{"id":610,"date":"2014-07-17T02:39:51","date_gmt":"2014-07-17T02:39:51","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=610"},"modified":"2014-07-17T02:39:51","modified_gmt":"2014-07-17T02:39:51","slug":"%e5%9c%a8ubuntu%e4%b8%8a%e9%85%8d%e7%bd%ael2tpipsec-vpn","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/610.html","title":{"rendered":"\u5728Ubuntu\u4e0a\u914d\u7f6eL2TP\/IPsec VPN"},"content":{"rendered":"<p>\u4e4b\u524d\u5728\u5de5\u4f5c\u7684\u65f6\u5019\u5c31\u88ab\u5b89\u6392\u4e86\u4e00\u4e2a\u4efb\u52a1\u662f\u914d\u7f6eVPN\uff0c\u4f46\u662f\u5f53\u65f6\u5f04\u4e86\u4e00\u9635\u4e4b\u540e\u53d1\u73b0\u8fde\u63a5\u603b\u662f\u4f1a\u51fa\u73b0\u95ee\u9898\uff08\u53ef\u4ee5\u8fde\u4e0a\uff0c\u4f46\u4e00\u8bbf\u95ee\u5916\u7f51\uff0c\u8fc7\u4e00\u4f1a\u513f\u5c31\u65ad\u7ebf\u4e86o(\u256f\u25a1\u2570)o\u5f53\u65f6\u4e5f\u6ca1\u6709\u6d4b\u8bd5\u624b\u673a\u8fde\u63a5VPN\uff0c\u73b0\u5728\u642d\u5efa\u7684\u8fd9\u4e2a\u6211\u662f\u6309\u7740\u7f51\u4e0a\u7684\u4e00\u4e9b\u6559\u7a0b\u4e00\u6b65\u4e00\u6b65\u6765\u7684\uff0c\u4f46\u662f\uff0c\u8fd8\u662f\u4f1a\u51fa\u73b0\u540c\u6837\u7684\u95ee\u9898\uff0c\u4e0d\u8fc7\u5728Android\/iPhone\u4e0a\u5374\u53ef\u4ee5\u5f88\u597d\u7684\u5de5\u4f5c\uff0c\u4e0d\u77e5\u9053\u662f\u4e2a\u4ec0\u4e48\u95ee\u9898\uff0c\u8fd8\u5e0c\u671b\u4e86\u89e3\u7684\u5927\u795e\u80fd\u5e2e\u5fd9\u89e3\u91ca\uff09<\/p>\n<p>\u4e0b\u9762\u662f\u5728\u642d\u5efa\/\u914d\u7f6eL2TP\/IPsec VPN\u7684\u8fc7\u7a0b\u4e2d\u6574\u7406\u51fa\u6765\u7684\u4e00\u952e\u914d\u7f6eshell\u811a\u672c\uff0c\u6709Ubuntu\u4e0b\u7684\uff0c\u4e5f\u6709CentOS\u4e0b\u7684\u3002\u90fd\u662f\u6211\u5728Zeddicus\u5927\u725b\u7684\u811a\u672c\uff08\u73b0\u5728\u5df2\u7ecf\u6253\u4e0d\u5f00<a href=\"http:\/\/mirror.zeddicus.com\/auto-l2tp\/1.2\/ubuntu\/l2tp.sh\" target=\"_blank\">\u4e0b\u8f7d\u5730\u5740<\/a>\u4e86\uff09\u57fa\u7840\u4e0a\uff0c\u7ed3\u5408\u7f51\u4e0a\u7684\u5176\u4ed6\u6559\u7a0b\u8fdb\u884c\u4fee\u6539\u540e\u800c\u6210\u7684\uff08\u4e3b\u8981\u5728\u4e8eOpenSwan\u7684\u7248\u672c\u4ee5\u53ca\u5c06\u4e00\u4e9b\u9700\u8981\u5f00\u673a\u542f\u52a8\u7684\u64cd\u4f5c\u5199\u5165\/etc\/rc.local\uff09\uff0c\u5148\u770bUbuntu\u7248\u672c\uff1a<\/p>\n<pre class=\"lang:sh decode:true\">#!\/bin\/bash\n\nif [ $(id -u) != \"0\" ]; then\n    printf \"Error: You must be root to run this tool!n\"\n    exit 1\nfi\nclear\nprintf \"\n####################################################\n#                                                  #\n# This is a Shell-Based tool of l2tp installation  #\n# Version: 1.2                                     #\n# Author: Zed Lau                                  #\n# Website: http:\/\/zeddicus.com                     #\n# For Ubuntu 32bit and 64bit                       #\n#                                                  #\n####################################################\n\"\nvpsip=`ifconfig  | grep 'inet addr:'| grep -v '127.0.0.1' | cut -d: -f2 | awk 'NR==1 { print $1}'`\n\niprange=\"10.0.192\"\necho \"Please input IP-Range:\"\nread -p \"(Default Range: 10.0.192):\" iprange\nif [ \"$iprange\" = \"\" ]; then\n\tiprange=\"10.0.192\"\nfi\n\nmypsk=\"ixyzero.com\"\necho \"Please input PSK:\"\nread -p \"(Default PSK: ixyzero.com):\" mypsk\nif [ \"$mypsk\" = \"\" ]; then\n\tmypsk=\"ixyzero.com\"\nfi\n\nclear\nget_char()\n{\nSAVEDSTTY=`stty -g`\nstty -echo\nstty cbreak\ndd if=\/dev\/tty bs=1 count=1 2&gt; \/dev\/null\nstty -raw\nstty echo\nstty $SAVEDSTTY\n}\necho \"\"\necho \"ServerIP:\"\necho \"$vpsip\"\necho \"\"\necho \"Server Local IP:\"\necho \"$iprange.1\"\necho \"\"\necho \"Client Remote IP Range:\"\necho \"$iprange.128-$iprange.254\"\necho \"\"\necho \"PSK:\"\necho \"$mypsk\"\necho \"\"\necho \"Press any key to start...\"\nchar=`get_char`\nclear\n\napt-get -y update\napt-get -y upgrade\napt-get -y install build-essential python2.7\napt-get -y install libgmp3-dev bison flex libpcap-dev ppp pptpd iptables make gcc lsof vim\nmkdir \/ztmp\nmkdir \/ztmp\/l2tp\ncd \/ztmp\/l2tp\nwget --no-check-certificate https:\/\/download.openswan.org\/openswan\/openswan-2.6.38.tar.gz\ntar zxvf openswan-2.6.38.tar.gz\ncd openswan-2.6.38\nmake programs install\nrm -rf \/etc\/ipsec.conf\ntouch \/etc\/ipsec.conf\ncat &gt;&gt;\/etc\/ipsec.conf&lt;&lt;EOF\nconfig setup\n    nat_traversal=yes\n    virtual_private=%v4:10.0.0.0\/8,%v4:192.168.0.0\/16,%v4:172.16.0.0\/12\n    oe=off\n    protostack=netkey\n\nconn L2TP-PSK-NAT\n    rightsubnet=vhost:%priv\n    also=L2TP-PSK-noNAT\n\nconn L2TP-PSK-noNAT\n    authby=secret\n    pfs=no\n    auto=add\n    keyingtries=3\n    rekey=no\n    ikelifetime=8h\n    keylife=1h\n    type=transport\n    left=$vpsip\n    leftprotoport=17\/1701\n    right=%any\n    rightprotoport=17\/%any\n\nEOF\ncat &gt;&gt;\/etc\/ipsec.secrets&lt;&lt;EOF\n$vpsip %any: PSK \"$mypsk\"\nEOF\nsed -i 's\/#net.ipv4.ip_forward=1\/net.ipv4.ip_forward=1\/g' \/etc\/sysctl.conf\nsed -i 's\/#net.ipv6.conf.all.forwarding=1\/net.ipv6.conf.all.forwarding=1\/g' \/etc\/sysctl.conf\nsysctl -p\niptables --table nat --append POSTROUTING --jump MASQUERADE\nfor each in \/proc\/sys\/net\/ipv4\/conf\/*\ndo\necho 0 &gt; $each\/accept_redirects\necho 0 &gt; $each\/send_redirects\ndone\n\/etc\/init.d\/ipsec restart\nipsec verify\n\naptitude install xl2tpd ppp\n\nrm -rf \/etc\/xl2tpd\/xl2tpd.conf\ntouch \/etc\/xl2tpd\/xl2tpd.conf\ncat &gt;&gt;\/etc\/xl2tpd\/xl2tpd.conf&lt;&lt;EOF\n[global]\nipsec saref = yes\n[lns default]\nip range = $iprange.128-$iprange.254\nlocal ip = $iprange.1\nrequire chap = yes\nrefuse pap = yes\nrequire authentication = yes\nppp debug = yes\npppoptfile = \/etc\/ppp\/options.xl2tpd\nlength bit = yes\nEOF\nrm -rf \/etc\/ppp\/options.xl2tpd\ntouch \/etc\/ppp\/options.xl2tpd\ncat &gt;&gt;\/etc\/ppp\/options.xl2tpd&lt;&lt;EOF\nrequire-mschap-v2\nms-dns 208.67.222.222\nms-dns 8.8.8.8\nasyncmap 0\nauth\ncrtscts\nlock\nhide-password\nmodem\ndebug\nname l2tpd\nproxyarp\nlcp-echo-interval 30\nlcp-echo-failure 4\nEOF\ncat &gt;&gt;\/etc\/ppp\/chap-secrets&lt;&lt;EOF\nhey l2tpd heyman *\nEOF\ntouch \/usr\/bin\/l2tpstart\necho \"#\/bin\/bash\" &gt;&gt;\/usr\/bin\/l2tpstart\necho \"for each in \/proc\/sys\/net\/ipv4\/conf\/*\" &gt;&gt;\/usr\/bin\/l2tpstart\necho \"do\" &gt;&gt;\/usr\/bin\/l2tpstart\necho \"echo 0 &gt; $each\/accept_redirects\" &gt;&gt;\/usr\/bin\/l2tpstart\necho \"echo 0 &gt; $each\/send_redirects\" &gt;&gt;\/usr\/bin\/l2tpstart\necho \"done\" &gt;&gt;\/usr\/bin\/l2tpstart\nchmod +x \/usr\/bin\/l2tpstart\niptables --table nat --append POSTROUTING --jump MASQUERADE\nl2tpstart\nxl2tpd\ncat &gt;&gt;\/etc\/rc.local&lt;&lt;EOF\niptables --table nat --append POSTROUTING --jump MASQUERADE\n\/etc\/init.d\/ipsec restart\n\/usr\/bin\/l2tpstart\n\/usr\/local\/sbin\/xl2tpd\nEOF\nclear\nipsec verify\nprintf \"\nif there are no [FAILED] above, then you can\nconnect to your L2TP VPN Server with the default\nuser\/pass below:\n\nServerIP:$vpsip\nusername:hey\npassword:heyman\nPSK:$mypsk\n\nMore account infomation, please see: \/etc\/ppp\/chap-sercets\n\"<\/pre>\n<h5>\u603b\u4f53\u8fc7\u7a0b\u5c31\u662f\uff1a<\/h5>\n<p>\u4e00\u3001\u5b89\u88c5 IPSec\u3002\u56e0\u4e3a IPSec \u4f1a\u5bf9 IP \u6570\u636e\u5305\u8fdb\u884c\u52a0\u5bc6\u548c\u9a8c\u8bc1\u3002\u8fd9\u610f\u5473\u7740\u4f60\u7684\u7535\u8111 \/ \u79fb\u52a8\u8bbe\u5907\u4e0e\u670d\u52a1\u5668\u4e4b\u95f4\u4f20\u8f93\u7684\u6570\u636e\u65e0\u6cd5\u88ab\u89e3\u5bc6\u3001\u4e5f\u4e0d\u80fd\u88ab\u4f2a\u9020\u3002\u8fd9\u91cc\u63a8\u8350\u7528 openswan \u8fd9\u4e2a\u540e\u53f0\u8f6f\u4ef6\u5305\u6765\u8dd1 IPSec\u3002<\/p>\n<p>\u4e8c\u3001\u7f16\u8f91 \/etc\/ipsec.conf \u3002<\/p>\n<p>\u4e09\u3001\u7f16\u8f91 \/etc\/ipsec.secrets \u3002<\/p>\n<p>\u56db\u3001\u5f00\u542f\u7aef\u53e3\u8f6c\u53d1\uff1a<br \/>\nfor each in \/proc\/sys\/net\/ipv4\/conf\/*<br \/>\ndo<br \/>\necho 0 &gt; $each\/accept_redirects<br \/>\necho 0 &gt; $each\/send_redirects<br \/>\ndone<\/p>\n<p>\u4e94\u3001\u68c0\u67e5\u4e00\u4e0b IPSec \u80fd\u5426\u6b63\u5e38\u5de5\u4f5c\uff1a<br \/>\nsudo ipsec verify<br \/>\n\u5982\u679c\u5728\u7ed3\u679c\u4e2d\u770b\u5230\u300cOpportunistic Encryption Support\u300d\u88ab\u7981\u7528\u4e86\uff0c\u6ca1\u5173\u7cfb\uff0c\u5176\u4ed6\u9879 OK \u5373\u53ef\u3002<\/p>\n<p>\u516d\u3001\u91cd\u542f openswan:<br \/>\nsudo \/etc\/init.d\/ipsec restart<\/p>\n<p>\u4e03\u3001\u5b89\u88c5 L2TP\u3002\u5e38\u7528\u7684 L2TP \u540e\u53f0\u8f6f\u4ef6\u5305\u662f xl2tpd\uff0c\u5b83\u548c openswan \u662f\u540c\u4e00\u5e2e\u4eba\u5199\u7684\u3002<\/p>\n<p>\u516b\u3001\u7f16\u8f91 \/etc\/xl2tpd\/xl2tpd.conf \u3002<br \/>\n\u9700\u8981\u6ce8\u610f\u7684\u662f ip range \u4e00\u9879\u91cc\u7684 IP \u5730\u5740\u4e0d\u80fd\u548c\u4f60\u6b63\u5728\u7528\u7684 IP \u5730\u5740\u91cd\u5408\uff0c\u4e5f\u4e0d\u53ef\u4e0e\u7f51\u7edc\u4e0a\u7684\u5176\u4ed6 IP \u5730\u5740\u51b2\u7a81\u3002<\/p>\n<p>\u4e5d\u3001\u5b89\u88c5 ppp\u3002\u8fd9\u662f\u7528\u6765\u7ba1\u7406 VPN \u7528\u6237\u7684\u3002<\/p>\n<p>\u5341\u3001\u7f16\u8f91 \/etc\/ppp\/options.xl2tpd \u8fd9\u4e2a\u6587\u4ef6\uff0c\u6ca1\u6709\u7684\u8bdd\u5c31\u5efa\u4e00\u4e2a\u3002<\/p>\n<p>\u5341\u4e00\u3001\u6dfb\u52a0 VPN \u7528\u6237\u3002\u7f16\u8f91 \/etc\/ppp\/chap-secrets\u3002<\/p>\n<p>\u5341\u4e8c\u3001\u91cd\u542f xl2tpd:<br \/>\nsudo \/etc\/init.d\/xl2tpd restart<\/p>\n<p>\u5341\u4e09\u3001\u8bbe\u7f6e iptables \u7684\u6570\u636e\u5305\u8f6c\u53d1\uff1a<br \/>\niptables &#8211;table nat &#8211;append POSTROUTING &#8211;jump MASQUERADE<br \/>\necho 1 &gt; \/proc\/sys\/net\/ipv4\/ip_forward<\/p>\n<p>\u5341\u56db\u3001\u56e0\u4e3a\u67d0\u79cd\u539f\u56e0\uff0copenswan \u5728\u670d\u52a1\u5668\u91cd\u542f\u540e\u65e0\u6cd5\u6b63\u5e38\u81ea\u52a8\uff0c\u6240\u4ee5\u9700\u8981\u7f16\u8f91 \/etc\/rc.local \u6587\u4ef6\u3002<br \/>\n\u5230\u8fd9\u91cc\uff0c\u8bbe\u7f6e\u5de5\u4f5c\u5df2\u7ecf\u57fa\u672c\u5b8c\u6210\u3002\u4f60\u53ef\u4ee5\u7528 Android \u6216 iPhone\/iPad \u8bd5\u7740\u8fde\u4e00\u4e0b\u3002<\/p>\n<p>\u5982\u679c\u8fde\u63a5\u6210\u529f\uff0c\u4e0a\u7f51\u4e5f\u6ca1\u95ee\u9898\u7684\u8bdd\uff0c\u606d\u559c\u4f60\uff0c\u5927\u529f\u544a\u6210\u3002\u5982\u679c\u8fde\u4e0d\u4e0a\uff0c\u6162\u6162\u6392\u67e5\u95ee\u9898\u5427\uff08\u6bd4\u5982\u53ef\u4ee5\u4f7f\u7528\u547d\u4ee4\uff1axl2tpd -D\uff0c\u8fdb\u884c\u8c03\u8bd5\uff09\u3002<\/p>\n<hr \/>\n<p>\u6ce8\u610f\uff1aopenswan \u7684\u7248\u672c\u5bf9\u4e8e\u914d\u7f6e\u80fd\u5426\u6210\u529f\u6709\u5f88\u5927\u7684\u5f71\u54cd\uff0c\u6240\u4ee5\u8bf7\u591a\u5c1d\u8bd5\u3002\u5982\u679c\u505a\u5b8c\u4ee5\u4e0a\u5341\u56db\u6b65\u8fd8\u662f\u8fde\u4e0d\u4e0a\u7684\u8bdd\uff0c\u8bf7\u8003\u8651\u4ece\u6e90\u7801\u7f16\u8bd1 openswan \uff1a<\/p>\n<p>sudo apt-get install -y libgmp3-dev gawk flex bison<br \/>\nwget http:\/\/www.openswan.org\/download\/openswan-2.6.24.tar.gz<br \/>\ntar xf openswan-2.6.24.tar.gz<br \/>\ncd openswan-2.6.24<br \/>\nmake programs<br \/>\nsudo make install<br \/>\n\u7f16\u8bd1\u9700\u8981\u4e00\u6bb5\u65f6\u95f4\u3002\u4f60\u7684 Linux \u5185\u6838\u7248\u672c\u9700\u8981\u9ad8\u4e8e 2.6.6\u3002<\/p>\n<hr \/>\n<h6>\u9644\u4e0a\u4e00\u4e9b\u4e0d\u9519\u7684\u53c2\u8003\u8d44\u6599\uff1a<\/h6>\n<ul>\n<li><a href=\"http:\/\/apple4us.com\/2010\/05\/setting-up-l2tp-vpn-on-debian-ubuntu.html\" target=\"_blank\">\u5982\u4f55\u5728 Debian \/ Ubuntu \u670d\u52a1\u5668\u4e0a\u67b6\u8bbe L2TP \/ IPSec VPN &#8211; Apple4us<\/a><\/li>\n<li><a href=\"https:\/\/help.ubuntu.com\/community\/L2TPServer\" target=\"_blank\">L2TPServer &#8211; Community Help Wiki<\/a><\/li>\n<li><a href=\"https:\/\/www.x-berry.com\/vpn-tunneling-protocol\/\" target=\"_blank\">VPN \u96a7\u9053\u534f\u8baePPTP\u3001L2TP\u3001IPSec\u548cSSLVPN\u7684\u533a\u522b | \u8f6f\u77ff<\/a><\/li>\n<li><a href=\"http:\/\/b.gkp.cc\/2010\/06\/19\/setup-ipsec-l2tp-on-centos-55\/\" target=\"_blank\">Linode CentOS \/ Debian \u90e8\u7f72 ipsec+l2tpd \u7b80\u8981\u7b14\u8bb0<\/a><\/li>\n<li><a href=\"http:\/\/www.esojourn.org\/blog\/post\/setup-l2tp-vpn-server-with-ipsec-in-centos6.php\" target=\"_blank\">\u516d\u6b65\u641e\u5b9acentos 6\u4e0bl2tp + ipsec VPN\u670d\u52a1\u5668\u914d\u7f6e<\/a><\/li>\n<li><a href=\"https:\/\/raymii.org\/s\/tutorials\/IPSEC_L2TP_vpn_on_CentOS_-_Red_Hat_Enterprise_Linux_or_Scientific_-_Linux_6.html\" target=\"_blank\">IPSEC\/L2TP VPN on CentOS 6 \/ Red Hat Enterprise Linux 6 \/ Scientific Linux 6 &#8211; Raymii.org<\/a><\/li>\n<li><a href=\"http:\/\/ftqq.com\/2014\/06\/howto-vpn-on-digitalocean\/\" target=\"_blank\">\u65b9\u7cd6\u8336\u4f1a4\uff1a\u7528DigitalOcean\u4e0a\u79d1\u5b66\u4e0a\u7f51 | \u65b9\u7cd6\u6c14\u7403<\/a><\/li>\n<li><a href=\"http:\/\/blog.kunyu.li\/digitalocean-ubuntu-vps-vpn.html\" target=\"_blank\">DigitalOcean\uff1aubuntu vps\u4e0b\u914d\u7f6evpn | Web Life | \u8ff7\u5931\u4e92\u8054\u7f51<\/a><\/li>\n<li><a href=\"http:\/\/linux.cn\/article-3409-1-rss.html\" target=\"_blank\">\u5982\u4f55\u5728Ubuntu\u4e0b\u914d\u7f6eL2TP VPN &#8211; \u7cfb\u7edf\u8fd0\u7ef4<\/a><\/li>\n<li><a href=\"http:\/\/www.wifay.com\/blog\/2010\/08\/21\/centos-install-ipsec-l2tp-vpn\/\" target=\"_blank\">CentOS 5.5 \u5b89\u88c5 IPSEC \/ L2TP VPN :: wiFay<\/a><\/li>\n<li><a href=\"http:\/\/xfeng.me\/centos-install-l2tp-vpn-note\/\" target=\"_blank\">CentOS\u5b89\u88c5L2TP VPN\u7b14\u8bb0 | \u5c0f\u5cf0\u7f51\u7edc\u9068\u6e38\u8bb0<\/a><\/li>\n<li><a href=\"http:\/\/longtimenoc.com\/archives\/centos%E4%B8%8Al2tp%E5%AE%89%E8%A3%85%E4%B8%8E%E9%85%8D%E7%BD%AE\" target=\"_blank\">CentOS\u4e0aL2TP\u5b89\u88c5\u4e0e\u914d\u7f6e<\/a><\/li>\n<li><a href=\"http:\/\/www.cnblogs.com\/klobohyz\/archive\/2012\/02\/04\/2337775.html\" target=\"_blank\">ipsec\u5b89\u88c5\u597d\u540e\u8fd0\u884cipsec verify\u547d\u4ee4\u53d1\u73b0\u9519\u8bef\u7684\u89e3\u51b3\u65b9\u6848 &#8211; kloboHYZ<\/a><\/li>\n<li><a href=\"http:\/\/www.fish176.com\/2012\/06\/28\/congfig-l2tp-with-ipsec-and-solve-some-problem\/\" target=\"_blank\">CentOs\u4e0bL2tp+IPsec \u914d\u7f6e\u4e0e\u76f8\u5173\u95ee\u9898\u89e3\u51b3<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u4e4b\u524d\u5728\u5de5\u4f5c\u7684\u65f6\u5019\u5c31\u88ab\u5b89\u6392\u4e86\u4e00\u4e2a\u4efb\u52a1\u662f\u914d\u7f6eVPN\uff0c\u4f46\u662f\u5f53\u65f6\u5f04\u4e86\u4e00\u9635\u4e4b\u540e\u53d1\u73b0\u8fde\u63a5\u603b\u662f\u4f1a\u51fa\u73b0\u95ee\u9898\uff08\u53ef\u4ee5\u8fde\u4e0a\uff0c\u4f46\u4e00\u8bbf\u95ee [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,11,12],"tags":[236,237,73,238],"class_list":["post-610","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-linux","category-tools","tag-l2tpipsec","tag-openswan","tag-ubuntu","tag-vpn"],"views":5627,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=610"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/610\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}