{"id":718,"date":"2021-03-25T08:35:39","date_gmt":"2021-03-25T14:35:39","guid":{"rendered":"http:\/\/jmcristobal.com.mx\/?p=718"},"modified":"2022-02-13T01:17:35","modified_gmt":"2022-02-13T09:17:35","slug":"stp-features-de-proteccion","status":"publish","type":"post","link":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/2021\/03\/25\/stp-features-de-proteccion\/","title":{"rendered":"STP: Features de protecci\u00f3n"},"content":{"rendered":"<h4>Root Guard<\/h4>\n<p>La funci\u00f3n Root Guard se desarroll\u00f3 como un medio para controlar cuando un switch candidato a root bridge se conecta a la red.<\/p>\n<p>Registra el bridge ID del actual root bridge de la topologia y no permite  que otro switch env\u00ede BPDu superiores por alg\u00fan puerto donde esta habilitado root guard. En caso de que se reciba un BPDU superior, el puerto pasa a estado root-inconsistent. Este mecanismo evita que un switch nuevo agregado a la red u otro switch con un bridge id menor (prioridad + MAC) al del root bridge actual se convierta en el nuevo root bridge y por ende un nuevo c\u00e1lculo en la topolog\u00eda completa STP.<\/p>\n<p>Root Guard designa que un puerto solo puede enviar o retransmitir BPDU pero no puede recibir BPDUs. Root Guard evita que el puerto se convierta en un puerto ra\u00edz donde las BPDU normalmente se recibir\u00edan desde el root bridge.<\/p>\n<p>En resumen, si por un puerto configurado con root guard un switch trata de ser el root bridge, root guard bloquear\u00e1 el puerto.<\/p>\n<p>Puede habilitar Root Guard s\u00f3lo por puerto. Por defecto, est\u00e1 deshabilitado en todos los puertos del switch. Para habilitarlo, use el siguiente comando de configuraci\u00f3n de interfaz:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config-if)# spanning-tree guard root<\/pre>\n<p>Para visualizar el estado un puerto que root guard ha puesto en root-inconsistente utilice:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch# show spanning-tree inconsistentports<\/pre>\n<h4>BPDU Guard<\/h4>\n<p>Desarrollado para proteger los puertos de acceso configurados con Portfast. Recordemos que portfast pasa el puerto directo al estado forwarding sin pasar por  otros estados. En caso de que un puerto configurado con BPDU Guard reciba un BPDU el puerto pasa a estado errdisable.<\/p>\n<p>BPDU Guard evita cualquier posibilidad de que se agregue un switch al puerto ya sea intencionalmente o por error y as\u00ed evitar un posible loop. Una aplicaci\u00f3n obvia para BPDU Guard es en los puertos del switch de la capa de acceso donde se conectan los usuarios y otros dispositivos finales.<\/p>\n<p>Por defecto BPDU Guard est\u00e1 deshabilitado en todos los puertos del switch. Podemos configurarlo de manera global con el siguiente comando:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config)# spanning-tree portfast bpduguard<\/pre>\n<p>El comando anterior habilitar\u00e1 bpdu guard en todos los puertos que est\u00e9n como portfast.<\/p>\n<p>Otra forma de habilitarlo es manualmente en cada en cada interfaz:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config-if)# spanning-tree bpduguard enable<\/pre>\n<h4>Loop guard:<\/h4>\n<p>Mantiene un monitoreo en los puertos no designados o root para validar que se est\u00e9n recibiendo BPDUs por estos puertos . Si los BPDU son recibidos continuamente, el puerto trabaja normal. Si los BPDU dejan de ser recibidos, el puerto autom\u00e1ticamente pasa  a estado \u201cloop-inconsistent\u201d para prevenir un posible loop.<\/p>\n<p>Por ejemplo, supongamos que tenemos un enlace entre SwitchA y SwtchB, el Switch A tiene el puerto Designado-Forwarding y el SwitchB en Alterno-Blocking para evitar loops. Supongamos que SwitchA presenta un problema de sobrecarga de memoria o cpu  y por tal motivo le deja de enviar BPDU al puerto Alterno del SwitchB, entonces el SwitchB con el puerto alterno espera sus 20 segundos de Max Age, despu\u00e9s pasar\u00e1 a listening 15 seg, learning 15 seg y al final a forwarding lo cual provocar\u00eda un posible loop debido a que el SwitchA con sobrecarga va a terner sus puertos en Forwarding. Este aqu\u00ed donde entra Loop Guard colocando el el puerto alterno del SwitchB en estado loop-inconsistent y lo bloquea para evitar posibles loops.<\/p>\n<p>Por defecto, Loop Guard est\u00e1 deshabilitado en todos los puertos del switch. Puede habilitar Loop Guard como un valor predeterminado global, que afecta a todos los puertos del conmutador, con el siguiente comando de configuraci\u00f3n global:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config)# spanning-tree loopguard default<\/pre>\n<p>Tambi\u00e9n puede habilitar o deshabilitar Loop Guard en un puerto de conmutador espec\u00edfico utilizando el siguiente comando de configuraci\u00f3n de interfaz:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config-if)# [ no] spanning-tree guard loop<\/pre>\n<p>Aunque Loop Guard est\u00e1 configurado en un puerto de switch, su acci\u00f3n de bloqueo correctivo se toma por VLAN<\/p>\n<h4>BPDU Filter<\/h4>\n<p>Esta caracter\u00edstica permite deshabilitar STP en algunos puertos del switch, es decir, se filtran las BPDU para evitar el env\u00edo o procesamiento de las BPDU en uno o m\u00e1s puertos. BPDU filter est\u00e1 deshabilitado por default y se puede configurar globalmente con el siguiente comando:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config)# spanning-tree portfast bpdufilter default<\/pre>\n<p>La palabra clave default indica que el BPDU filter se habilitar\u00e1 autom\u00e1ticamente en todos los puertos configurados con PortFast<\/p>\n<p>La configuraci\u00f3n tambi\u00e9n se puede hacer sobre las interfaces espec\u00edficas:<\/p>\n<pre class=\"height-set:true height:900 width-set:true width:750 top-set:false top-margin:25 bottom-set:false left-margin:25 toolbar:2 whitespace-before:1 whitespace-after:1 lang:sh decode:true\">Switch(config-if)# spanning-tree bpdufilter { enable | disable}<\/pre>\n<p>En resumen, BPDU filter evita que los puertos especificados env\u00eden o reciban BPDU. La configuraci\u00f3n de la interfaz filtra las BPDU entrantes y salientes incondicionalmente, independientemente del estado operativo PortFast o del modo access\/trunk. Esto es efectivamente el equivalente a apagar STP. Esto puede ser muy peligroso porque se puede crear f\u00e1cilmente un bucle permanente. Curiosamente, IOS no muestra un mensaje de advertencia cuando se aplica este comando. Habilitar PortFast en la interfaz incorrecta no es tan arriesgado como el BDPU filter, aunque extra\u00f1amente, IOS considera que es lo suficientemente importante como para informar al administrador.<\/p>\n<p>Mas informaci\u00f3n:<\/p>\n<p><a href=\"https:\/\/learningnetwork.cisco.com\/blogs\/vip-perspectives\/2016\/03\/10\/advanced-stp-features-portfast-bpdu-guard-and-bpdu-filter\" target=\"_blank\" rel=\"noopener\">https:\/\/learningnetwork.cisco.com\/blogs\/vip-perspectives\/2016\/03\/10\/advanced-stp-features-portfast-bpdu-guard-and-bpdu-filter<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Root Guard The Root Guard feature was developed as a means to control when a candidate root bridge switch connects to the <\/p>","protected":false},"author":2,"featured_media":1392,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[233],"tags":[474,280,477,476,475,473,422,457,427],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>STP: Protection Features - JMCristobal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"STP: Protection Features - JMCristobal\" \/>\n<meta property=\"og:description\" content=\"Root Guard The Root Guard feature was developed as a means to control when a candidate root bridge switch connects to the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\" \/>\n<meta property=\"og:site_name\" content=\"JMCristobal\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/web.facebook.com\/JMCristobalHomepage\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-25T14:35:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-13T09:17:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/wp-content\/uploads\/2022\/01\/RS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"206\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"JMCristobal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jmcristobalhome\" \/>\n<meta name=\"twitter:site\" content=\"@jmcristobalhome\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"JMCristobal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\"},\"author\":{\"name\":\"JMCristobal\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118\"},\"headline\":\"STP: Protection Features\",\"datePublished\":\"2021-03-25T14:35:39+00:00\",\"dateModified\":\"2022-02-13T09:17:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\"},\"wordCount\":744,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization\"},\"keywords\":[\"bpdu\",\"cisco\",\"filter\",\"guard\",\"loop guard\",\"root guard\",\"spanning-tree\",\"stp\",\"switch\"],\"articleSection\":[\"Enterprise Infrastructure\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\",\"url\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\",\"name\":\"STP: Protection Features - JMCristobal\",\"isPartOf\":{\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#website\"},\"datePublished\":\"2021-03-25T14:35:39+00:00\",\"dateModified\":\"2022-02-13T09:17:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"STP: Protection Features\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#website\",\"url\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/\",\"name\":\"JMCristobal\",\"description\":\"Networking and more\",\"publisher\":{\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization\",\"name\":\"JMCristobal\",\"url\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png\",\"contentUrl\":\"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png\",\"width\":518,\"height\":436,\"caption\":\"JMCristobal\"},\"image\":{\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.youtube.com\/JMCristobalHomepage\",\"https:\/\/web.facebook.com\/JMCristobalHomepage\",\"https:\/\/twitter.com\/jmcristobalhome\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118\",\"name\":\"JMCristobal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g\",\"caption\":\"JMCristobal\"},\"url\":\"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/author\/jmcristobal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"STP: Protection Features - JMCristobal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/","og_locale":"es_ES","og_type":"article","og_title":"STP: Protection Features - JMCristobal","og_description":"Root Guard The Root Guard feature was developed as a means to control when a candidate root bridge switch connects to the","og_url":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/","og_site_name":"JMCristobal","article_publisher":"https:\/\/web.facebook.com\/JMCristobalHomepage","article_published_time":"2021-03-25T14:35:39+00:00","article_modified_time":"2022-02-13T09:17:35+00:00","og_image":[{"width":350,"height":206,"url":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/wp-content\/uploads\/2022\/01\/RS.png","type":"image\/png"}],"author":"JMCristobal","twitter_card":"summary_large_image","twitter_creator":"@jmcristobalhome","twitter_site":"@jmcristobalhome","twitter_misc":{"Escrito por":"JMCristobal","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#article","isPartOf":{"@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/"},"author":{"name":"JMCristobal","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118"},"headline":"STP: Protection Features","datePublished":"2021-03-25T14:35:39+00:00","dateModified":"2022-02-13T09:17:35+00:00","mainEntityOfPage":{"@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/"},"wordCount":744,"commentCount":0,"publisher":{"@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization"},"keywords":["bpdu","cisco","filter","guard","loop guard","root guard","spanning-tree","stp","switch"],"articleSection":["Enterprise Infrastructure"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/","url":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/","name":"STP: Protection Features - JMCristobal","isPartOf":{"@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#website"},"datePublished":"2021-03-25T14:35:39+00:00","dateModified":"2022-02-13T09:17:35+00:00","breadcrumb":{"@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ec2-52-7-70-250.compute-1.amazonaws.com\/es\/2021\/03\/25\/stp-features-de-proteccion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d1gdqjscev06po.cloudfront.net\/"},{"@type":"ListItem","position":2,"name":"STP: Protection Features"}]},{"@type":"WebSite","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#website","url":"https:\/\/d1gdqjscev06po.cloudfront.net\/","name":"JMCristobal","description":"Networking and more","publisher":{"@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d1gdqjscev06po.cloudfront.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#organization","name":"JMCristobal","url":"https:\/\/d1gdqjscev06po.cloudfront.net\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/logo\/image\/","url":"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png","contentUrl":"https:\/\/jmcristobal.com\/wp-content\/uploads\/2021\/09\/Logo-JMCristobal.png","width":518,"height":436,"caption":"JMCristobal"},"image":{"@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/JMCristobalHomepage","https:\/\/web.facebook.com\/JMCristobalHomepage","https:\/\/twitter.com\/jmcristobalhome"]},{"@type":"Person","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/e7cca8371cd491cf444cc824f30ae118","name":"JMCristobal","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/d1gdqjscev06po.cloudfront.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b549739a2a57394801aef27a76efdb3d?s=96&d=mm&r=g","caption":"JMCristobal"},"url":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/author\/jmcristobal\/"}]}},"jetpack_featured_media_url":"https:\/\/d1gdqjscev06po.cloudfront.net\/wp-content\/uploads\/2022\/01\/RS.png","_links":{"self":[{"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/posts\/718"}],"collection":[{"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":5,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":1510,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/posts\/718\/revisions\/1510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/media\/1392"}],"wp:attachment":[{"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/d1gdqjscev06po.cloudfront.net\/es\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}