{"id":1856,"date":"2016-08-27T08:43:23","date_gmt":"2016-08-27T13:43:23","guid":{"rendered":"http:\/\/swildow.darktech.org\/wp\/?p=1856"},"modified":"2016-08-27T08:43:23","modified_gmt":"2016-08-27T13:43:23","slug":"virtual-local-area-networks-vlans","status":"publish","type":"post","link":"http:\/\/www.wildow.com\/blog\/?p=1856","title":{"rendered":"Virtual Local Area Networks (VLANs)"},"content":{"rendered":"<h1 class=\"entry-title\"><a title=\"http:\/\/www.practicalnetworking.net\/stand-alone\/vlans\/\" href=\"http:\/\/www.practicalnetworking.net\/stand-alone\/vlans\/\" target=\"_blank\">Virtual Local Area Networks (VLANs)<\/a><\/h1>\n<div class=\"post-info\"><span class=\"date published time\" title=\"2016-06-23T11:55:36+00:00\">JUNE 23, 2016<\/span> by <span class=\"author vcard\"><span class=\"fn\"><a href=\"http:\/\/www.practicalnetworking.net\/author\/ed\/\" rel=\"author\">ed harmoush<\/a><\/span><\/span> <span class=\"post-comments\"><a href=\"http:\/\/www.practicalnetworking.net\/stand-alone\/vlans\/#comments\">4 comments<\/a><\/span><\/div>\n<div class=\"entry-content\">\n<p>Virtual Local Area Networks, or <strong>VLANs<\/strong>, are a very simple concept that has been very poorly defined by the industry.<\/p>\n<p>This article will explain VLANs from a <em>practical<\/em> perspective. It will be framed around the two major functions of VLANs, and then concluded with another equally poorly defined concept, the Native VLAN.<\/p>\n<p>Finally, at the end of the article is a two question comprehension challenge \u2013 if you can successfully answer these two questions, then you can consider yourself to fully understand the <em>concept<\/em> of VLANs \u2014 the topic of <a href=\"http:\/\/www.practicalnetworking.net\/stand-alone\/configuring-vlans\/\" target=\"_blank\">configuring VLANs<\/a>will be covered in another article.<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"two-functions-of-vlans\">Two Major\u00a0Functions of VLANs<\/h3>\n<p>Below is a network with three different physical switches. The <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/key-players\/#switch\" target=\"_blank\">switches facilitate communication within networks<\/a>, and the <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/key-players\/#router\" target=\"_blank\">Routers facilitate communication between networks<\/a>.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-3sw.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1098\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-3sw.gif\" alt=\"vlans-3sw\" width=\"896\" height=\"179\" \/><\/a><\/p>\n<p>Each switch above independently performs the <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/host-to-host-through-a-switch\/#switch-functions\" target=\"_blank\">four functions of switch<\/a>.<\/p>\n<p>If each of these switches have\u00a024 ports and only two are in use, then 22 ports are left wasted on each switch. Moreover, what if you need to replicate this network elsewhere and you do not have three physical switches to accommodate?<\/p>\n<p>That is where the first major function of a VLAN comes into play: <strong>A VLAN allows you to take one physical switch, and break it up into smaller <em>mini-switches<\/em><\/strong>.<\/p>\n<h5 id=\"mini-switches\">Breaking up one Physical Switch into multiple Virtual Switches<\/h5>\n<p>Consider each circle on the switch below as its own <em>mini-switch<\/em>. Each of these <em>mini-switches<\/em>, or <em>virtual<\/em> switches, operate completely independent from the others\u00a0\u2014 exactly as they would had there been three different physical switches.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-1sw-3vlan.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1100\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-1sw-3vlan.gif\" alt=\"vlans-1sw-3vlan\" width=\"896\" height=\"195\" \/><\/a><\/p>\n<p>Traffic flow through this topology operates\u00a0exactly as it did in the topology above it (with three separate physical switches).<\/p>\n<p><strong>Each <em>virtual\u00a0<\/em>switch, or <em>VLAN<\/em>, is simply a number assigned to each switch port<\/strong>. For example, the two switch ports in the red <em>mini-switch<\/em> might be assigned to <code>VLAN #10<\/code>. The two ports in the orange <em>mini-switch<\/em> might be assigned to <code>VLAN #20<\/code>. And lastly the two switch ports in the blue <em>mini-switch<\/em> might be assigned to <code>VLAN #30<\/code>.<\/p>\n<p><strong>If a port is not explicitly assigned a VLAN number, it resides in the default VLAN, which has a VLAN number of <code>1<\/code>.<\/strong><\/p>\n<p>Traffic arriving on a switch port assigned to <code>VLAN #10<\/code> will only ever be forwarded out another switch port that belongs to <code>VLAN #10<\/code> \u2013 <strong>a switch will never allow traffic to cross a VLAN boundary<\/strong>. Again, each VLAN operates as if it were a completely separate physical switch.<\/p>\n<p>In the first illustration, traffic from the red switch cannot magically appear on the orange switch without first passing through a router. Similarly, in the second illustration, traffic in <code>VLAN #10<\/code> cannot magically appear on <code>VLAN #20<\/code> without also passing through a router.<\/p>\n<p>Each of the VLANs also maintain their own, independent, <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/key-players\/#mac-table\" target=\"_blank\">MAC address table<\/a>. If Host A sends a frame with a destination MAC address of Host B, that frame would still be flooded solely within the switch ports in <code>VLAN #10<\/code>.<\/p>\n<p>Ultimately, assigning different ports to different VLANs allows you to re-use a single physical switch for multiple purposes. This is the first major\u00a0function of a VLAN.<\/p>\n<p>But that isn\u2019t all VLANs allow you to do.\u00a0The\u00a0second major\u00a0function is <strong>VLANs allow you to extend the smaller Virtual switches across multiple Physical switches<\/strong>.<\/p>\n<h5 id=\"extending-vlans\">Extending Virtual Switches across multiple Physical Switches<\/h5>\n<p>To illustrate this point, we will expand the topology above with an additional physical switch and two additional hosts:<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-2sw-3vlan.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1101\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-2sw-3vlan.gif\" alt=\"vlans-2sw-3vlan\" width=\"896\" height=\"327\" \/><\/a><\/p>\n<p>Notice how a VLAN# 10 and VLAN# 30 have been extended onto a second switch. This enables Host A and Host C to exist in the same VLAN, despite being connected to different physical switches located in potentially different areas.<\/p>\n<p>The primary benefit of extending a VLAN to different physical switches is that the\u00a0Layer 2 topology\u00a0no longer has to be tied to the\u00a0Physical Topology. A single VLAN can span across multiple rooms, floors, or office buildings.<\/p>\n<p>Each connected switch port in the topology above is a member of only a single VLAN. This is referred to as an\u00a0<strong id=\"access_port\">Access<\/strong>port. <strong>An Access port is a switch port that\u00a0is a member of <em>only one<\/em> VLAN<\/strong>.<\/p>\n<p>Whenever the switch receives any traffic on an Access port, it accepts the traffic onto the configured VLAN.<\/p>\n<p>In order to extend a VLAN to the second switch, a connection is made between <em>one<\/em>\u00a0Access port on <em>both<\/em> switches for<em>each<\/em> VLAN.\u00a0While functional, this strategy does not scale. Imagine if our topology was using ten VLANs, on a 24 port switch nearly half of the ports would be taken up by the inter-switch links.<\/p>\n<p>Instead, there is a mechanism which allows a single switch port to carry traffic from multiple VLANs. This is referred to as a <strong id=\"trunk_port\">Trunk<\/strong> port. <strong>A Trunk port is a switch port that\u00a0carries traffic for <em>multiple<\/em> VLANs<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-trunks-and-access.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1103\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-trunks-and-access.png\" alt=\"vlans-trunks-and-access\" width=\"375\" height=\"286\" \/><\/a>We can use Trunk ports to reduce the amount of switch ports required for the topology above. This enables us to leave more ports available to add hosts to the network in the future.<\/p>\n<p>This physical topology operates (logically) identically to the illustration above it, but requires far fewer switch ports.<\/p>\n<p>We were able to use a total of four Trunk ports (across both switches) to replace eight different Access ports in the prior illustration.<\/p>\n<p>Typically, <strong>switch ports connected to end-host devices are configured as Access ports<\/strong>\u00a0(e.g., workstations, printers, servers). Conversely,\u00a0<strong>switch ports connected to other network devices are configured as Trunk ports<\/strong>\u00a0(e.g., other switches, routers). We will uncover the reason for this later in this article.<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"tagged-untagged\">Tagged Ports and Untagged Ports<\/h3>\n<p>A Trunk port on a switch can receive traffic for more than one VLAN. For example, in the illustration above, the link between the two switches is carrying traffic for both VLAN 10 and VLAN 30.<\/p>\n<p>But in both cases, the traffic is leaving one switch as a series of 1s and 0s, and arriving on the other switch as a series of 1s and 0s. Which begs the question, how will the receiving switch determine which 1s and 0s belong to <code>VLAN #10<\/code>, and which 1s and 0s belong to <code>VLAN #30<\/code>?<\/p>\n<p>To account for this, <strong>whenever a Switch is forwarding traffic out a Trunk port, it adds to that traffic a\u00a0<em>tag<\/em> to indicate to the other end what VLAN that traffic belongs to<\/strong>. This allows the receiving switch\u00a0to read the VLAN tag in order to determine what VLAN the incoming traffic should be associated to.<\/p>\n<p>An <em id=\"access_no_tag\">Access<\/em> port, by comparison, can only ever carry or receive traffic for a single VLAN. Therefore, <strong>there is no need to add a VLAN Tag to traffic leaving an Access port<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-ethernet-dot1q-tag.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1129 alignright\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-ethernet-dot1q-tag-600x327.png\" alt=\"vlans-ethernet-dot1q-tag\" width=\"411\" height=\"224\" \/><\/a>Since VLANs are a Layer 2 technology, the VLAN Tag is inserted within the Layer 2 header. The standard Layer 2 header in modern networks is the <a href=\"http:\/\/www.practicalnetworking.net\/stand-alone\/ethernet-wiring\/#ethernet\" target=\"_blank\">Ethernet<\/a> header, which has three fields: <em>Destination MAC Address<\/em>, <em>Source MAC Address<\/em>, and <em>Type<\/em>.<\/p>\n<p>When an Ethernet frame is exiting a Trunk port, the switch will insert a VLAN Tag between the <em>Source MAC address<\/em> and the <em>Type<\/em> fields.<\/p>\n<p>This allows the receiving switch to associate the frame with the appropriate VLAN.<\/p>\n<p>&nbsp;<\/p>\n<p>To summarize, the final topology with traffic traveling between Host C and Host D through Access ports and Trunk ports will look like this:<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-3vlans-tag-untag.gif\"><img loading=\"lazy\" decoding=\"async\" id=\"final_topology\" class=\"aligncenter size-full wp-image-1106\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-3vlans-tag-untag.gif\" alt=\"vlans-3vlans-tag-untag\" width=\"896\" height=\"300\" \/><\/a><\/p>\n<p>The physical topology above will work\u00a0exactly like the logical topology below. The hosts will not know whether they are going through two physical switches (or three or four), or what VLANs they are in. They operate exactly as they would in any situation which involves <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/packet-traveling\/\" target=\"_blank\">moving packets through a network<\/a>.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-logical-2.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1108\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlans-logical-2.gif\" alt=\"vlans-logical-2\" width=\"896\" height=\"203\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h5 id=\"untagged-access-ports\">Access Ports and End-Host Devices<\/h5>\n<p>Earlier we mentioned Access ports typically face end-host devices like workstations or printers or servers. Part of the reason for this is that switches do not add a VLAN tag when sending traffic out an Access port.<\/p>\n<p>Most <strong>end-host devices do not understand the concepts of VLANs<\/strong>. In fact, <strong>if they received frames with a VLAN tag inserted in the middle of the Ethernet header, they are likely to drop them<\/strong>\u00a0under\u00a0the assumption that they were malformed frames.<\/p>\n<p>Of course, understanding the concepts of VLANs is merely a matter of installing the right software or software patch,\u00a0but imagine the overhead of requiring every user on your network to both install the software patch, and configure their devices to send the appropriate VLAN tag.<\/p>\n<p>It is much better for the network administrator to configure and concern themselves with\u00a0VLANs, and for the end-host devices to remain blissfully ignorant of what VLAN they are in, or even whether VLANs are being utilized at all.<\/p>\n<h5 id=\"vlan-terminology\">Terminology<\/h5>\n<p>Finally, a quick note on terminology. The terms Access port and Trunk port are usually associated with the Cisco world. But VLANs are an open standard, therefore other vendors are able to implement VLANs as well.<\/p>\n<p>What Cisco calls a Trunk port (i.e., a switch port that carries traffic for more than one VLAN), other vendors refer to as a <strong>Tagged<\/strong> port \u2013 referring to the addition of a VLAN tag to all traffic leaving such a port.<\/p>\n<p>What Cisco calls an Access port (i.e., a switch port that carries traffic for only one VLAN), other vendors refer to as an<strong>Untagged<\/strong> port \u2013 referring to the traffic leaving the switch port without a VLAN tag.<\/p>\n<p>These terms are not exhaustive, there are some vendors that may yet use other terminology, other vendors may even mix and match these terms. Regardless of the terminology used, all the concepts discussed above \u00a0still apply.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"dot1q-tag\">802.1q VLAN Tag<\/h3>\n<p>VLAN tags requires adding and removing bits to Ethernet frames.\u00a0The specific sequence of bits to add is governed by an open standard, which allow any vendor to implement VLANs on their devices.<\/p>\n<p><strong>The exact format of the VLAN Tag is governed by the 802.1q standard<\/strong>. This is an open, IEEE standard which is the ubiquitous method of VLAN tagging in use today.<\/p>\n<p>To demonstrate exactly how the VLAN Tag modifies a packet, take a look at the packet capture below of the same frame before and after it exits a Trunk port.<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-dot1q-tag.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1109 size-large\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-dot1q-tag-1024x237.png\" alt=\"vlan-dot1q-tag\" width=\"1024\" height=\"237\" \/><\/a><\/p>\n<p>The portion of the frame highlighted in yellow is the added\u00a0VLAN tag. Notice it is inserted between the <em>Source MAC address<\/em>\u00a0and <em>Type<\/em> field of the original Ethernet header.<\/p>\n<p>You can view\u00a0this capture yourself in <a href=\"https:\/\/www.cloudshark.org\/captures\/c20a357d198b\" target=\"_blank\">Cloudshark<\/a>, or you can <a href=\"https:\/\/www.cloudshark.org\/captures\/c20a357d198b\/download\" target=\"_blank\">download the capture file<\/a> and open it in <a href=\"https:\/\/www.wireshark.org\/download.html\" target=\"_blank\">Wireshark<\/a>.<\/p>\n<p>No other modification to the frame or its payload is made by the addition or removal of the VLAN tag. That said, since even the slight modification displayed above is made, adding and removing the VLAN tag also involves recalculating the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ethernet_frame#Frame_check_sequence\" target=\"_blank\">CRC<\/a> \u2014 which is a simple <a href=\"http:\/\/www.practicalnetworking.net\/series\/cryptography\/hashing-algorithm\/\" target=\"_blank\">hash algorithm<\/a> devised to detect transmissions errors on the wire.<\/p>\n<p>&nbsp;<\/p>\n<p>There is an older method of VLAN tagging which is\u00a0a closed, Cisco proprietary method. This method was called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cisco_Inter-Switch_Link\" target=\"_blank\">Inter-Switch Link<\/a>, or <strong>ISL<\/strong>. ISL fully <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/osi-model\/#encap-decap\" target=\"_blank\">encapsulated<\/a> the L2 frame in a new header which included the VLAN identification number.<\/p>\n<p>But these days, even newer Cisco products do not support ISL, as the entire industry has moved to the superior, open standard of 802.1q.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"native-vlan\">Native VLAN<\/h3>\n<p>There is one final concept associated with VLANs that often brings confusion. That is the concept of the <strong>Native VLAN<\/strong>.<\/p>\n<p><strong>The Native VLAN is the answer to how a switch processes traffic it receives on a Trunk port which does not contain a VLAN Tag<\/strong>.<\/p>\n<p>Without the tag, the switch will not know what VLAN the traffic belongs to, therefore the switch associates the untagged traffic with what is configured as the Native VLAN. Essentially, <strong>the Native VLAN is the VLAN that any received untagged traffic gets assigned\u00a0to on a Trunk port<\/strong>.<\/p>\n<p>Additionally, any traffic the switch forwards out a Trunk port that is associated with the Native VLAN is forwarded<em>without<\/em> a VLAN Tag.<\/p>\n<p>The Native VLAN can be configured\u00a0on any Trunk port. If the Native VLAN is not explicitly designated on a Trunk port, the default configuration of <code>VLAN #1<\/code> is used.<\/p>\n<p>That being said, it is crucially important that both sides of a Trunk port are configured with the same Native VLAN. This illustration explains why:<\/p>\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-native-mismatch.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-1110\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-native-mismatch-1024x255.png\" alt=\"vlan-native-mismatch\" width=\"1024\" height=\"255\" \/><\/a><\/p>\n<p>Above we have four Hosts (A, B, C, D) all connected to Access Ports in <code>VLAN #22<\/code> or <code>VLAN #33<\/code>, and Switch X and Switch Y connected to each other with a Trunk port.<\/p>\n<p>Host A is attempting to send a frame to Host C. When it arrives on the switch, Switch X associates the traffic with\u00a0<code>VLAN #22<\/code>. When the frame is forwarded out Switch X\u2019s Trunk port, no tag is added since the Native VLAN for the Trunk Port on Switch X is also <code>VLAN #22<\/code>.<\/p>\n<p>But when the frame arrives on Switch Y without a tag, Switch Y has no way of knowing the traffic should belong to<code>VLAN #22<\/code>. All it can do is associated the untagged traffic with what Switch Y\u2019s Trunk port has configured as the Native VLAN, which in the case is <code>VLAN #33<\/code>.<\/p>\n<p>Since Switch Y will never allow <code>VLAN #33<\/code> traffic to exit a <code>VLAN #22<\/code> port, Host C will never get this traffic. Even worse, due to a Switch\u2019s <a href=\"http:\/\/www.practicalnetworking.net\/series\/packet-traveling\/host-to-host-through-a-switch\/#flooding\" target=\"_blank\">flooding<\/a> behavior, Host D might inadvertently get the traffic that was destined to Host C.<\/p>\n<p>&nbsp;<\/p>\n<p>Finally, it should be noted that the Native VLAN is an 802.1q feature. The antiquated tagging mechanism of ISL simply dropped traffic receive on a Trunk port that did not include the ISL tag. Also, remember that <strong>the Native VLAN concept only applies to Trunk ports<\/strong> \u2014 traffic leaving and arriving on an Access port is always expected to be untagged.<\/p>\n<p>&nbsp;<\/p>\n<h3 id=\"challenge\">VLAN Comprehension\u00a0Challenge<\/h3>\n<p>To test yourself to see if you fully understand how VLANs work, there is a simple challenge we can offer.<\/p>\n<p>Below is a (poorly) configured topology, featuring five switches and twelve hosts. Each switch port is configured as either an Access port in the displayed VLAN, or a Trunk Port with the Native VLAN displayed.<\/p>\n<p>The challenge is to answer just these two simple questions:<\/p>\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-clearfix\">\n<p><a href=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-game.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1112 aligncenter\" src=\"http:\/\/www.practicalnetworking.net\/wp-content\/uploads\/2016\/06\/vlan-game-600x664.png\" alt=\"vlan-game\" width=\"390\" height=\"432\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"su-column su-column-size-1-2 su-column-last\">\n<div class=\"su-column-inner su-clearfix\">\n<p><strong>Question #1:<\/strong> If Host A sends a frame to Host B, will Host B receive it?<\/p>\n<p><strong>Question #2:<\/strong> If Host A sends a Broadcast, which hosts will receive it?<\/p>\n<p>The answers and an explanation are provided below.<\/p>\n<p>Remember, the goal isn\u2019t simply to get the answer right, but to be able to understand\u00a0<em>why<\/em>. If you can explain the answers to both of these questions to someone else, then you know you will have mastered the concept of VLANs.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Virtual Local Area Networks (VLANs) JUNE 23, 2016 by ed harmoush 4 comments Virtual Local Area Networks, or VLANs, are a very simple concept that has been very poorly defined by the industry. This article will explain VLANs from a &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?p=1856\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1856","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1856"}],"version-history":[{"count":1,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1856\/revisions"}],"predecessor-version":[{"id":1857,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1856\/revisions\/1857"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1856"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}