{"id":112746,"date":"2025-06-30T11:41:50","date_gmt":"2025-06-30T03:41:50","guid":{"rendered":"https:\/\/version-2.com\/?p=112746"},"modified":"2025-06-30T11:42:47","modified_gmt":"2025-06-30T03:42:47","slug":"validating-internal-network-policies-with-mendel","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/06\/validating-internal-network-policies-with-mendel\/","title":{"rendered":"Validating Internal Network Policies with Mendel"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"112746\" class=\"elementor elementor-112746\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div class=\"field field--name-body field--type-text-with-summary field--label-hidden field__item\"><p style=\"font-size: 20px;\">Defining your internal network policies takes time, coordination, and effort. But once those policies are in place, the critical question still remains: are they actually being followed?<\/p><p>For many IT teams, verifying policy adherence and enforcing internal rules on a\u00a0daily basis is a\u00a0persistent challenge. Even small violations, such as unauthorized access, outdated encryption, or misused services, can lead to data exposure or non-compliance with frameworks like\u00a0NIS2.<\/p><p>This is the first part of a\u00a0two-part blog focused on the practical side of network security policy enforcement and explains how <a href=\"https:\/\/greycortex.com\/mendel\"><strong>GREYCORTEX Mendel<\/strong><\/a> helps you detect violations of any size quickly and effectively. Part two will cover encryption, application use, and identity-based access control.<\/p><h3>Network Segmentation <span class=\"amp\">&amp;<\/span>\u00a0Perimeter Control<\/h3><p>Segmentation and perimeter access policies are fundamental to limiting exposure and maintaining control over your critical systems. \u00a0Without a\u00a0clear policy enforcement process, a\u00a0single compromised device can lead to lateral movement across your network.<\/p><blockquote class=\"blockquote\"><p>\ud83d\udd17 <a href=\"https:\/\/greycortex.com\/blog\/identification-and-investigation-lateral-movement-attacks\">Watch our webinar<\/a> to see how Mendel helps you detect and investigate lateral movement.<\/p><\/blockquote><h5>Policy violation: <strong>Unallowed east\u2013west traffic between segments<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>East\u2013west traffic refers to communication between devices within the internal network, such as between user devices and servers. When segmentation is not properly enforced, attackers can move laterally across segments and compromise your entire company network. Limiting this traffic is essential for helping you prevent access to critical systems.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel\u2019s peer graph, as seen below, offers you a\u00a0clear view of internal communication. Your analysts can then filter internal traffic and define specific subnets to quickly verify whether unauthorized flows occur between isolated segments.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.png?itok=t4Ul12M8\" data-lg-id=\"a9327715-5b82-440e-8736-2174d97bc18e\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.png?itok=t4Ul12M8\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8\" alt=\"\" \/><\/picture><\/a><\/div><\/article><h5>Policy violation: <strong>Unauthorized Internet access from restricted segments<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Devices in restricted segments, such as servers or backup networks, are often not intended to communicate with the public Internet directly. In many environments, internet access must go through a\u00a0proxy or DMZ, with firewalls blocking all other outbound traffic. If these controls fail, systems may be exposed to malware, data leakage, or command-and-control activity.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel allows the filtering of your outbound traffic from specific hosts, making it easy to identify devices attempting to access the Internet.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure3.png?itok=kGVhJSHd\" data-lg-id=\"b9b06fa1-ac64-4657-9e4e-ce678355197f\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure3.png?itok=kGVhJSHd\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure3.webp?itok=kGVhJSHd\" alt=\"\" \/><\/picture><\/a><\/div><\/article><p>If such traffic is detected, your analysts can verify whether it passed through an approved proxy by checking the flow records. They can also confirm whether direct connections (bypassing the proxy) were blocked at the firewall level by checking the TCP flags and destination status.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure4.png?itok=gx7RSWtZ\" data-lg-id=\"d0fa89f3-8380-4010-bfbb-376aad446edd\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure4.png?itok=gx7RSWtZ\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure4.webp?itok=gx7RSWtZ\" alt=\"\" \/><\/picture><\/a><\/div><\/article><blockquote class=\"blockquote\"><p>Mendel lets you set policies to monitor Internet traffic from specific segments or devices. When a\u00a0violation occurs, it automatically sends an\u00a0alert.<\/p><\/blockquote><h5>Policy violation: <strong>New <span class=\"amp\">&amp;<\/span>\u00a0disappeared IPs or MACs in controlled network<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Controlled network segments, such as server or infrastructure zones, are often designed with static IP and MAC configurations. When unrecognized devices appear, it may indicate unauthorized access, policy misconfiguration, or a\u00a0potential threat.\u00a0<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel allows you to assign policies to specific subnets or hosts to monitor new or missing IP and MAC addresses. \u00a0Policies can also include limits on traffic, packets, peers, ports, duration, and\u00a0flows.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure6_final.png?itok=VCE6hToJ\" data-lg-id=\"11e3b4a5-e5bb-444c-89c0-a3304902f77f\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure6_final.png?itok=VCE6hToJ\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure6_final.webp?itok=VCE6hToJ\" alt=\"\" \/><\/picture><\/a><\/div><\/article><p>If a\u00a0policy is violated, Mendel will trigger an alert immediately. For automated blocking, Mendel can be integrated with third-party systems like a\u00a0NAC or Cisco\u00a0ISE.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure7_final.png?itok=WqWY1r4P\" data-lg-id=\"51d82732-81f9-4a67-82a9-67b4d306bf7a\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure7_final.png?itok=WqWY1r4P\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure7_final.webp?itok=WqWY1r4P\" alt=\"\" \/><\/picture><\/a><\/div><\/article><h5>Policy violation: <strong>Improper traffic between management and user networks<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Dedicated management segments are designed to limit who can interact with your infrastructure components like switches, routers, or servers. Unauthorized access from user networks increases the risk of misconfiguration, privilege abuse, or direct exploitation.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel\u2019s peer graph provides you with a\u00a0clear view of communication between your defined network segments. Your analysts can focus on management subnets to verify whether they are properly isolated from user networks, as required by internal policies.<\/p><p>For example, subnet 10.0.20.0\/24 was assigned as a\u00a0management zone, but Mendel revealed active connections to other internal networks.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure15.png?itok=_Ic1Spqx\" data-lg-id=\"849df507-2490-4c87-9894-2deb0f03c738\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure15.png?itok=_Ic1Spqx\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure15.webp?itok=_Ic1Spqx\" alt=\"\" \/><\/picture><\/a><\/div><\/article><p>After updating firewall rules, Mendel confirms isolation by showing no communication from 10.0.20.0\/24.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure16.png?itok=Cgpn3Ykk\" data-lg-id=\"ec0f87b8-fd62-4b6b-a628-380a09bd4d54\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure16.png?itok=Cgpn3Ykk\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure16.webp?itok=Cgpn3Ykk\" alt=\"\" \/><\/picture><\/a><\/div><\/article><h3>Network Services Policy Enforcement<\/h3><p>Core network services like DNS and DHCP are frequent targets for misuse or misconfiguration. Ensuring that only authorized services are active helps prevent spoofing, data leaks, and disruptions to your network stability.<\/p><h5>Policy violation: <strong>Usage of unauthorized internal\/\u200bpublic DNS servers<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>This policy ensures that only approved DNS servers are used for resolving domain names inside the network. Unapproved or misconfigured servers can bypass security controls, hide malicious activity, or return forged responses.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p><strong>Internal DNS usage:<\/strong> \u00a0Mendel allows you to filter internal DNS servers using the host tag Role\/\u200bServer\/\u200bDNS. This provides you with a\u00a0clear inventory of devices offering DNS or DNS-relay services. Your analysts can review this list and drill down into individual IPs to confirm whether each DNS server is expected and approved.<\/p><p>For example, a\u00a0device at 192.168.178.1 was identified as providing DNS services. No other services were detected, indicating a\u00a0possible relay or misconfigured gateway.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure29.png?itok=IyqA5ird\" data-lg-id=\"572ddeb6-35ef-4242-9679-36512ba154fd\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure29.png?itok=IyqA5ird\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure29.webp?itok=IyqA5ird\" alt=\"\" \/><\/picture><\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure30.png?itok=IrZA7Jhf\" data-lg-id=\"4bfdacd6-0781-4e1a-89f5-b285de3a94ab\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure30.png?itok=IrZA7Jhf\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure30.webp?itok=IrZA7Jhf\" alt=\"\" \/><\/picture><\/a><\/div><\/article><p><strong>Public DNS usage<\/strong>: By filtering outbound DNS traffic, Mendel reveals which internal devices are using public DNS servers. This allows your analysts to identify whether DNS queries are leaving the network through unapproved resolvers.<\/p><p>In one case, two hosts were detected using Google DNS services: one being a\u00a0default gateway, and another (192.168.40.215) a\u00a0standard internal client. Such cases should be reviewed against DNS usage policies to ensure compliance.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure31.png?itok=4pHTtazO\" data-lg-id=\"0fa3621a-306a-40e5-a19d-5be90107d575\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure31.png?itok=4pHTtazO\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure31.webp?itok=4pHTtazO\" alt=\"\" \/><\/picture><\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure32.png?itok=nakDQz67\" data-lg-id=\"b23951ab-ac21-4e76-a578-bbb8c49996dc\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure32.png?itok=nakDQz67\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure32.webp?itok=nakDQz67\" alt=\"\" \/><\/picture><\/a><\/div><\/article><h5>Policy violation: <strong>Unauthorized DHCP Servers<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>This policy ensures that only approved DHCP servers operate in the network. Unauthorized DHCP servers can assign incorrect configurations, enable man-in-the-middle attacks, or disrupt connectivity.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel automatically detects new DHCP servers in your network and generates an event. In addition, it lists all DHCP servers by filtering hosts with the tag Role\/\u200bServer\/\u200bDHCP, helping your analysts verify whether each one is authorized or misconfigured. Drilling down on each IP reveals additional services and host behavior for deeper inspection.<\/p><p>For example, device 192.168.2.254 was found running multiple services, including DHCP, NTP, DNS, SSH, TELNET, and Mikrotik Winbox. This suggests it may be a\u00a0router or a\u00a0misconfigured network appliance.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure33.png?itok=bMsZkTt8\" data-lg-id=\"c00148ca-8481-4e8b-9536-75b9cde8e85b\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure33.png?itok=bMsZkTt8\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure33.webp?itok=bMsZkTt8\" alt=\"\" \/><\/picture><\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure34.png?itok=hVItFiuH\" data-lg-id=\"3bb9658b-b8bf-438f-a2eb-6445b45d5005\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure34.png?itok=hVItFiuH\" type=\"image\/png\" \/><\/picture><picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure34.webp?itok=hVItFiuH\" alt=\"\" \/><\/picture><\/a><\/div><\/article><h3>From Visibility to Accountability<\/h3><p>Enforcing internal rules only matters if those rules are visible and actionable. Without continuous policy monitoring, organizations like yours risk overlooking gaps that can lead to misconfigurations or downtime. Mendel helps you by aligning internal visibility with real-time behavior, enabling your teams to improve incident response, reduce alert fatigue, and maintain control over your environment.<\/p><p>In the next part, we\u2019ll explore how Mendel validates encryption policies, user identity enforcement, and application-level restrictions, which are critical areas for maintaining compliance and reducing operational risk.<\/p><p style=\"font-size: 20px;\">Want to evaluate your own network? <a href=\"https:\/\/greycortex.com\/solutions\/schedule-network-security-audit\"><strong>Request a\u00a0security audit<\/strong><\/a> with Mendel.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Defining your internal network policies takes time, coo [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,24,61],"tags":[23,435,1077],"class_list":["post-112746","post","type-post","status-publish","format-standard","hentry","category-1305","category-greycortex","category-press-release","tag-greycortex","tag-mendel","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Validating Internal Network Policies with Mendel - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Validating Internal Network Policies with Mendel - Version 2\" \/>\n<meta property=\"og:description\" content=\"Defining your internal network policies takes time, coo [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-30T03:41:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T03:42:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/validating-internal-network-policies-with-mendel\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Validating Internal Network Policies with Mendel\",\"datePublished\":\"2025-06-30T03:41:50+00:00\",\"dateModified\":\"2025-06-30T03:42:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/validating-internal-network-policies-with-mendel\\\/\"},\"wordCount\":1112,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure1.webp?itok=t4Ul12M8\",\"keywords\":[\"Greycortex\",\"MENDEL\",\"2025\"],\"articleSection\":[\"2025\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/06\\\/validating-internal-network-policies-with-mendel\\\/\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel\",\"name\":\"Validating Internal Network Policies with Mendel - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure1.webp?itok=t4Ul12M8\",\"datePublished\":\"2025-06-30T03:41:50+00:00\",\"dateModified\":\"2025-06-30T03:42:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure1.webp?itok=t4Ul12M8\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure1.webp?itok=t4Ul12M8\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-mendel#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Validating Internal Network Policies with Mendel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Validating Internal Network Policies with Mendel - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel","og_locale":"zh_HK","og_type":"article","og_title":"Validating Internal Network Policies with Mendel - Version 2","og_description":"Defining your internal network policies takes time, coo [&hellip;]","og_url":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel","og_site_name":"Version 2","article_published_time":"2025-06-30T03:41:50+00:00","article_modified_time":"2025-06-30T03:42:47+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/06\/validating-internal-network-policies-with-mendel\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Validating Internal Network Policies with Mendel","datePublished":"2025-06-30T03:41:50+00:00","dateModified":"2025-06-30T03:42:47+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/06\/validating-internal-network-policies-with-mendel\/"},"wordCount":1112,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8","keywords":["Greycortex","MENDEL","2025"],"articleSection":["2025","Greycortex","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/06\/validating-internal-network-policies-with-mendel\/","url":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel","name":"Validating Internal Network Policies with Mendel - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#primaryimage"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8","datePublished":"2025-06-30T03:41:50+00:00","dateModified":"2025-06-30T03:42:47+00:00","breadcrumb":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure1.webp?itok=t4Ul12M8"},{"@type":"BreadcrumbList","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-mendel#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Validating Internal Network Policies with Mendel"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-tku","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=112746"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112746\/revisions"}],"predecessor-version":[{"id":112753,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/112746\/revisions\/112753"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=112746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=112746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=112746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}