{"id":1,"date":"2020-10-18T18:52:07","date_gmt":"2020-10-18T17:52:07","guid":{"rendered":"http:\/\/networkdynamics.nl\/?p=1"},"modified":"2022-12-05T21:56:16","modified_gmt":"2022-12-05T21:56:16","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/networkdynamics.nl\/?p=1","title":{"rendered":"Use a FortiGate with KPN Internet (part 1)"},"content":{"rendered":"\n<p>For the last days, I was working to get my ISP connection @home (Which is from KPN) working with a FortiGate firewall. Well, it was a bit of a puzzle to get this working because information about this topic is very fragmented to find. So, I want to write about what I\u2019ve done to get this working.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What do I have?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internet from KPN (dutch ISP) with FTTH (Fiber-to-the-home) 200\/200 Mbps<\/li>\n\n\n\n<li>Interactive-TV from KPN<\/li>\n\n\n\n<li>I do not use telephony from KPN<\/li>\n\n\n\n<li>Experia box V10A from KPN<\/li>\n\n\n\n<li>FortiGate 60F (FortiOS 6.4)<\/li>\n\n\n\n<li>Internal switch where I can do some vlan-stuff with<\/li>\n<\/ul>\n\n\n\n<p><strong>You MUST use FortiOS 6.4 for this to work. Otherwise, the DHCP-client option which is used for iTV cannot be configured as this option is only available in FortiOS 6.4<\/strong>.<\/p>\n\n\n\n<p><strong>Update 5 dec 2022:<\/strong> some parts of this post are updated for FortiOS 7.2.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What did I want to realize?<\/h3>\n\n\n\n<p>I do not want to use the Experia box of KPN! I want to use my own FortiGate firewall to take over all the functions of the Experia box (apart from WiFi, where I have my own access-points)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What are the topics?<\/h3>\n\n\n\n<p>The topics to build are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internet-connectivity (IPv4 &amp; IPv6)<\/li>\n\n\n\n<li>iTV including replay and recordings<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Building Internet<\/h3>\n\n\n\n<p>My ISP-connection is delivered over fiber, which is delivered with an UTP-connection from the NTU. The UTP cable is going directly into the WAN-port of my FortiGate.<\/p>\n\n\n\n<p>Good to know is that KPN is providing me 3 vlans in total to carry their services:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>vlan 4 = iTV<\/li>\n\n\n\n<li>vlan 5 = Telephony<\/li>\n\n\n\n<li>vlan 6 = Internet<\/li>\n<\/ul>\n\n\n\n<p>So, first I need to create a vlan-interface for vlan 6 on the WAN-port. Because of the PPPoE overhead, the MTU of the WAN-port needs to be set to <strong>1514<\/strong> bytes, and the vlan-interface itself needs to be set to <strong>1506<\/strong> bytes.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>config system interface\n    edit \"wan1\"\n        set mtu-override enable\n        set mtu 1514\n    next\n\n    edit \"internet\"\n        set alias \"vlan6\"\n        set estimated-upstream-bandwidth 200000\n        set estimated-downstream-bandwidth 200000\n        set role wan\n        set snmp-index 8\n        set mtu-override enable\n        set mtu 1506\n        set interface \"wan1\"\n        set vlanid 6\n    next\nend<\/code><\/pre>\n\n\n\n<p>Next, we want to create the PPPoE-Interface. We bind this PPPoE-interface to the wan1 interface.<\/p>\n\n\n\n<pre class=\"wp-block-code has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><em>## This config is applicable to FortiOS 6.4 ##<\/em>\nconfig system interface\n    edit \"pppoe1\"\n        set mode pppoe\n        set allowaccess ping\n        set type tunnel\n        set estimated-upstream-bandwidth 200000\n        set estimated-downstream-bandwidth 200000\n        config ipv6\n            set ip6-mode dhcp\n            set ip6-allowaccess ping\n            set dhcp6-prefix-delegation enable\n        end\n        set interface \"internet\"\n    next\nend<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code has-vivid-cyan-blue-color has-black-background-color has-text-color has-background\"><code><em>## This part is for FortiOS 7.2. The v6-ranges should match the range which is received from KPN ##<\/em>\nconfig system interface\n    edit \"wan1\"\n        set vdom \"root\"\n        set status down\n        set type physical\n        set alias \"KPN\"\n        set role wan\n        set mtu-override enable\n        set mtu 1506\n    next\n    edit \"pppoe\"\n        set vdom \"root\"\n        set mode pppoe\n        set allowaccess ping\n        set type tunnel\n        set alias \"internet\"\n        set role wan\n        config ipv6\n            set ip6-mode dhcp\n            set dhcp6-prefix-delegation enable\n            config dhcp6-iapd-list\n                edit 5\n                    set prefix-hint 2a02:aaaa:bbbb::\/48\n                next\n            end\n        end\n        set interface \"wan1\"\n    next\nend<\/code><\/pre>\n\n\n\n<p>Note the config ipv6 IPv6 part; this part is neccesary to get an IPv6-prefix, which is advertised by the ISP via DHCPv6 prefix-delegation or DHCPv6-PD.<\/p>\n\n\n\n<p>When we take a look of the PPPoE interface-part in the GUI of the FortiGate, you should see the IPv4 address which we have got from KPN.<\/p>\n\n\n\n<p>we can also see that there is nothing visible about the DHCPv6-PD config. So, this part is only visible (and configurable) under the CLI.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"839\" height=\"756\" src=\"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png\" alt=\"\" class=\"wp-image-37\" srcset=\"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png 839w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1-300x270.png 300w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1-768x692.png 768w\" sizes=\"auto, (max-width: 839px) 100vw, 839px\" \/><\/figure>\n\n\n\n<p>If everything is okay, it should be possible to send some pings to hosts on the Internet over IPv4.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>FGT60F # execute ping www.google.com\nPING www.google.com (172.217.19.196): 56 data bytes\n64 bytes from 172.217.19.196: icmp_seq=0 ttl=119 time=3.4 ms\n64 bytes from 172.217.19.196: icmp_seq=1 ttl=119 time=3.4 ms\n64 bytes from 172.217.19.196: icmp_seq=2 ttl=119 time=3.4 ms\n64 bytes from 172.217.19.196: icmp_seq=3 ttl=119 time=3.4 ms\n64 bytes from 172.217.19.196: icmp_seq=4 ttl=119 time=3.4 ms\n\n--- www.google.com ping statistics ---\n5 packets transmitted, 5 packets received, 0% packet loss\nround-trip min\/avg\/max = 3.4\/3.4\/3.4 ms<\/code><\/pre>\n\n\n\n<p>If your ping is working, then you have succesfully configured an IPv4 Internet-connection with your FortiGate. Now you can start with building your IPv4 policy-rules for your internal vlan (which is not part of this post).<\/p>\n\n\n\n<p>At this moment, it is not possible (yet) to ping an IPv6 host on the Internet:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>FGT60F # execute ping6 ipv6.google.com\nconnect: Network is unreachable<\/code><\/pre>\n\n\n\n<p>The ping6 is not working because there is no route for IPv6 defined. We need to do this statically. We point the IPv6 default-route to the pppoe1 interface.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>config router static6\n    edit 1\n        set device \"pppoe1\"\n    next\nend<\/code><\/pre>\n\n\n\n<p>After this, you should be able to ping an IPv6 host:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>FGT60F # exec ping6 ipv6.google.com\nPING ipv6.google.com(2a00:1450:400e:806::200e) 56 data bytes\n64 bytes from 2a00:1450:400e:806::200e: icmp_seq=1 ttl=120 time=3.71 ms\n64 bytes from 2a00:1450:400e:806::200e: icmp_seq=2 ttl=120 time=3.73 ms\n64 bytes from 2a00:1450:400e:806::200e: icmp_seq=3 ttl=120 time=3.66 ms\n64 bytes from 2a00:1450:400e:806::200e: icmp_seq=4 ttl=120 time=3.66 ms\n64 bytes from 2a00:1450:400e:806::200e: icmp_seq=5 ttl=120 time=3.68 ms<\/code><\/pre>\n\n\n\n<p>Now IPv6 is working to the outside world, we need to route it internally so that hosts can get an IPv6 address (Global Unicast). Therefore, we need to configure an IPv6-prefix on the inside interface of the FortiGate.<\/p>\n\n\n\n<p>As KPN is giving you a \/48 prefix, we can assign an \/64 prefix to the internal network. The hosts which are internally, are getting an IPv6 address using SLAAC, which is the most easiest way to address your hosts for IPv6. Another option is to configure DHCPv6 (not part of this post).<\/p>\n\n\n\n<p>Note that the 2a02:xxxx:xxxx:xxxx::\/64 part of the config should be your IPv6 range which is allocated to you by KPN. If you don\u2019t know this prefix, you can find this when you connect your Experia box and take a look in the web-interface.<\/p>\n\n\n\n<pre class=\"wp-block-code has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><em>## This part is applicable to FortiOS 6.4 ##<\/em>\nconfig system interface\n    edit \"internal\"\n        set ip 10.1.1.1 255.255.255.0\n        set allowaccess ping https ssh http fgfm\n        set role lan\n        config ipv6\n            set ip6-mode delegated\n            set ip6-allowaccess ping\n            set ip6-send-adv enable\n            set ip6-upstream-interface \"pppoe1\"\n            set ip6-subnet 2a02:xxxx:xxxx:xxxx::\/64\n            config ip6-delegated-prefix-list\n                edit 1\n                    set upstream-interface \"pppoe1\"\n                    set subnet 2a02:xxxx:xxxx:xxxx::\/64\n                next\n            end\n        end\n    next\nend<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code has-vivid-cyan-blue-color has-black-background-color has-text-color has-background\"><code>## <em>This part is applicable to FortiOS 7.2. Mention the \"5\" for the prefix-iaid. This number MUST MATCH the dhcp6-iapd-list rule-index number (edit 5), which is under the pppoe logical-interface<\/em> ##<em>\n<\/em>    edit \"internal\"\n        set vdom \"root\"\n        set ip 10.1.1.1 255.255.255.0\n        set allowaccess ping https ssh fabric\n        set type hard-switch\n        set role lan\n        config ipv6\n            set ip6-send-adv enable\n            config ip6-delegated-prefix-list\n                edit 1\n                    set upstream-interface \"pppoe\"\n                    set delegated-prefix-iaid 5\n                    set subnet 2a02:aaaa:bbbb:10::\/64\n                next\n            end\n        end\n    next\nend<\/code><\/pre>\n\n\n\n<p>When this config is done, you should be able to check if the IPv6-prefix is allocated to the internal interface.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>FGT60F # diagnose ipv6 address list\n#--- output ommitted ---\ndev=25 devname=internal flag= scope=0 prefix=64 addr=2a02:xxxx:xxxx:xxxx:: preferred=171972 valid=258372 cstamp=10939 tstamp=10939\n\n#--- output ommitted ---<\/code><\/pre>\n\n\n\n<p>Note: I\u2019ve seen that I need to restart the firewall to get this step done.<\/p>\n\n\n\n<p>The final thing to do to get IPv6 working for your hosts, is to create a policy-rule for v6 in the FortiGate <strong>without NAT<\/strong>. Since NAT is not usual with IPv6, we do not enable this.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>config firewall policy\n    edit 0\n        set name \"outbound-internet v6\"\n        set srcintf \"internal\"\n        set dstintf \"pppoe1\"\n        set srcaddr6 \"all\"\n        set dstaddr6 \"all\"\n        set action accept\n        set schedule \"always\"\n        set service \"ALL\"\n        set utm-status enable\n\tnext\nend<\/code><\/pre>\n\n\n\n<p>Now, as we take an internal host (I have a Win10 PC) then you can try to do an ipconfig \/all to see your IPv6 addresses (you will get 2 temporary adresses).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"316\" src=\"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2-1024x316.png\" alt=\"\" class=\"wp-image-39\" srcset=\"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2-1024x316.png 1024w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2-300x93.png 300w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2-768x237.png 768w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2-1200x371.png 1200w, https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/2.png 1223w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Test your IPv6 connectivity: https:\/\/ipv6-test.com\/<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Building interactive-TV<\/h2>\n\n\n\n<p>See part 2.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the last days, I was working to get my ISP connection @home (Which is from KPN) working with a FortiGate firewall. Well, it was a bit of a puzzle to get this working because information about this topic is very fragmented to find. So, I want to write about what I\u2019ve done to get [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,14,16],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-kpn","category-kpn-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/networkdynamics.nl\/?p=1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es\" \/>\n<meta property=\"og:description\" content=\"For the last days, I was working to get my ISP connection @home (Which is from KPN) working with a FortiGate firewall. Well, it was a bit of a puzzle to get this working because information about this topic is very fragmented to find. So, I want to write about what I\u2019ve done to get [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/networkdynamics.nl\/?p=1\" \/>\n<meta property=\"og:site_name\" content=\"Pee.Bee.Es\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-18T17:52:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-05T21:56:16+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png\" \/>\n<meta name=\"author\" content=\"peter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"peter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/networkdynamics.nl\/?p=1\",\"url\":\"https:\/\/networkdynamics.nl\/?p=1\",\"name\":\"Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es\",\"isPartOf\":{\"@id\":\"https:\/\/networkdynamics.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/networkdynamics.nl\/?p=1#primaryimage\"},\"image\":{\"@id\":\"https:\/\/networkdynamics.nl\/?p=1#primaryimage\"},\"thumbnailUrl\":\"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png\",\"datePublished\":\"2020-10-18T17:52:07+00:00\",\"dateModified\":\"2022-12-05T21:56:16+00:00\",\"author\":{\"@id\":\"https:\/\/networkdynamics.nl\/#\/schema\/person\/950dc6fa890f7e89ca07f5219f910bfc\"},\"breadcrumb\":{\"@id\":\"https:\/\/networkdynamics.nl\/?p=1#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/networkdynamics.nl\/?p=1\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/networkdynamics.nl\/?p=1#primaryimage\",\"url\":\"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png\",\"contentUrl\":\"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png\",\"width\":839,\"height\":756},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/networkdynamics.nl\/?p=1#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/networkdynamics.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use a FortiGate with KPN Internet (part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/networkdynamics.nl\/#website\",\"url\":\"https:\/\/networkdynamics.nl\/\",\"name\":\"Pee.Bee.Es\",\"description\":\"A tiny blog with a bit of networking\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/networkdynamics.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/networkdynamics.nl\/#\/schema\/person\/950dc6fa890f7e89ca07f5219f910bfc\",\"name\":\"peter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/networkdynamics.nl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/af489b1ac40f471a937d0df5a8250c4bd6798e691b989ac873e30b9a6323192b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/af489b1ac40f471a937d0df5a8250c4bd6798e691b989ac873e30b9a6323192b?s=96&d=mm&r=g\",\"caption\":\"peter\"},\"sameAs\":[\"http:\/\/networkdynamics.nl\"],\"url\":\"https:\/\/networkdynamics.nl\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/networkdynamics.nl\/?p=1","og_locale":"en_US","og_type":"article","og_title":"Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es","og_description":"For the last days, I was working to get my ISP connection @home (Which is from KPN) working with a FortiGate firewall. Well, it was a bit of a puzzle to get this working because information about this topic is very fragmented to find. So, I want to write about what I\u2019ve done to get [&hellip;]","og_url":"https:\/\/networkdynamics.nl\/?p=1","og_site_name":"Pee.Bee.Es","article_published_time":"2020-10-18T17:52:07+00:00","article_modified_time":"2022-12-05T21:56:16+00:00","og_image":[{"url":"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png","type":"","width":"","height":""}],"author":"peter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"peter","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/networkdynamics.nl\/?p=1","url":"https:\/\/networkdynamics.nl\/?p=1","name":"Use a FortiGate with KPN Internet (part 1) - Pee.Bee.Es","isPartOf":{"@id":"https:\/\/networkdynamics.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/networkdynamics.nl\/?p=1#primaryimage"},"image":{"@id":"https:\/\/networkdynamics.nl\/?p=1#primaryimage"},"thumbnailUrl":"http:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png","datePublished":"2020-10-18T17:52:07+00:00","dateModified":"2022-12-05T21:56:16+00:00","author":{"@id":"https:\/\/networkdynamics.nl\/#\/schema\/person\/950dc6fa890f7e89ca07f5219f910bfc"},"breadcrumb":{"@id":"https:\/\/networkdynamics.nl\/?p=1#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/networkdynamics.nl\/?p=1"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/networkdynamics.nl\/?p=1#primaryimage","url":"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png","contentUrl":"https:\/\/networkdynamics.nl\/wp-content\/uploads\/2020\/10\/1.png","width":839,"height":756},{"@type":"BreadcrumbList","@id":"https:\/\/networkdynamics.nl\/?p=1#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/networkdynamics.nl\/"},{"@type":"ListItem","position":2,"name":"Use a FortiGate with KPN Internet (part 1)"}]},{"@type":"WebSite","@id":"https:\/\/networkdynamics.nl\/#website","url":"https:\/\/networkdynamics.nl\/","name":"Pee.Bee.Es","description":"A tiny blog with a bit of networking","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/networkdynamics.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/networkdynamics.nl\/#\/schema\/person\/950dc6fa890f7e89ca07f5219f910bfc","name":"peter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/networkdynamics.nl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/af489b1ac40f471a937d0df5a8250c4bd6798e691b989ac873e30b9a6323192b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/af489b1ac40f471a937d0df5a8250c4bd6798e691b989ac873e30b9a6323192b?s=96&d=mm&r=g","caption":"peter"},"sameAs":["http:\/\/networkdynamics.nl"],"url":"https:\/\/networkdynamics.nl\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":25,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkdynamics.nl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}