{"id":266,"date":"2025-11-03T08:45:41","date_gmt":"2025-11-03T08:45:41","guid":{"rendered":"https:\/\/linuxbase.io\/?p=266"},"modified":"2025-11-03T08:45:41","modified_gmt":"2025-11-03T08:45:41","slug":"protonvpn-unifi-router-udm-setting-up-multiple-vpn-clients","status":"publish","type":"post","link":"https:\/\/netguide.io\/linux\/en\/protonvpn-unifi-router-udm-setting-up-multiple-vpn-clients\/","title":{"rendered":"ProtonVPN + UniFi Router (UDM) &#8211; Setting Up Multiple VPN Clients"},"content":{"rendered":"\n<p>If you want to run <strong>multiple ProtonVPN connections<\/strong> simultaneously on a <strong>UniFi Dream Machine (UDM) router<\/strong> or any other UniFi gateway, you&#8217;ll quickly encounter a problem:<br>All generated <strong>WireGuard configuration files<\/strong> from ProtonVPN use the <strong>same internal IP address<\/strong>. As a result, only <strong>one VPN connection<\/strong> can be active at a time &#8211; all others will fail.<\/p>\n\n\n\n<p>In this article, you&#8217;ll learn <strong>why<\/strong> this happens and <strong>how to fix it easily<\/strong> by changing just <strong>one line<\/strong> in your WireGuard configuration.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">The Problem: Identical IP Addresses in WireGuard Configs<\/h2>\n\n\n\n<p>When you generate several WireGuard profiles from ProtonVPN (for example, for different countries or servers), they all contain the same IP address in the <code>[Interface]<\/code> section.<\/p>\n\n\n\n<p>Example:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2\"><span style=\"padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#24292e\"><\/span><span role=\"button\" style=\"color:#e1e4e8\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" aria-hidden=\"true\" readonly>&#091;Interface&#093;\n# Key for ProtonVPN-DE\n# Bouncing = 15\n# NetShield = 1\n# Moderate NAT = on\n# NAT-PMP (Port Forwarding) = off\n# VPN Accelerator = on\nPrivateKey = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nAddress = 10.2.0.2\/32\nDNS = 10.2.0.1\n\n&#091;Peer&#093;\n# DE#501\nPublicKey = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\nAllowedIPs = 0.0.0.0\/0, ::\/0\nEndpoint = 194.126.177.8:51820\n<\/textarea><\/pre><\/span><pre class=\"shiki github-dark\" style=\"background-color: #24292e\"><code><span class=\"line\"><span style=\"color: #E1E4E8\">&#091;Interface&#093;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># Key for ProtonVPN<\/span><span style=\"color: #F97583\">-<\/span><span style=\"color: #79B8FF\">DE<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># Bouncing <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">15<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># NetShield <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">1<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># Moderate <\/span><span style=\"color: #79B8FF\">NAT<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> on<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># <\/span><span style=\"color: #79B8FF\">NAT<\/span><span style=\"color: #F97583\">-<\/span><span style=\"color: #B392F0\">PMP<\/span><span style=\"color: #E1E4E8\"> (Port Forwarding) <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> off<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># <\/span><span style=\"color: #79B8FF\">VPN<\/span><span style=\"color: #E1E4E8\"> Accelerator <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> on<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">PrivateKey <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">Address <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.2<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">32<\/span><\/span>\n<span class=\"line\"><span style=\"color: #79B8FF\">DNS<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.1<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">&#091;Peer&#093;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\"># <\/span><span style=\"color: #79B8FF\">DE<\/span><span style=\"color: #E1E4E8\">#<\/span><span style=\"color: #79B8FF\">501<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">PublicKey <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">AllowedIPs <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">0.0<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.0<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">0<\/span><span style=\"color: #E1E4E8\">, ::<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">0<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">Endpoint <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">194.126<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">177.8<\/span><span style=\"color: #E1E4E8\">:<\/span><span style=\"color: #79B8FF\">51820<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>If you now create another profile (e.g., for Albania or any other location), it will look almost identical &#8211; including the <strong>same IP address <code>10.2.0.2\/32<\/code><\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">The Cause: ProtonVPN Doesn&#8217;t Assign Unique IPs Per Profile<\/h2>\n\n\n\n<p>When ProtonVPN generates WireGuard configuration files, it assigns the <strong>same internal client address<\/strong> for your account each time.<br>This isn&#8217;t usually a problem if you connect only one device.<br>However, if you want to establish <strong>multiple VPN tunnels<\/strong> through a UniFi router (for example, for different VLANs, routing rules, or countries), <strong>each connection needs a unique internal address<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">The Fix: Manually Change the IP Address<\/h2>\n\n\n\n<p>The solution is simple:<br>In each ProtonVPN WireGuard configuration file, edit the <code>Address = ...<\/code> line and <strong>increment the second number after the 10<\/strong>.<br>This allows multiple connections to coexist without conflicts.<\/p>\n\n\n\n<p>Example:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">First VPN Config (Germany)<\/h3>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2\"><span style=\"padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#24292e\"><\/span><span role=\"button\" style=\"color:#e1e4e8\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" aria-hidden=\"true\" readonly>&#091;Interface&#093;\nAddress = 10.2.0.2\/32\nDNS = 10.2.0.1\n<\/textarea><\/pre><\/span><pre class=\"shiki github-dark\" style=\"background-color: #24292e\"><code><span class=\"line\"><span style=\"color: #E1E4E8\">&#091;Interface&#093;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">Address <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.2<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">32<\/span><\/span>\n<span class=\"line\"><span style=\"color: #79B8FF\">DNS<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.1<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Second VPN Config (Albania)<\/h3>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2\"><span style=\"padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#24292e\"><\/span><span role=\"button\" style=\"color:#e1e4e8\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" aria-hidden=\"true\" readonly>&#091;Interface&#093;\nAddress = 10.3.0.2\/32\nDNS = 10.2.0.1\n<\/textarea><\/pre><\/span><pre class=\"shiki github-dark\" style=\"background-color: #24292e\"><code><span class=\"line\"><span style=\"color: #E1E4E8\">&#091;Interface&#093;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">Address <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.3<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.2<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">32<\/span><\/span>\n<span class=\"line\"><span style=\"color: #79B8FF\">DNS<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.1<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Third VPN Config (Switzerland)<\/h3>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2\"><span style=\"padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#24292e\"><\/span><span role=\"button\" style=\"color:#e1e4e8\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" aria-hidden=\"true\" readonly>&#091;Interface&#093;\nAddress = 10.4.0.2\/32\nDNS = 10.2.0.1\n<\/textarea><\/pre><\/span><pre class=\"shiki github-dark\" style=\"background-color: #24292e\"><code><span class=\"line\"><span style=\"color: #E1E4E8\">&#091;Interface&#093;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #E1E4E8\">Address <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.4<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.2<\/span><span style=\"color: #F97583\">\/<\/span><span style=\"color: #79B8FF\">32<\/span><\/span>\n<span class=\"line\"><span style=\"color: #79B8FF\">DNS<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #F97583\">=<\/span><span style=\"color: #E1E4E8\"> <\/span><span style=\"color: #79B8FF\">10.2<\/span><span style=\"color: #E1E4E8\">.<\/span><span style=\"color: #79B8FF\">0.1<\/span><\/span>\n<span class=\"line\"><\/span><\/code><\/pre><\/div>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\ud83d\udd39 <strong>Important:<\/strong><br>Only change the <code>Address<\/code> line in the <code>[Interface]<\/code> section.<br>Do <strong>not<\/strong> modify the PrivateKey, DNS, or Endpoint settings.<\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Setup on UniFi (UDM \/ UDM-Pro \/ UDR)<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Enable WireGuard:<\/strong><br>WireGuard is supported natively on UniFi devices (UDM\/UDR) in newer firmware versions, or can be enabled via <strong>UDM-Tools<\/strong>.<\/li>\n\n\n\n<li><strong>Create a VPN Client:<\/strong><br>In the UniFi Network interface, go to<br><code>Settings \u2192 Teleport &amp; VPN \u2192 VPN Clients \u2192 Create New VPN Client<\/code>.<\/li>\n\n\n\n<li><strong>Import the WireGuard File:<\/strong><br>Choose <strong>file upload<\/strong> and import your modified ProtonVPN configuration.<\/li>\n\n\n\n<li><strong>Add a Second VPN Client:<\/strong><br>Repeat the process using your next modified config (e.g., the one with <code>Address = 10.3.0.2\/32<\/code>).<\/li>\n\n\n\n<li><strong>Optional &#8211; Configure Routing:<\/strong><br>You can now use <strong>routing rules or VLANs<\/strong> to decide which traffic goes through which VPN tunnel.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of This Method<\/h2>\n\n\n\n<p>\u2705 <strong>Run multiple VPN tunnels<\/strong> at the same time<br>\u2705 <strong>No more IP conflicts<\/strong> between ProtonVPN connections<br>\u2705 <strong>Simple fix without touching ProtonVPN server configs<\/strong><br>\u2705 <strong>Works on UniFi UDM, UDM-Pro, UDR, and UXG routers<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>ProtonVPN officially assigns only one WireGuard IP per account, but with a UniFi router setup, you can easily work around this limitation by <strong>manually adjusting the internal address<\/strong>.<br>This allows you to use <strong>multiple VPN clients simultaneously<\/strong> &#8211; perfect if you want different VLANs or locations routed through different ProtonVPN servers.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>In short:<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Just change <code>Address = 10.2.0.2\/32<\/code> to <code>10.3.0.2\/32<\/code>, <code>10.4.0.2\/32<\/code>, and so on &#8211; and your UniFi router can handle multiple ProtonVPN connections at the same time.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>If you want to run multiple ProtonVPN connections simultaneously on a UniFi Dream Machine (UDM) router or any other UniFi [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[433],"class_list":["post-266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en","tag-vpn-en-en"],"uagb_featured_image_src":{"full":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn.png",1920,1080,false],"thumbnail":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn-150x150.png",150,150,true],"medium":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn-300x169.png",300,169,true],"medium_large":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn-768x432.png",768,432,true],"large":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn-1024x576.png",1024,576,true],"1536x1536":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn-1536x864.png",1536,864,true],"2048x2048":["https:\/\/netguide.io\/linux\/wp-content\/uploads\/sites\/2\/2025\/11\/protonvpn.png",1920,1080,false]},"uagb_author_info":{"display_name":"tobias.pries","author_link":"https:\/\/netguide.io\/linux\/author\/tobias-pries\/"},"uagb_comment_info":0,"uagb_excerpt":"If you want to run multiple ProtonVPN connections simultaneously on a UniFi Dream Machine (UDM) router or any other UniFi [&hellip;]","_links":{"self":[{"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/posts\/266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/comments?post=266"}],"version-history":[{"count":0,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/posts\/266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/media\/334"}],"wp:attachment":[{"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/media?parent=266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/categories?post=266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netguide.io\/linux\/wp-json\/wp\/v2\/tags?post=266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}