id":15364,"date":"2020-04-22T09:08:48","date_gmt":"2020-04-22T14:08:48","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15364"},"modified":"2025-12-19T14:58:06","modified_gmt":"2025-12-19T19:58:06","slug":"what-is-a-vpn","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/","title":{"rendered":"What is a VPN?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15364\" class=\"elementor elementor-15364\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fd8703c e-flex e-con-boxed e-con e-parent\" data-id=\"2fd8703c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1be31c2f elementor-widget elementor-widget-text-editor\" data-id=\"1be31c2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>VPN: A Closer Look<\/h3><p>VPN. If you hadn\u2019t heard these three letters together before March 2020, you\u2019ve surely heard them now. With businesses and their employees the world over exposed to <a href=\"https:\/\/www.crn.com\/news\/cloud\/coronavirus-is-creating-a-global-work-at-home-culture\" target=\"_blank\" rel=\"noopener noreferrer\">work from home<\/a> scenarios \u2013 many for the first time \u2013 any conversation about <a href=\"https:\/\/www.firewalls.com\/category\/secure-remote-access.html\" target=\"_blank\" rel=\"noopener noreferrer\">secure remote access<\/a> involves the term. So what is a VPN? The very basic definition is \u2013 it\u2019s a virtual private network. But that phrase is just begging for further explanation. So gather \u2018round \u2013 virtually of course \u2013 as we unpack VPNs and why they\u2019re so <a href=\"https:\/\/www.firewalls.com\/blog\/5-things-telework-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">important for telework<\/a>.<\/p><h3>Virtual<\/h3><p>The virtual part of VPN means just that \u2013 it requires no physical connection. Instead, a virtual tunneling protocol establishes the connection. Gophers would be jealous of the number of these tunnels out there, but of course, they don\u2019t damage any golf courses or yards. The tunneling is achieved by a process known as encapsulation. Basically, while your remote user\u2019s data still does have to travel through the public internet to get to the other side (i.e. your network), the virtual tunnel covers it. That means, it\u2019s private.<\/p><h3>Private<\/h3><p>So the tunnel itself offers privacy to a degree, but to achieve the full security benefits of a VPN, it must be encrypted. The public internet can see that a tunnel exists, but encryption \u2013 either via SSL (secure sockets layer) or IPSec (internet protocol security) prevents anyone from seeing what\u2019s inside. The user and the network the user connects to are the only ones who can decrypt it, with passwords (<a href=\"https:\/\/www.firewalls.com\/blog\/multifactor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">multifactor authentication<\/a> recommended) and certificates.<\/p><p>Getting back to the types, while both SSL and IPSec provide the encryption needed to keep that virtual tunnel private, there are a couple key differences. SSL VPN allows secure remote access through a web browser \u2013 without requiring specialized client software \u2013 making it simple to deploy. Unlike SSL, IPSec VPN functions at the network layer, and it does typically require a separate hardware or software solution. We compared <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall.html\" target=\"_blank\" rel=\"noopener\">SonicWall\u2019s<\/a> VPN service offerings (one SSL and one IPSec) <a href=\"https:\/\/www.firewalls.com\/blog\/choosing-sonicwall-vpn\/\">in a recent post<\/a>, and <a href=\"https:\/\/www.firewalls.com\/sonicwall-ssl-vpn-vs-global-ipsec-vpn\">in a handy chart<\/a> that could offer some assistance as to which is best for your scenario.<\/p><p>Oh and one more note on privacy, when a user connects via VPN, it also obscures the device\u2019s IP address. That means someone trying to track its location will only get the IP address of the network the user is connected to &#8211; a feature many non-business users find handy.<\/p><h3>Network<\/h3><p>So in our quest to answer the question \u201cwhat is a VPN?\u201d we\u2019ve explored the virtual and private aspects, now let\u2019s examine the network component. Network in this case means a user\u2019s remote device is connected to your organization\u2019s network. Depending on the connection type, they may have access to all of it, or just specified apps, services, and files. Either way, the VPN connection allows users access to what they need to get work done \u2013 all while protected by your existing network security. A VPN in essence extends your network\u2019s reach to wherever your employees need to access it. And in the age of the teleworker, this secure remote access is a must.<\/p><h3>Is your VPN connection a little slow?<\/h3><p>Check out our video for some tips on how to speed up your VPN connection:<\/p><div class=\"iframe-wrapper\"><iframe title=\"YouTube video player\" data-src=\"https:\/\/www.youtube.com\/embed\/dx5YRrjZgBg\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.<\/p>\n","protected":false},"author":5,"featured_media":27484,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-15364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a VPN? - Firewalls.com<\/title>\n<meta name=\"description\" content=\"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a VPN? - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-22T14:08:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T19:58:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"What is a VPN?\",\"datePublished\":\"2020-04-22T14:08:48+00:00\",\"dateModified\":\"2025-12-19T19:58:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\"},\"wordCount\":559,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\",\"name\":\"What is a VPN? - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png\",\"datePublished\":\"2020-04-22T14:08:48+00:00\",\"dateModified\":\"2025-12-19T19:58:06+00:00\",\"description\":\"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png\",\"width\":1120,\"height\":630,\"caption\":\"What Is a VPN?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a VPN?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a VPN? - Firewalls.com","description":"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/","og_locale":"en_US","og_type":"article","og_title":"What is a VPN? - Firewalls.com","og_description":"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.","og_url":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-04-22T14:08:48+00:00","article_modified_time":"2025-12-19T19:58:06+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"What is a VPN?","datePublished":"2020-04-22T14:08:48+00:00","dateModified":"2025-12-19T19:58:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/"},"wordCount":559,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/","url":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/","name":"What is a VPN? - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png","datePublished":"2020-04-22T14:08:48+00:00","dateModified":"2025-12-19T19:58:06+00:00","description":"The term VPN gets thrown around often in the network security world, but what exactly is it? We answer the how and the why of virtual private networks.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/04\/What-Is-a-Firewall-Why-Does-My-Business-Need-a-Firewall-1.png","width":1120,"height":630,"caption":"What Is a VPN?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/what-is-a-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a VPN?"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15364"}],"version-history":[{"count":17,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15364\/revisions"}],"predecessor-version":[{"id":27486,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15364\/revisions\/27486"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27484"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}