{"id":83,"date":"2022-03-11T04:22:20","date_gmt":"2022-03-11T09:22:20","guid":{"rendered":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/source-nat\/"},"modified":"2023-08-29T16:26:20","modified_gmt":"2023-08-29T20:26:20","slug":"source-nat","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/fortigatefirewall\/chapter\/source-nat\/","title":{"raw":"3.1 Source NAT","rendered":"3.1 Source NAT"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n \t<li style=\"font-weight: 400;\">Configure a NAT policy in FortiGate<\/li>\n \t<li>Identify source NAT<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Source NAT (SNAT) to reach the Internet from Kali. That means that all traffic from the local network to the Internet should be allowed.<\/div>\n&nbsp;\n\n[caption id=\"attachment_76\" align=\"aligncenter\" width=\"1125\"]<img class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\" Source NAT main scenario\" width=\"1125\" height=\"525\"> Figure 3.1: Main scenario[\/caption]\n<h2>Source NAT<\/h2>\n<div align=\"left\">\n<table class=\"aligncenter\" style=\"width: 100%;\"><caption>Table 3.1: Devices configuration<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"width: 157.762px; height: 35px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 436.7px; height: 35px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 158.238px; height: 35px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">Kali<\/td>\n<td style=\"width: 436.7px; height: 35px;\">DHCP Client<\/td>\n<td style=\"width: 158.238px; height: 35px;\">-<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">WordPress\/Kali<\/td>\n<td style=\"width: 436.7px; height: 35px;\">DHCP Client<\/td>\n<td style=\"width: 158.238px; height: 35px;\">-<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">Ethernet Switch<\/td>\n<td style=\"width: 436.7px; height: 35px;\">-<\/td>\n<td style=\"width: 158.238px; height: 35px;\">-<\/td>\n<\/tr>\n<tr style=\"height: 53px;\">\n<td style=\"width: 157.762px; height: 53px;\">FortiGate<\/td>\n<td style=\"width: 436.7px; height: 53px;\">Port 2 - (192.168.1.1\/24) - DHCP Server (192.168.1.10 to 192.168.1.20)\n\nPort 3 - DHCP Client\n\nPort 4 - 10.10.10.1\/24<\/td>\n<td style=\"width: 158.238px; height: 53px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">WebTerm<\/td>\n<td style=\"width: 436.7px; height: 35px;\">10.10.10.2\/24<\/td>\n<td style=\"width: 158.238px; height: 35px;\">-<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Basic Configuration<\/h2>\n<ol>\n \t<li>Port configuration in the firewall as follows:\n\n[caption id=\"attachment_77\" align=\"aligncenter\" width=\"930\"]<img class=\"wp-image-77 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1.jpg\" alt=\"Port configuration in the firewall\" width=\"930\" height=\"462\"> Figure 3.2: Ports configuration in the firewall[\/caption]<\/li>\n \t<li>Set a DHCP server on interface port2 (Range of IP address should be: 192.168.1.10 to 192.168.1.20, DNS: 4.2.2.4).\n\n[caption id=\"attachment_78\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-78\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1.jpg\" alt=\"Set a DHCP server on interface port2\" width=\"400\" height=\"350\"> Figure 3.3: DHCP Server configuration[\/caption]<\/li>\n \t<li>Set port3 as a DHCP client and connect to the NAT.\n\n[caption id=\"attachment_79\" align=\"aligncenter\" width=\"450\"]<img class=\"wp-image-79\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/8.jpg\" alt=\"Set port3 as a DHCP client and connect to the NAT\" width=\"450\" height=\"231\"> Figure 3.4: DHCP client configuration[\/caption]<\/li>\n \t<li>Set a static route in the firewall to reach to NAT object.\n\n[caption id=\"attachment_80\" align=\"aligncenter\" width=\"648\"]<img class=\"wp-image-80\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/9.jpg\" alt=\"Set static route in the firewall to reach to NAT object\" width=\"648\" height=\"367\"> Figure 3.5: Set a static route[\/caption]<\/li>\n \t<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\n<ul>\n \t<li>Name: <strong>LocalToInternet<\/strong><\/li>\n \t<li>From <strong>inside to outside (port2 to port3)<\/strong><\/li>\n \t<li>Source: <strong>Create an address for the local network<\/strong> (Subnet: 192.168.1.0\/24)<\/li>\n \t<li>Destination: <strong>all<\/strong><\/li>\n \t<li>Schedule: <strong>Always<\/strong><\/li>\n \t<li>Service: <strong>Only HTTP, HTTPS, and DNS<\/strong><\/li>\n \t<li>Action: <strong>Accept<\/strong><\/li>\n<\/ul>\n[caption id=\"attachment_81\" align=\"aligncenter\" width=\"648\"]<img class=\"wp-image-81\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/10.jpg\" alt=\"Configure Firewall Policy and enable NAT\" width=\"648\" height=\"503\"> Figure 3.6: Configure Firewall Policy and enable Source NAT[\/caption]<\/li>\n \t<li>Open the browser in Kali, you should be able to access the internet.\n\n[caption id=\"attachment_82\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-82\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/11.jpg\" alt=\"you should be able to access the internet.\" width=\"500\" height=\"321\"> Figure 3.7: Verify your configuration[\/caption]<\/li>\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li style=\"font-weight: 400;\">Configure a NAT policy in FortiGate<\/li>\n<li>Identify source NAT<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Source NAT (SNAT) to reach the Internet from Kali. That means that all traffic from the local network to the Internet should be allowed.<\/div>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_76\" aria-describedby=\"caption-attachment-76\" style=\"width: 1125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-76 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg\" alt=\"Source NAT main scenario\" width=\"1125\" height=\"525\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5.jpg 1125w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-300x140.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-1024x478.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-768x358.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-65x30.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-225x105.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2022\/04\/5-350x163.jpg 350w\" sizes=\"auto, (max-width: 1125px) 100vw, 1125px\" \/><figcaption id=\"caption-attachment-76\" class=\"wp-caption-text\">Figure 3.1: Main scenario<\/figcaption><\/figure>\n<h2>Source NAT<\/h2>\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%;\">\n<caption>Table 3.1: Devices configuration<\/caption>\n<tbody>\n<tr style=\"height: 35px;\">\n<th style=\"width: 157.762px; height: 35px;\" scope=\"col\">Device<\/th>\n<th style=\"width: 436.7px; height: 35px;\" scope=\"col\">IP address<\/th>\n<th style=\"width: 158.238px; height: 35px;\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">Kali<\/td>\n<td style=\"width: 436.7px; height: 35px;\">DHCP Client<\/td>\n<td style=\"width: 158.238px; height: 35px;\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">WordPress\/Kali<\/td>\n<td style=\"width: 436.7px; height: 35px;\">DHCP Client<\/td>\n<td style=\"width: 158.238px; height: 35px;\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">Ethernet Switch<\/td>\n<td style=\"width: 436.7px; height: 35px;\">&#8211;<\/td>\n<td style=\"width: 158.238px; height: 35px;\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 53px;\">\n<td style=\"width: 157.762px; height: 53px;\">FortiGate<\/td>\n<td style=\"width: 436.7px; height: 53px;\">Port 2 &#8211; (192.168.1.1\/24) &#8211; DHCP Server (192.168.1.10 to 192.168.1.20)<\/p>\n<p>Port 3 &#8211; DHCP Client<\/p>\n<p>Port 4 &#8211; 10.10.10.1\/24<\/td>\n<td style=\"width: 158.238px; height: 53px;\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr style=\"height: 35px;\">\n<td style=\"width: 157.762px; height: 35px;\">WebTerm<\/td>\n<td style=\"width: 436.7px; height: 35px;\">10.10.10.2\/24<\/td>\n<td style=\"width: 158.238px; height: 35px;\">&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Basic Configuration<\/h2>\n<ol>\n<li>Port configuration in the firewall as follows:<br \/>\n<figure id=\"attachment_77\" aria-describedby=\"caption-attachment-77\" style=\"width: 930px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-77 size-full\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1.jpg\" alt=\"Port configuration in the firewall\" width=\"930\" height=\"462\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1.jpg 930w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-300x149.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-768x382.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-65x32.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-225x112.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/4-1-350x174.jpg 350w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><figcaption id=\"caption-attachment-77\" class=\"wp-caption-text\">Figure 3.2: Ports configuration in the firewall<\/figcaption><\/figure>\n<\/li>\n<li>Set a DHCP server on interface port2 (Range of IP address should be: 192.168.1.10 to 192.168.1.20, DNS: 4.2.2.4).<br \/>\n<figure id=\"attachment_78\" aria-describedby=\"caption-attachment-78\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-78\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1.jpg\" alt=\"Set a DHCP server on interface port2\" width=\"400\" height=\"350\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1.jpg 566w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1-300x262.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1-65x57.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1-225x197.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/6-1-350x306.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-78\" class=\"wp-caption-text\">Figure 3.3: DHCP Server configuration<\/figcaption><\/figure>\n<\/li>\n<li>Set port3 as a DHCP client and connect to the NAT.<br \/>\n<figure id=\"attachment_79\" aria-describedby=\"caption-attachment-79\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/8.jpg\" alt=\"Set port3 as a DHCP client and connect to the NAT\" width=\"450\" height=\"231\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8.jpg 640w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-300x154.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-65x33.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-225x115.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/8-350x179.jpg 350w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption id=\"caption-attachment-79\" class=\"wp-caption-text\">Figure 3.4: DHCP client configuration<\/figcaption><\/figure>\n<\/li>\n<li>Set a static route in the firewall to reach to NAT object.<br \/>\n<figure id=\"attachment_80\" aria-describedby=\"caption-attachment-80\" style=\"width: 648px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/9.jpg\" alt=\"Set static route in the firewall to reach to NAT object\" width=\"648\" height=\"367\" \/><figcaption id=\"caption-attachment-80\" class=\"wp-caption-text\">Figure 3.5: Set a static route<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\n<ul>\n<li>Name: <strong>LocalToInternet<\/strong><\/li>\n<li>From <strong>inside to outside (port2 to port3)<\/strong><\/li>\n<li>Source: <strong>Create an address for the local network<\/strong> (Subnet: 192.168.1.0\/24)<\/li>\n<li>Destination: <strong>all<\/strong><\/li>\n<li>Schedule: <strong>Always<\/strong><\/li>\n<li>Service: <strong>Only HTTP, HTTPS, and DNS<\/strong><\/li>\n<li>Action: <strong>Accept<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_81\" aria-describedby=\"caption-attachment-81\" style=\"width: 648px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-81\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/10.jpg\" alt=\"Configure Firewall Policy and enable NAT\" width=\"648\" height=\"503\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10.jpg 858w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-300x233.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-768x596.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-65x50.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-225x175.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/10-350x272.jpg 350w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><figcaption id=\"caption-attachment-81\" class=\"wp-caption-text\">Figure 3.6: Configure Firewall Policy and enable Source NAT<\/figcaption><\/figure>\n<\/li>\n<li>Open the browser in Kali, you should be able to access the internet.<br \/>\n<figure id=\"attachment_82\" aria-describedby=\"caption-attachment-82\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82\" src=\"https:\/\/opentextbc.ca\/wp-content\/uploads\/sites\/438\/2023\/08\/11.jpg\" alt=\"you should be able to access the internet.\" width=\"500\" height=\"321\" srcset=\"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11.jpg 1279w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-300x192.jpg 300w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-1024x657.jpg 1024w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-768x492.jpg 768w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-65x42.jpg 65w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-225x144.jpg 225w, https:\/\/opentextbc.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/438\/2023\/08\/11-350x224.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-82\" class=\"wp-caption-text\">Figure 3.7: Verify your configuration<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n","protected":false},"author":124,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-83","chapter","type-chapter","status-publish","hentry"],"part":75,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/124"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/83\/revisions"}],"predecessor-version":[{"id":84,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/83\/revisions\/84"}],"part":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/75"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/83\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=83"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=83"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}