{"id":139,"date":"2020-05-06T11:57:46","date_gmt":"2020-05-06T09:57:46","guid":{"rendered":"https:\/\/eramon.de\/?page_id=139"},"modified":"2024-11-14T21:53:03","modified_gmt":"2024-11-14T20:53:03","slug":"config-compliance-check","status":"publish","type":"page","link":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/","title":{"rendered":"Config Compliance Check"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1588260516530{padding-bottom: 50px !important;}&#8221;][vc_column]<div id=\"ultimate-heading-307069eb9a1751541\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-307069eb9a1751541 uvc-4915 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-307069eb9a1751541 h3'  data-responsive-json-new='{\"font-size\":\"desktop:25px;\",\"line-height\":\"desktop:25px;\"}' ><h3 style=\"--font-weight:theme;color:#241f0c;margin-bottom:20px;\">Config Compliance Check<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:32px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#cad30b;width:102px;\"><\/span><\/div><\/div><div id=\"ultimate-heading-155869eb9a175163a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-155869eb9a175163a uvc-3362 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-155869eb9a175163a h3'  data-responsive-json-new='{\"font-size\":\"desktop:20px;\",\"line-height\":\"desktop:20px;\"}' ><h3 style=\"--font-weight:theme;color:#241f0c;margin-bottom:20px;\">Benefits<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:32px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#b4b4b4;width:51px;\"><\/span><\/div><\/div><div class=\"standard-arrow bullet-top\"><ul>\n<li>You can validate the conformity and compliance of your network automatically and comprehensively<\/li>\n<li>You can guarantee great operational reliability and security<\/li>\n<li>You can ensure the compliance and conformity of your network<\/li>\n<li>You will receive all audit-relevant information at the touch of a button<\/li>\n<\/ul>\n<\/div>[vc_empty_space]<div id=\"ultimate-heading-458469eb9a17517ad\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-458469eb9a17517ad uvc-5545 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-458469eb9a17517ad h3'  data-responsive-json-new='{\"font-size\":\"desktop:20px;\",\"line-height\":\"desktop:20px;\"}' ><h3 style=\"--font-weight:theme;color:#241f0c;margin-bottom:20px;\">Basic Principles<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:32px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#b4b4b4;width:51px;\"><\/span><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"col2 col-xs-12 col-md-6\">\n<div class=\"tiny-html\">\n<div class=\"col2 col-xs-12 col-md-6\">\n<div class=\"tiny-html\">\n<p>Configuration conformity in network devices (independent of manufacturer), as well as the assurance that safety and security guidelines have been complied with, has been gaining in importance when operating corporate-wide networks.<\/p>\n<p>International guidelines such as <a href=\"https:\/\/de.wikipedia.org\/wiki\/Sarbanes-Oxley_Act#:~:text=Der%20Sarbanes%2DOxley%20Act%20of,in%20Anspruch%20nehmen%2C%20verbessern%20soll.\">SOX<\/a>, <a href=\"https:\/\/de.wikipedia.org\/wiki\/ITIL\">ITIL<\/a>, etc. require verifiable and accountable proof of conformity to corporate guidelines that are not simply based on &#8220;good faith\u201c. ERAMON CCC provides network administrators with a tool that enables them to reliably execute these tasks and issues auditable proof to that effect.<\/p>\n<p>In the course of this, CCC analyzes the configurations of devices monitored by ERAMON while applying pre-defined sets of rules.<\/p>\n<p>In the example below the system checks a configuration for the ntp server: 172.22.10.10. In the course of this check, the following error message is generated.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_single_image image=&#8221;2434&#8243; img_size=&#8221;1000&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1588260516530{padding-bottom: 50px !important;}&#8221;][vc_column]<div id=\"ultimate-heading-901069eb9a175184a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-901069eb9a175184a uvc-7859 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-901069eb9a175184a h3'  data-responsive-json-new='{\"font-size\":\"desktop:20px;\",\"line-height\":\"desktop:20px;\"}' ><h3 style=\"--font-weight:theme;color:#241f0c;margin-bottom:20px;\">Rulesets<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:32px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#b4b4b4;width:51px;\"><\/span><\/div><\/div>[vc_column_text]<\/p>\n<div class=\"col2 col-xs-12 col-md-6\">\n<div class=\"tiny-html\">\n<div class=\"tiny-html\">\n<div class=\"tiny-html\">\n<p>These rulesets are the result of those previously specified and binding corporate guidelines. Within these sets of rules the network administrator can determine which configuration commands are permitted in the configurations, as well as their frequency, format and\/or content. The ruleset is defined by regular expressions, while also allowing the configuration in question to be searched in sections. CCC then monitors the conformity of the current configuration and will send an alert in the event of errors to the responsible member of staff (event, email, etc.).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<div class=\"col2 col-xs-12 col-md-6\">\n<div class=\"tiny-html\">\n<div class=\"tiny-html\">\n<p>ERAMON not only covers the technical aspects of this task, such as the transmission of error alerts or configuration violations to ensure their appropriate clearance, but it also supports corporate processes, e.g. service assurance, with appropriate reports and direct integration into workflow systems. Using ERAMON CCC and other supporting modules from the NMS range would therefore provide you with measurable proof of successful changes, for example, within the corporate-wide change management.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_single_image image=&#8221;135&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221; lazy_loading=&#8221;true&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1588260516530{padding-bottom: 50px !important;}&#8221;][vc_column]<div id=\"ultimate-heading-593069eb9a17518e8\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-593069eb9a17518e8 uvc-3963 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-593069eb9a17518e8 h3'  data-responsive-json-new='{\"font-size\":\"desktop:20px;\",\"line-height\":\"desktop:20px;\"}' ><h3 style=\"--font-weight:theme;color:#241f0c;margin-bottom:20px;\">Highlights<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"margin-bottom:32px;height:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#b4b4b4;width:51px;\"><\/span><\/div><\/div><div class=\"standard-arrow bullet-top\"><div class=\"col2 col-xs-12 col-md-6\">\n<div class=\"tiny-html\">\n<ul>\n<li><a href=\"https:\/\/eramon.de\/de\/produkt\/anwendungsmodule\/reporting\/\">Reports<\/a> for the technical and commercial sections (revision)<\/li>\n<li>Alerts of recognized violations by email, SMS, etc.<\/li>\n<li>Prioritization of violations<\/li>\n<li>Commencement of check, either manually or scheduled<\/li>\n<li>Several rules can be pooled into one job, thus requirements from various sectors can be checked in a single step<\/li>\n<li>Use of Perl conformant Regexes<\/li>\n<li>Automatic grouping of devices that had errors in their configurations<\/li>\n<li>Integration into workflow systems is possible<\/li>\n<li>Manufacturer-independent \u2013 can be used for all manufacturers working with text-based configurations<\/li>\n<li>Ease-of-use and comprehensive sets of rules to set up the configuration guidelines that are to be applied<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1588260516530{padding-bottom: 50px !important;}&#8221;][vc_column][vc_empty_space][vc_column_text css=&#8221;&#8221;] Configuration conformity in network devices (independent of manufacturer), as well as the assurance that safety and security guidelines have been complied with, has been gaining in importance when operating corporate-wide networks. International guidelines such as SOX, ITIL, etc. require verifiable and accountable proof of conformity to corporate guidelines that are&hellip;<\/p>\n","protected":false},"author":2,"featured_media":135,"parent":376,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-139","page","type-page","status-publish","has-post-thumbnail","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Config Compliance Check | network security | ERAMON GmbH<\/title>\n<meta name=\"description\" content=\"Minimize your risks for your company with Config Compliance Check &amp; configured security guidelines in the data network | Find out more\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Config Compliance Check | network security | ERAMON GmbH\" \/>\n<meta property=\"og:description\" content=\"Minimize your risks for your company with Config Compliance Check &amp; configured security guidelines in the data network | Find out more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/\" \/>\n<meta property=\"og:site_name\" content=\"ERAMON\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-14T20:53:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eramon.de\/wp-content\/uploads\/2020\/05\/CCC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"333\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Config Compliance Check | network security | ERAMON GmbH\" \/>\n<meta name=\"twitter:description\" content=\"Minimize your risks for your company with Config Compliance Check &amp; configured security guidelines in the data network | Find out more\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/\",\"url\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/\",\"name\":\"Config Compliance Check | network security | ERAMON GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eramon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/CCC.png\",\"datePublished\":\"2020-05-06T09:57:46+00:00\",\"dateModified\":\"2024-11-14T20:53:03+00:00\",\"description\":\"Minimize your risks for your company with Config Compliance Check & configured security guidelines in the data network | Find out more\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eramon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/CCC.png\",\"contentUrl\":\"https:\\\/\\\/eramon.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/CCC.png\",\"width\":333,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/config-compliance-check\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/eramon.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Product\",\"item\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Modules\",\"item\":\"https:\\\/\\\/eramon.de\\\/en\\\/product\\\/applicationmodules\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Config Compliance Check\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/eramon.de\\\/de\\\/\",\"name\":\"ERAMON\",\"description\":\"Network Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eramon.de\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#organization\",\"name\":\"ERAMON GmbH\",\"url\":\"https:\\\/\\\/eramon.de\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eramon.de\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/eramon-logo@2x-2.png\",\"contentUrl\":\"https:\\\/\\\/eramon.de\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/eramon-logo@2x-2.png\",\"width\":612,\"height\":224,\"caption\":\"ERAMON GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/eramon.de\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eramon-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Config Compliance Check | network security | ERAMON GmbH","description":"Minimize your risks for your company with Config Compliance Check & configured security guidelines in the data network | Find out more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/","og_locale":"en_US","og_type":"article","og_title":"Config Compliance Check | network security | ERAMON GmbH","og_description":"Minimize your risks for your company with Config Compliance Check & configured security guidelines in the data network | Find out more","og_url":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/","og_site_name":"ERAMON","article_modified_time":"2024-11-14T20:53:03+00:00","og_image":[{"width":333,"height":300,"url":"https:\/\/eramon.de\/wp-content\/uploads\/2020\/05\/CCC.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Config Compliance Check | network security | ERAMON GmbH","twitter_description":"Minimize your risks for your company with Config Compliance Check & configured security guidelines in the data network | Find out more","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/","url":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/","name":"Config Compliance Check | network security | ERAMON GmbH","isPartOf":{"@id":"https:\/\/eramon.de\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/#primaryimage"},"image":{"@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/#primaryimage"},"thumbnailUrl":"https:\/\/eramon.de\/wp-content\/uploads\/2020\/05\/CCC.png","datePublished":"2020-05-06T09:57:46+00:00","dateModified":"2024-11-14T20:53:03+00:00","description":"Minimize your risks for your company with Config Compliance Check & configured security guidelines in the data network | Find out more","breadcrumb":{"@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/#primaryimage","url":"https:\/\/eramon.de\/wp-content\/uploads\/2020\/05\/CCC.png","contentUrl":"https:\/\/eramon.de\/wp-content\/uploads\/2020\/05\/CCC.png","width":333,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/eramon.de\/en\/product\/applicationmodules\/config-compliance-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/eramon.de\/en\/"},{"@type":"ListItem","position":2,"name":"The Product","item":"https:\/\/eramon.de\/en\/product\/"},{"@type":"ListItem","position":3,"name":"Application Modules","item":"https:\/\/eramon.de\/en\/product\/applicationmodules\/"},{"@type":"ListItem","position":4,"name":"Config Compliance Check"}]},{"@type":"WebSite","@id":"https:\/\/eramon.de\/de\/#website","url":"https:\/\/eramon.de\/de\/","name":"ERAMON","description":"Network Management","publisher":{"@id":"https:\/\/eramon.de\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eramon.de\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eramon.de\/de\/#organization","name":"ERAMON GmbH","url":"https:\/\/eramon.de\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eramon.de\/de\/#\/schema\/logo\/image\/","url":"https:\/\/eramon.de\/wp-content\/uploads\/2021\/02\/eramon-logo@2x-2.png","contentUrl":"https:\/\/eramon.de\/wp-content\/uploads\/2021\/02\/eramon-logo@2x-2.png","width":612,"height":224,"caption":"ERAMON GmbH"},"image":{"@id":"https:\/\/eramon.de\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/eramon-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/pages\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":22,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/pages\/139\/revisions"}],"predecessor-version":[{"id":3262,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/pages\/139\/revisions\/3262"}],"up":[{"embeddable":true,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/pages\/376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/media\/135"}],"wp:attachment":[{"href":"https:\/\/eramon.de\/en\/wp-json\/wp\/v2\/media?parent=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}