{"id":20947,"date":"2023-04-18T18:55:31","date_gmt":"2023-04-18T18:55:31","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=20947"},"modified":"2023-04-19T18:21:02","modified_gmt":"2023-04-19T18:21:02","slug":"use-of-rpki-and-irr-for-network-operation-at-lacnic-39","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/","title":{"rendered":"Use of RPKI and IRR for network operation at LACNIC 39"},"content":{"rendered":"\n<p>A practical tutorial on the use of RPKI and IRR &#8211; scheduled for <a href=\"https:\/\/lacnic39.lacnic.net\/en\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC&nbsp;39<\/a>&nbsp;&#8211; will provide the necessary information, as well as the tools that network operators need to interconnect in a secure manner and avoid routing incidents.&nbsp;<\/p>\n\n\n\n<p>Guillermo Cicileo, Head of Internet Infrastructure Research and Development at LACNIC, and Erika Vega, Chair of the Routing Group of LACNOG, will give a tutorial on <a href=\"https:\/\/lacnic39.lacnic.net\/en\/programme\/agenda\" target=\"_blank\" rel=\"noreferrer noopener\">The Use of RPKI and IRR for Network Operation<\/a> at the event in Merida (Mexico).<\/p>\n\n\n\n<p>&#8220;Have you ever experienced that when making a routing configuration to establish a connection with one or more new peers to and from a network, it appears that the traffic starts to be routed through networks that you don&#8217;t know? Or simply networks that your peers should not advertise to you according to their policies? &#8220;The way we make our announcements and how we receive them from connected networks determines how routers decide to route traffic to its destination, which means that a route leak or misconfiguration can cause packets to be forwarded to the wrong place or allow an attacker or malicious network to intercept or inspect our traffic,&#8221; Vega summarized.<\/p>\n\n\n\n<p>Cicileo and Vega will address the fundamentals and technical aspects of best practices related to routing security in traffic exchange and peering during the workshop at LACNIC 39. Afterwards, they will cover practical issues on current Internet routing problems, and how to secure BGP using <a href=\"https:\/\/www.lacnic.net\/640\/2\/lacnic\/resource-certification-rpki\">RPKI<\/a> and IRR mechanisms. Additionally, they will assist participants in creating ROAs.<\/p>\n\n\n\n<p><strong>Approach<\/strong>. The main topics to be addressed include current routing issues such as route leaks and hijacks, and how to solve them using RPKI and IRR; the creation of ROAs, their use, and validation; general concepts about an IRR (based on <a href=\"https:\/\/www.lacnic.net\/5921\/2\/lacnic\/internet-routing-registry-irr\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC&#8217;s IRR<\/a>), what it is used for, route and route 6 objects, AS-SET, usage examples to configure routers, and other related topics.<\/p>\n\n\n\n<p>They will also work on best practices for network operators and traffic exchange points, as well as the tools available at LACNIC.<\/p>\n\n\n\n<p>In this regard, Cicileo noted that the best practices for network operators to interconnect both in IXP and private networks will be presented.<\/p>\n\n\n\n<p>You can register to participate in person or remotely by clicking <a href=\"https:\/\/lacnic39.lacnic.net\/en\/registration\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><a href=\"https:\/\/lacnic39.lacnic.net\/es\/registro\/\">.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A practical tutorial on the use of RPKI and IRR &#8211; scheduled for LACNIC&nbsp;39&nbsp;&#8211; will provide the necessary information, as well as the tools that network operators need to interconnect in a secure manner and avoid routing incidents.&nbsp; Guillermo Cicileo, Head of Internet Infrastructure Research and Development at LACNIC, and Erika Vega, Chair of the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":20721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[501],"tags":[1283,1292],"archivo":[1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-20947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-events","tag-interconnection","archivo-editions"],"acf":{"author":"","related_notes":[20724]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39\" \/>\n<meta property=\"og:description\" content=\"A practical tutorial on the use of RPKI and IRR &#8211; scheduled for LACNIC&nbsp;39&nbsp;&#8211; will provide the necessary information, as well as the tools that network operators need to interconnect in a secure manner and avoid routing incidents.&nbsp; Guillermo Cicileo, Head of Internet Infrastructure Research and Development at LACNIC, and Erika Vega, Chair of the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-18T18:55:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-19T18:21:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Use of RPKI and IRR for network operation at LACNIC 39\",\"datePublished\":\"2023-04-18T18:55:31+00:00\",\"dateModified\":\"2023-04-19T18:21:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\"},\"wordCount\":380,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png\",\"keywords\":[\"Events\",\"Interconnection\"],\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\",\"name\":\"LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png\",\"datePublished\":\"2023-04-18T18:55:31+00:00\",\"dateModified\":\"2023-04-19T18:21:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use of RPKI and IRR for network operation at LACNIC 39\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39","og_description":"A practical tutorial on the use of RPKI and IRR &#8211; scheduled for LACNIC&nbsp;39&nbsp;&#8211; will provide the necessary information, as well as the tools that network operators need to interconnect in a secure manner and avoid routing incidents.&nbsp; Guillermo Cicileo, Head of Internet Infrastructure Research and Development at LACNIC, and Erika Vega, Chair of the [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2023-04-18T18:55:31+00:00","article_modified_time":"2023-04-19T18:21:02+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Use of RPKI and IRR for network operation at LACNIC 39","datePublished":"2023-04-18T18:55:31+00:00","dateModified":"2023-04-19T18:21:02+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/"},"wordCount":380,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","keywords":["Events","Interconnection"],"articleSection":["Events"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/","url":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/","name":"LACNIC Blog | Use of RPKI and IRR for network operation at LACNIC 39","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","datePublished":"2023-04-18T18:55:31+00:00","dateModified":"2023-04-19T18:21:02+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/use-of-rpki-and-irr-for-network-operation-at-lacnic-39\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Use of RPKI and IRR for network operation at LACNIC 39"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic39-tutoriales.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":20944,"post_title":"Uso de RPKI e IRR para la operaci\u00f3n de redes en LACNIC 39","slug":"uso-de-rpki-e-irr-para-la-operacion-de-redes-en-lacnic-39","href":"https:\/\/blog.lacnic.net\/uso-de-rpki-e-irr-para-la-operacion-de-redes-en-lacnic-39\/"},{"locale":"pt_BR","id":20950,"post_title":"Uso do RPKI e do IRR para opera\u00e7\u00e3o de redes no LACNIC 39","slug":"uso-do-rpki-e-do-irr-para-operar-de-redes-no-lacnic-39","href":"https:\/\/blog.lacnic.net\/pt-br\/uso-do-rpki-e-do-irr-para-operar-de-redes-no-lacnic-39\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=20947"}],"version-history":[{"count":3,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20947\/revisions"}],"predecessor-version":[{"id":20992,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20947\/revisions\/20992"}],"acf:post":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/20724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/20721"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=20947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=20947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=20947"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=20947"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=20947"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=20947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}