{"id":11688,"date":"2021-08-04T18:00:00","date_gmt":"2021-08-04T21:00:00","guid":{"rendered":"https:\/\/made4it.com.br\/blackhole-bgp-huawei\/"},"modified":"2023-03-08T12:07:20","modified_gmt":"2023-03-08T15:07:20","slug":"blackhole-bgp-huawei","status":"publish","type":"post","link":"https:\/\/made4it.com.br\/en\/blackhole-bgp-huawei\/","title":{"rendered":"Blackhole BGP \u2013 Huawei (Huawei NE20, Huawei NE40, Huawei NE8000\/NE8k)"},"content":{"rendered":"\n<p>Now that you know what a <strong>BGP<\/strong> <strong>blackhole<\/strong> is <a href=\"https:\/\/www.made4it.com.br\/rtbh-blackhole-o-que-e\/\" class=\"rank-math-link\">(if you don&#8217;t already know, check out our article on RTBH &#8211; Blackhole)<\/a>. Now it&#8217;s time to configure it and be able to protect yourself from DDoS attacks.<\/p>\n\n<p>To summarize the Blackhole, <strong>it is a technique of sending a route to the \u201cblack hole\u201d or simply making the router discard packets directed to that IP.<\/strong> With the blackhole you can also announce these attacked IPs to your suppliers\/upstreams and thus stop the attacks.<\/p>\n\n<p>Now that I know what it is, now comes the question how to blackhole my router? In today&#8217;s article we are going to show you <strong>how to configure Blackhole on Huawei Routers.<\/strong><\/p>\n\n<p>\n          <br\/>\n          <strong>To do the Blackhole manually we have some steps that are:<\/strong>\n        <\/p>\n\n<ol class=\"wp-block-list\"><li>Identify the attacked IP<\/li><li>Create route to blackhole<\/li><li>Advertise this blackhole route via BGP to your carriers\/upstreams<\/li><\/ol>\n\n<p>You can automate all of this with <a href=\"https:\/\/www.made4it.com.br\/made4flow-analisador-de-netflow\/\" class=\"rank-math-link\">Made4Flow<\/a>, already closing a direct session and not having to do manual work.<\/p>\n\n<p>If you want to know how to automate everything with Made4Flow, check out our next article.<\/p>\n\n<p>Let&#8217;s go to the settings then<\/p>\n\n<p>\n          <strong>1 \u2013 Identify the attacked IP<\/strong>\n        <\/p>\n\n<p>You can do this through Netflow analysis, with Made4Flow, through the graphics and identify through the Raw Data Report, which IP has the most traffic and possibly being the victim of the attack.<br\/><br\/>Within Made4Flow, access, for example, the Interface Graphic by Application and then, clicking on the most used port, you can identify which IP is being attacked.<\/p>\n\n<p>Or through Made4Flow, simply by accessing the Anti-DDoS module -&gt; Active Anomalies<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1854\" height=\"753\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/1.png\" alt=\"\" class=\"wp-image-1800\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/1.png 1854w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/1-300x122.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/1-1024x416.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/1-768x312.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/1-1536x624.png 1536w\" sizes=\"(max-width: 1854px) 100vw, 1854px\" \/><\/a><\/figure>\n\n<p>The attacked IP was: 200.189.56.55 (Example)<\/p>\n\n<p>\n          <strong>2) Create a route to blackhole or Null0<\/strong>\n        <\/p>\n\n<p>After identifying the attacked IP via Made4Flow it is now time to create the route on your Huawei Router to effectively play the IP to Blackhole.<\/p>\n\n<p>Let&#8217;s assume that the attacked IP is 200.200.200.1, let&#8217;s create the route as follows<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/2.png\"><img decoding=\"async\" width=\"1134\" height=\"76\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/2.png\" alt=\"\" class=\"wp-image-1801\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/2.png 1134w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/2-300x20.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/2-1024x69.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/2-768x51.png 768w\" sizes=\"(max-width: 1134px) 100vw, 1134px\" \/><\/a><\/figure>\n\n<p>Applied commands:<\/p>\n\n<p>system-view<br\/>ip route-static 200.200.200.1 32 null 0<\/p>\n\n<p>After applying the route pointing to Null0 this IP will <strong>STOP WORKING!<\/strong><\/p>\n\n<p>You can check the route using the display command:<br\/><br\/>If the route has interface Null0, you are already sending it to Blackhole.<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/3.png\"><img decoding=\"async\" width=\"1730\" height=\"660\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/3.png\" alt=\"\" class=\"wp-image-1802\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/3.png 1730w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/3-300x114.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/3-1024x391.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/3-768x293.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/3-1536x586.png 1536w\" sizes=\"(max-width: 1730px) 100vw, 1730px\" \/><\/a><\/figure>\n\n<p>\n          <strong>3 &#8211; Announce the IP in blackhole via BGP to your operators\/upstreams<\/strong>\n        <\/p>\n\n<p>After identifying and blackhole the route you need to advertise via BGP to your operators\/upstreams.<\/p>\n\n<p>Before configuration, it is always recommended to talk to your Operator\/Upstream to find out which Blackhole BGP community is.<br\/><br\/>The BGP session with your operator needs to be established!<\/p>\n\n<p>For this, we have a few steps:<\/p>\n\n<ol class=\"wp-block-list\"><li>Create the Network within BGP<\/li><\/ol>\n\n<p>To create you must access BGP and create with the network command<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"188\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/4.png\" alt=\"\" class=\"wp-image-1803\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/4.png 980w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/4-300x58.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/4-768x147.png 768w\" sizes=\"(max-width: 980px) 100vw, 980px\" \/><\/a><\/figure>\n\n<p>Commands:<\/p>\n\n<p>System-view<br\/>bgp 65000<br\/>network 200.200.200.1 32<\/p>\n\n<ol class=\"wp-block-list\" start=\"2\"><li>Configure a prefix-list \/ ip-prefix with the attacked IP<\/li><\/ol>\n\n<p>To configure a route-policy in a simple way to send an IP, you must create an ip-prefix to use within the Route-policy<\/p>\n\n<p>In our example, where the IP 200.200.200.1\/32 is attacked, we will use the following command:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1246\" height=\"68\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/5.png\" alt=\"\" class=\"wp-image-1804\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/5.png 1246w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/5-300x16.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/5-1024x56.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/5-768x42.png 768w\" sizes=\"(max-width: 1246px) 100vw, 1246px\" \/><\/a><\/figure>\n\n<p>Command: ip ip-prefix ATTACKED-ID permit 200.200.200.1 32<\/p>\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Configure your Route-Policy to send the attacked IP advertisement<\/li><\/ol>\n\n<p>Before configuring the route-policy, you identify which node (sequence) it will be on. You must put it in a position that does not have a deny before it, as a suggestion I recommend putting it first in the route-policy.<\/p>\n\n<p>To identify the correct name, look at your route-policy and evaluate the number, using the command:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/6.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1562\" height=\"376\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/6.png\" alt=\"\" class=\"wp-image-1805\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/6.png 1562w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/6-300x72.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/6-1024x246.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/6-768x185.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/6-1536x370.png 1536w\" sizes=\"(max-width: 1562px) 100vw, 1562px\" \/><\/a><\/figure>\n\n<p>Command: display current-configuration configuration route-policy OPERATORA-XPTO-OUT<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1140\" height=\"120\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/7.png\" alt=\"\" class=\"wp-image-1806\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/7.png 1140w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/7-300x32.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/7-1024x108.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/7-768x81.png 768w\" sizes=\"(max-width: 1140px) 100vw, 1140px\" \/><\/a><\/figure>\n\n<p>In our case it will be the node with a number less than 1000 to be placed before other configurations. The following configuration was made:<br\/><br\/>Commands:<\/p>\n\n<p>route-policy OPERATOR-XPTO-OUT permit node 100<br\/>if-match ip-prefix IP-ATTACKED<br\/>apply community 666:666<\/p>\n\n<p>The if-match commands make the Huawei router check the ip-prefix thus saying that only the IPs within the prefix list will be advertised via BGP. In the apply community command it says to apply the BGP community to the IPs that matched the ip-prefix.<\/p>\n\n<p>Our XPTO carrier uses community BGP 666:666 to send traffic to Blackhole<\/p>\n\n<p><strong>Tip<\/strong>: Talk to your operator to find out which BGP blackhole community they use!<\/p>\n\n<p>Once this is done, the IP will remain in blackhole and announced to your operator, the attack will cease if it goes to this single IP.<br\/><br\/>The complete configuration looked like this:<br\/><\/p>\n\n<p>bgp 65000<br\/>#<br\/>ipv4-family unicast<br\/>undo synchronization<br\/>network 200.200.200.0 255.255.252.0<br\/>network 200.200.200.1 255.255.255.255<br\/>#<br\/>route-policy OPERATOR-XPTO-OUT permit node 100<br\/>if-match ip-prefix IP-ATTACKED<br\/>apply community 666:666<br\/>#<br\/>route-policy OPERATOR-XPTO-OUT permit node 1000<br\/> if-match ip-prefix MY-BLOCK<br\/>#<br\/>route-policy OPERATOR-XPTO-OUT deny node 50000<br\/>#<br\/>ip ip-prefix MY-BLOCK index 10 permit 200.200.200.0 22<br\/>ip ip-prefix ATTACKED-IP index 10 permit 200.200.200.1 32<br\/>#<br\/>ip route-static 200.200.200.0 255.255.252.0 NULL0<br\/>ip route-static 200.200.200.1 255.255.255.255 NULL0<\/p>\n\n<p class=\"has-text-align-center\">\n          <strong>Automating with Made4Flow<\/strong>\n        <\/p>\n\n<p>With Made4Flow it is possible to automate the blackhole announcement process of attacked IPs.<br\/><br\/>For that we need:<\/p>\n\n<ul class=\"wp-block-list\"><li>\n          <strong>Configure BGP session between Edge Router and Made4Flow<\/strong>\n        <\/li><\/ul>\n\n<p>To configure the BGP session between the Router and Made4Flow, you need to create a route-policy and then the BGP session<\/p>\n\n<p>To configure the route-policy:<br\/><\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"874\" height=\"212\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/8.png\" alt=\"\" class=\"wp-image-1807\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/8.png 874w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/8-300x73.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/8-768x186.png 768w\" sizes=\"(max-width: 874px) 100vw, 874px\" \/><\/a><\/figure>\n\n<p><br\/>Command: route-policy MADE4FLOW-IN permit node 1000<\/p>\n\n<p> apply ip-address next-hop 192.168.66.66<\/p>\n\n<p>In this case it is necessary to add Next-hop manually on the router.<\/p>\n\n<p>Within Made4Flow, you can already advertise with the correct BGP and Next-hop community if you prefer.<\/p>\n\n<ul class=\"wp-block-list\"><li>\n          <strong>Configure Made4Flow to send via Actions<\/strong>\n        <\/li><\/ul>\n\n<p>Within the Anti-DDoS Module, you can access the menu: Actions and Responses and configure the response to send the Blackhole with the correct BGP community:<br\/><\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1214\" height=\"590\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/9.png\" alt=\"\" class=\"wp-image-1808\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/9.png 1214w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/9-300x146.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/9-1024x498.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/9-768x373.png 768w\" sizes=\"(max-width: 1214px) 100vw, 1214px\" \/><\/a><\/figure>\n\n<ul class=\"wp-block-list\"><li>\n          <strong>Configure the Router to Send to Carriers<\/strong>\n        <\/li><\/ul>\n\n<p>To configure to send to operators\/upstreams you need to configure so that the BGP community is identified in the if-match of the outgoing Route-policy.<\/p>\n\n<p>For this we need to configure an ip community-filter<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/10.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1382\" height=\"84\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/10.png\" alt=\"\" class=\"wp-image-1809\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/10.png 1382w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/10-300x18.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/10-1024x62.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/10-768x47.png 768w\" sizes=\"(max-width: 1382px) 100vw, 1382px\" \/><\/a><\/figure>\n\n<p>The next step is to configure the Route-policy of your operator\/upstream, as in sending the blackhole, but now matching the community in the if-match, as in our configuration:<br\/><br\/>To check if you are sending the announcement to the operator use the commands:<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/11.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1056\" height=\"184\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/11.png\" alt=\"\" class=\"wp-image-1810\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/11.png 1056w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/11-300x52.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/11-1024x178.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/11-768x134.png 768w\" sizes=\"(max-width: 1056px) 100vw, 1056px\" \/><\/a><\/figure>\n\n<p>Check if you receive from Made4Flow<\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/12.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1562\" height=\"518\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/12.png\" alt=\"\" class=\"wp-image-1811\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/12.png 1562w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/12-300x99.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/12-1024x340.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/12-768x255.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/12-1536x509.png 1536w\" sizes=\"(max-width: 1562px) 100vw, 1562px\" \/><\/a><\/figure>\n\n<p>Command: display bgp routing-table peer 192.168.120.2 received-routes<\/p>\n\n<p>And if you are sending to the operator:<\/p>\n\n<p><\/p>\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/13.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1610\" height=\"560\" src=\"https:\/\/www.made4it.com.br\/wp-content\/uploads\/2021\/07\/13.png\" alt=\"\" class=\"wp-image-1812\" srcset=\"https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/13.png 1610w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/13-300x104.png 300w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/13-1024x356.png 1024w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/13-768x267.png 768w, https:\/\/made4it.com.br\/wp-content\/uploads\/2021\/07\/13-1536x534.png 1536w\" sizes=\"(max-width: 1610px) 100vw, 1610px\" \/><\/a><\/figure>\n\n<p>Command: display bgp routing-table peer 192.168.100.1 advertised-route<\/p>\n\n<p>Having made these settings, the automation of Made4Flow is ready. Upon receiving an attack, Made4Flow can now send this route to Blackhole.<\/p>\n\n<p>To make it easier, we have the video below, showing in practice how to configure the Huawei Router with Blackhole.<\/p>\n\n          \n\n          <figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n            <div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Como configurar Blackhole em roteadores Huawei\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/b_icgqu-Elc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div>\n          <\/figure>\n          \n\n        \n\n<p>If you have any questions, do not hesitate to contact us via WhatsApp, Social Media or E-mail.<\/p>\n\n<p>\n          <strong>See you next time!<\/strong>\n        <\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Setup a BGP Blackhole on Huawei (Huawei NE20, Huawei NE40, Huawei NE8000\/NE8k)<\/p>\n","protected":false},"author":13,"featured_media":8788,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[352],"tags":[455,454],"class_list":["post-11688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en","tag-blackhole-en-2","tag-huawei-ne20-en"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts\/11688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/comments?post=11688"}],"version-history":[{"count":0,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/posts\/11688\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/media\/8788"}],"wp:attachment":[{"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/media?parent=11688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/categories?post=11688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/made4it.com.br\/en\/wp-json\/wp\/v2\/tags?post=11688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}