{"id":85,"date":"2022-03-11T04:22:20","date_gmt":"2022-03-11T09:22:20","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/chapter\/chapter-3-nat\/"},"modified":"2025-12-11T14:29:57","modified_gmt":"2025-12-11T19:29:57","slug":"source-nat","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/chapter\/source-nat\/","title":{"raw":"3.1 Source NAT","rendered":"3.1 Source NAT"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li style=\"font-weight: 400\">Configure a NAT policy in FortiGate<\/li>\r\n \t<li>Identify source NAT<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Source NAT (SNAT) to reach the Internet from Kali. That means that all traffic from the local network to the Internet should be allowed.<\/div>\r\n&nbsp;\r\n\r\n[caption id=\"attachment_84\" align=\"aligncenter\" width=\"1125\"]<img class=\"wp-image-78 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/04\/5.jpg\" alt=\" Source NAT main scenario\" width=\"1125\" height=\"525\" \/> Figure 3.1: Main scenario[\/caption]\r\n<h2>Source NAT<\/h2>\r\n<div align=\"left\">\r\n<table class=\"aligncenter\" style=\"width: 100%\"><caption>Table 3.1: Devices configuration<\/caption>\r\n<tbody>\r\n<tr style=\"height: 35px\">\r\n<th style=\"width: 157.762px;height: 35px\" scope=\"col\">Device<\/th>\r\n<th style=\"width: 436.7px;height: 35px\" scope=\"col\">IP address<\/th>\r\n<th style=\"width: 158.238px;height: 35px\" scope=\"col\">Access<\/th>\r\n<\/tr>\r\n<tr style=\"height: 35px\">\r\n<td style=\"width: 157.762px;height: 35px\">Kali<\/td>\r\n<td style=\"width: 436.7px;height: 35px\">DHCP Client<\/td>\r\n<td style=\"width: 158.238px;height: 35px\">-<\/td>\r\n<\/tr>\r\n<tr style=\"height: 35px\">\r\n<td style=\"width: 157.762px;height: 35px\">WordPress\/Kali<\/td>\r\n<td style=\"width: 436.7px;height: 35px\">DHCP Client<\/td>\r\n<td style=\"width: 158.238px;height: 35px\">-<\/td>\r\n<\/tr>\r\n<tr style=\"height: 35px\">\r\n<td style=\"width: 157.762px;height: 35px\">Ethernet Switch<\/td>\r\n<td style=\"width: 436.7px;height: 35px\">-<\/td>\r\n<td style=\"width: 158.238px;height: 35px\">-<\/td>\r\n<\/tr>\r\n<tr style=\"height: 53px\">\r\n<td style=\"width: 157.762px;height: 53px\">FortiGate<\/td>\r\n<td style=\"width: 436.7px;height: 53px\"><span style=\"background-color: #ffff00\">Port 2 - (192.168.1.1\/24) -<\/span> DHCP Server (192.168.1.10 to 192.168.1.20)\r\n\r\nPort 3 - DHCP Client\r\n\r\nPort 4 - 10.10.10.1\/24<\/td>\r\n<td style=\"width: 158.238px;height: 53px\">ICMP-HTTP-HTTPS<\/td>\r\n<\/tr>\r\n<tr style=\"height: 35px\">\r\n<td style=\"width: 157.762px;height: 35px\">WebTerm<\/td>\r\n<td style=\"width: 436.7px;height: 35px\">10.10.10.2\/24<\/td>\r\n<td style=\"width: 158.238px;height: 35px\">-<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<h2>Basic Configuration<\/h2>\r\n<ol>\r\n \t<li>Port configuration in the firewall as follows:\r\n\r\n[caption id=\"attachment_84\" align=\"aligncenter\" width=\"930\"]<img class=\"wp-image-79 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1.jpg\" alt=\"Port configuration in the firewall\" width=\"930\" height=\"462\" \/> Figure 3.2: Ports configuration in the firewall[\/caption]<\/li>\r\n \t<li>Set a DHCP server on interface port2 (Range of IP address should be: 192.168.1.10 to 192.168.1.20, DNS: 4.2.2.4).\r\n\r\n[caption id=\"attachment_80\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-80\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1.jpg\" alt=\"Set a DHCP server on interface port2\" width=\"400\" height=\"350\" \/> Figure 3.3: DHCP Server configuration[\/caption]<\/li>\r\n \t<li>Set port3 as a DHCP client and connect to the NAT.\r\n\r\n[caption id=\"attachment_81\" align=\"aligncenter\" width=\"450\"]<img class=\"wp-image-81\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/8.jpg\" alt=\"Set port3 as a DHCP client and connect to the NAT\" width=\"450\" height=\"231\" \/> Figure 3.4: DHCP client configuration[\/caption]<\/li>\r\n \t<li>Set a static route in the firewall to reach to NAT object.\r\n\r\n[caption id=\"attachment_84\" align=\"aligncenter\" width=\"648\"]<img class=\"wp-image-82\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/9.jpg\" alt=\"Set static route in the firewall to reach to NAT object\" width=\"648\" height=\"367\" \/> Figure 3.5: Set a static route[\/caption]<\/li>\r\n \t<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\r\n<ul>\r\n \t<li>Name: <strong>LocalToInternet<\/strong><\/li>\r\n \t<li>From <strong>inside to outside (port2 to port3)<\/strong><\/li>\r\n \t<li>Source: <strong>Create an address for the local network<\/strong> (Subnet: 192.168.1.0\/24)<\/li>\r\n \t<li>Destination: <strong>all<\/strong><\/li>\r\n \t<li>Schedule: <strong>Always<\/strong><\/li>\r\n \t<li>Service: <strong>Only HTTP, HTTPS, and DNS<\/strong><\/li>\r\n \t<li>Action: <strong>Accept<\/strong><\/li>\r\n<\/ul>\r\n[caption id=\"attachment_84\" align=\"aligncenter\" width=\"648\"]<img class=\"wp-image-83\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/10.jpg\" alt=\"Configure Firewall Policy and enable NAT\" width=\"648\" height=\"503\" \/> Figure 3.6: Configure Firewall Policy and enable Source NAT[\/caption]<\/li>\r\n \t<li>Open the browser in Kali, you should be able to access the internet.\r\n\r\n[caption id=\"attachment_84\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-84\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/11.jpg\" alt=\"you should be able to access the internet.\" width=\"500\" height=\"321\" \/> Figure 3.7: Verify your configuration[\/caption]<\/li>\r\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li style=\"font-weight: 400\">Configure a NAT policy in FortiGate<\/li>\n<li>Identify source NAT<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: We are going to enable Source NAT (SNAT) to reach the Internet from Kali. That means that all traffic from the local network to the Internet should be allowed.<\/div>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 1125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-78 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/04\/5.jpg\" alt=\"Source NAT main scenario\" width=\"1125\" height=\"525\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5.jpg 1125w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-300x140.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-1024x478.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-768x358.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-65x30.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-225x105.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/5-350x163.jpg 350w\" sizes=\"auto, (max-width: 1125px) 100vw, 1125px\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Figure 3.1: Main scenario<\/figcaption><\/figure>\n<h2>Source NAT<\/h2>\n<div style=\"text-align: left;\">\n<table class=\"aligncenter\" style=\"width: 100%\">\n<caption>Table 3.1: Devices configuration<\/caption>\n<tbody>\n<tr style=\"height: 35px\">\n<th style=\"width: 157.762px;height: 35px\" scope=\"col\">Device<\/th>\n<th style=\"width: 436.7px;height: 35px\" scope=\"col\">IP address<\/th>\n<th style=\"width: 158.238px;height: 35px\" scope=\"col\">Access<\/th>\n<\/tr>\n<tr style=\"height: 35px\">\n<td style=\"width: 157.762px;height: 35px\">Kali<\/td>\n<td style=\"width: 436.7px;height: 35px\">DHCP Client<\/td>\n<td style=\"width: 158.238px;height: 35px\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 35px\">\n<td style=\"width: 157.762px;height: 35px\">WordPress\/Kali<\/td>\n<td style=\"width: 436.7px;height: 35px\">DHCP Client<\/td>\n<td style=\"width: 158.238px;height: 35px\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 35px\">\n<td style=\"width: 157.762px;height: 35px\">Ethernet Switch<\/td>\n<td style=\"width: 436.7px;height: 35px\">&#8211;<\/td>\n<td style=\"width: 158.238px;height: 35px\">&#8211;<\/td>\n<\/tr>\n<tr style=\"height: 53px\">\n<td style=\"width: 157.762px;height: 53px\">FortiGate<\/td>\n<td style=\"width: 436.7px;height: 53px\"><span style=\"background-color: #ffff00\">Port 2 &#8211; (192.168.1.1\/24) &#8211;<\/span> DHCP Server (192.168.1.10 to 192.168.1.20)<\/p>\n<p>Port 3 &#8211; DHCP Client<\/p>\n<p>Port 4 &#8211; 10.10.10.1\/24<\/td>\n<td style=\"width: 158.238px;height: 53px\">ICMP-HTTP-HTTPS<\/td>\n<\/tr>\n<tr style=\"height: 35px\">\n<td style=\"width: 157.762px;height: 35px\">WebTerm<\/td>\n<td style=\"width: 436.7px;height: 35px\">10.10.10.2\/24<\/td>\n<td style=\"width: 158.238px;height: 35px\">&#8211;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Basic Configuration<\/h2>\n<ol>\n<li>Port configuration in the firewall as follows:<br \/>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 930px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1.jpg\" alt=\"Port configuration in the firewall\" width=\"930\" height=\"462\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1.jpg 930w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1-300x149.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1-768x382.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1-65x32.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1-225x112.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/4-1-350x174.jpg 350w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Figure 3.2: Ports configuration in the firewall<\/figcaption><\/figure>\n<\/li>\n<li>Set a DHCP server on interface port2 (Range of IP address should be: 192.168.1.10 to 192.168.1.20, DNS: 4.2.2.4).<br \/>\n<figure id=\"attachment_80\" aria-describedby=\"caption-attachment-80\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-80\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1.jpg\" alt=\"Set a DHCP server on interface port2\" width=\"400\" height=\"350\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1.jpg 566w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1-300x262.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1-65x57.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1-225x197.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/6-1-350x306.jpg 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-80\" class=\"wp-caption-text\">Figure 3.3: DHCP Server configuration<\/figcaption><\/figure>\n<\/li>\n<li>Set port3 as a DHCP client and connect to the NAT.<br \/>\n<figure id=\"attachment_81\" aria-describedby=\"caption-attachment-81\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-81\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/8.jpg\" alt=\"Set port3 as a DHCP client and connect to the NAT\" width=\"450\" height=\"231\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/8.jpg 640w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/8-300x154.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/8-65x33.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/8-225x115.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/8-350x179.jpg 350w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption id=\"caption-attachment-81\" class=\"wp-caption-text\">Figure 3.4: DHCP client configuration<\/figcaption><\/figure>\n<\/li>\n<li>Set a static route in the firewall to reach to NAT object.<br \/>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 648px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-82\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/9.jpg\" alt=\"Set static route in the firewall to reach to NAT object\" width=\"648\" height=\"367\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Figure 3.5: Set a static route<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Policy &amp; Objects &gt; Firewall Policy<\/strong> section, click <strong>Create New<\/strong> to add a new firewall policy, and configure the following settings:\n<ul>\n<li>Name: <strong>LocalToInternet<\/strong><\/li>\n<li>From <strong>inside to outside (port2 to port3)<\/strong><\/li>\n<li>Source: <strong>Create an address for the local network<\/strong> (Subnet: 192.168.1.0\/24)<\/li>\n<li>Destination: <strong>all<\/strong><\/li>\n<li>Schedule: <strong>Always<\/strong><\/li>\n<li>Service: <strong>Only HTTP, HTTPS, and DNS<\/strong><\/li>\n<li>Action: <strong>Accept<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 648px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-83\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/10.jpg\" alt=\"Configure Firewall Policy and enable NAT\" width=\"648\" height=\"503\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10.jpg 858w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10-300x233.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10-768x596.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10-65x50.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10-225x175.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/10-350x272.jpg 350w\" sizes=\"auto, (max-width: 648px) 100vw, 648px\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Figure 3.6: Configure Firewall Policy and enable Source NAT<\/figcaption><\/figure>\n<\/li>\n<li>Open the browser in Kali, you should be able to access the internet.<br \/>\n<figure id=\"attachment_84\" aria-describedby=\"caption-attachment-84\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-84\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/11.jpg\" alt=\"you should be able to access the internet.\" width=\"500\" height=\"321\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11.jpg 1279w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-300x192.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-1024x657.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-768x492.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-65x42.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-225x144.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/11-350x224.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-84\" class=\"wp-caption-text\">Figure 3.7: Verify your configuration<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n","protected":false},"author":1562,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-85","chapter","type-chapter","status-publish","hentry"],"part":77,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/85","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/1562"}],"version-history":[{"count":15,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/85\/revisions"}],"predecessor-version":[{"id":1150,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/85\/revisions\/1150"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/77"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/85\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=85"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=85"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=85"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=85"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}