{"id":42246,"date":"2026-03-13T10:50:46","date_gmt":"2026-03-13T10:50:46","guid":{"rendered":"https:\/\/www.mfec.co.th\/uncategorized\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/"},"modified":"2026-03-16T02:44:05","modified_gmt":"2026-03-16T02:44:05","slug":"from-connect-to-protect-a-deep-dive-into-cisco-secure-networking","status":"publish","type":"post","link":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/","title":{"rendered":"From Connect to Protect: A Deep Dive into Cisco Secure Networking."},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img width=\"819\" height=\"1024\" src=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-01-819x1024.jpg\" alt=\"\" class=\"wp-image-42239\" srcset=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-01-819x1024.jpg 819w, https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-01-240x300.jpg 240w, https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-01.jpg 1535w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure><\/div>\n\n<p>From Connect to Protect: A Deep Dive into Cisco Secure Networking.<\/p>\n\n<p>How is it different from a normal network?<\/p>\n\n<p>Cisco Secure Networking is a network system that can protect itself and also protect those who use the network path\u2014whether they are internal users within the organization (Users), external users who connect to the network (Guests), or various devices and objects (Things).&#13;\n&#13;\nRegardless of what connects to the network, it should be verified, granted access according to the policies defined by the IT department, and the system should be ready to alert administrators if any abnormal behavior is detected.<\/p>\n\n<p>Cisco has integrated the Zero Trust concept into both hardware and software, emphasizing the principle that \u201cno one should be trusted until they have been verified.\u201d<\/p>\n\n<ul><li>Visibility: The ability to see every connection, whether it originates from home, the office, or the cloud.<\/li><\/ul>\n\n<ul><li>Micro-segmentation: The practice of dividing the network into smaller segments to prevent threats from spreading (Lateral Movement) when a security incident occurs.<\/li><\/ul>\n\n<ul><li>Enforcement: The automatic enforcement of security policies through Cisco Identity Services Engine (ISE) or Cisco Catalyst Center.<\/li><\/ul>\n\n<p>At this point, many of you may be wondering: In which use cases can we implement Secure Networking? Or is it suitable for your organization?<\/p>\n\n<p>Secure Campus is an example where security is embedded within the network infrastructure and operates to protect and manage data from the beginning of the connection until it reaches its destination.<\/p>\n\n<p>Starting from the onboarding process, if any abnormalities are detected, access will not be granted. However, even after access has been approved, the system does not stop at onboarding security. It continues to monitor user behavior, and if any unusual activity is detected, it will immediately alert the system administrator.<\/p>\n\n<p>In terms of security policy management, Cisco Secure Networking enables administrators within an organization to manage risks and segment systems into smaller parts very easily by using Tags, known as Security Group Tag (SGT).&#13;\n&#13;\nThis approach not only helps limit the spread of threats if a security incident occurs, but it is also designed to simplify administration. Additionally, it works in a dynamic manner, meaning that policies can still be applied no matter where the user is connected from.<\/p>\n\n<p>Secure Branch: Security for network connections from branch offices.<\/p>\n\n<p>Whether connecting to the Internet or back to the headquarters, Cisco Cisco SD-WAN enhances security by providing a comprehensive platform that works seamlessly with Cisco Security.&#13;\n&#13;\nIn addition, Cisco SD-WAN supports multiple management models, including On-Premises and On-Cloud, allowing organizations to choose the approach that best fits their needs. This ensures that connections from every branch are both secure and high-performing.<\/p>\n\n<p>Secure Remote: Security for users working or connecting from outside the workplace.<\/p>\n\n<p>In addition to branch connectivity, organizations must also ensure the security of users working outside the workplace. With Cisco Secure Access, organizations can define secure access policies that follow the same security standards. This enables remote users to connect securely, easily, and with confidence in every use.<\/p>\n\n<p>All of these elements combined make Cisco Secure Networking a platform that can meet the needs of your organization\u2014not only providing connectivity, but also delivering strong security.<\/p>\n\n<p>Another key advantage of being a platform that Cisco provides is the integration of Cisco + Splunk. When networking works together with the power of a data platform, it creates new possibilities.&#13;\n&#13;\nIn the era of Digital Transformation, networking is no longer just a \u201cpath\u201d for transmitting data. Instead, it has become the \u201cfirst line of defense\u201d and one of the largest sources of data within an organization.&#13;\n&#13;\nWhen Cisco and Splunk come together, it enables a transformation from isolated IT systems (silos) to a fully integrated era of Unified Security &amp; Observability. By combining the strengths of networking and a data platform, this creates what can truly be called a Unified Platform.<\/p>\n\n<p>\u200b\u202f\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From Connect to Protect: A Deep Dive into Cisco Secure Networking. How is it different from a normal network? Cisco Secure Networking is a network system that can protect itself and also protect those who use the network path\u2014whether they are internal users within the organization (Users), external users who connect to the network (Guests), [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":42242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[186,110],"tags":[351,295,352,751],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Connect to Protect: A Deep Dive into Cisco Secure Networking.<\/title>\n<meta name=\"description\" content=\"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Connect to Protect: A Deep Dive into Cisco Secure Networking.\" \/>\n<meta property=\"og:description\" content=\"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\" \/>\n<meta property=\"og:site_name\" content=\"MFEC | The Leading Tech Company in Thailand\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-13T10:50:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T02:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1097\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MFEC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MFEC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png\",\"width\":240,\"height\":77,\"caption\":\"MFEC | The Leading Tech Company in Thailand\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\",\"url\":\"https:\/\/www.mfec.co.th\/en\/\",\"name\":\"MFEC | The Leading Tech Company in Thailand\",\"description\":\"MFEC | The Leading Tech Company in Thailand\",\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage\",\"url\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg\",\"contentUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg\",\"width\":1920,\"height\":1097},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\",\"url\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\",\"name\":\"From Connect to Protect: A Deep Dive into Cisco Secure Networking.\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage\"},\"datePublished\":\"2026-03-13T10:50:46+00:00\",\"dateModified\":\"2026-03-16T02:44:05+00:00\",\"description\":\"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"From Connect to Protect: A Deep Dive into Cisco Secure Networking.\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\"},\"author\":{\"name\":\"MFEC\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\"},\"headline\":\"From Connect to Protect: A Deep Dive into Cisco Secure Networking.\",\"datePublished\":\"2026-03-13T10:50:46+00:00\",\"dateModified\":\"2026-03-16T02:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/\"},\"wordCount\":646,\"publisher\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg\",\"keywords\":[\"AI\",\"Cisco\",\"MFEC\",\"MFECInspire\"],\"articleSection\":[\"MFEC Update\",\"Tech Talk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c\",\"name\":\"MFEC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g\",\"caption\":\"MFEC\"},\"url\":\"https:\/\/www.mfec.co.th\/en\/author\/admincc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Connect to Protect: A Deep Dive into Cisco Secure Networking.","description":"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/","og_locale":"en_US","og_type":"article","og_title":"From Connect to Protect: A Deep Dive into Cisco Secure Networking.","og_description":"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.","og_url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/","og_site_name":"MFEC | The Leading Tech Company in Thailand","article_published_time":"2026-03-13T10:50:46+00:00","article_modified_time":"2026-03-16T02:44:05+00:00","og_image":[{"width":1920,"height":1097,"url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg","type":"image\/jpeg"}],"author":"MFEC","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MFEC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.mfec.co.th\/en\/#organization","name":"MFEC | The Leading Tech Company in Thailand","url":"https:\/\/www.mfec.co.th\/en\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2023\/06\/Black-MFEC-More.png","width":240,"height":77,"caption":"MFEC | The Leading Tech Company in Thailand"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/www.mfec.co.th\/en\/#website","url":"https:\/\/www.mfec.co.th\/en\/","name":"MFEC | The Leading Tech Company in Thailand","description":"MFEC | The Leading Tech Company in Thailand","publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mfec.co.th\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage","url":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg","contentUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg","width":1920,"height":1097},{"@type":"WebPage","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/","url":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/","name":"From Connect to Protect: A Deep Dive into Cisco Secure Networking.","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage"},"datePublished":"2026-03-13T10:50:46+00:00","dateModified":"2026-03-16T02:44:05+00:00","description":"Cisco Secure Networking is a network system that can protect itself, as well as protect those who use the network path\u2014whether they are internal organizational users (Users) or external users outside the organization.","breadcrumb":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"From Connect to Protect: A Deep Dive into Cisco Secure Networking."}]},{"@type":"Article","@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#article","isPartOf":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/"},"author":{"name":"MFEC","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c"},"headline":"From Connect to Protect: A Deep Dive into Cisco Secure Networking.","datePublished":"2026-03-13T10:50:46+00:00","dateModified":"2026-03-16T02:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/"},"wordCount":646,"publisher":{"@id":"https:\/\/www.mfec.co.th\/en\/#organization"},"image":{"@id":"https:\/\/www.mfec.co.th\/en\/tech-talk\/from-connect-to-protect-a-deep-dive-into-cisco-secure-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mfec.co.th\/wp-content\/uploads\/2026\/03\/PR_Cisco-02.jpg","keywords":["AI","Cisco","MFEC","MFECInspire"],"articleSection":["MFEC Update","Tech Talk"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/b46959076bf6725a32607656a0cbb16c","name":"MFEC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mfec.co.th\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acb46d5b36bd75b632b47ccf425430ef?s=96&d=mm&r=g","caption":"MFEC"},"url":"https:\/\/www.mfec.co.th\/en\/author\/admincc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/42246"}],"collection":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/comments?post=42246"}],"version-history":[{"count":1,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/42246\/revisions"}],"predecessor-version":[{"id":42247,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/posts\/42246\/revisions\/42247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media\/42242"}],"wp:attachment":[{"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/media?parent=42246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/categories?post=42246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mfec.co.th\/en\/wp-json\/wp\/v2\/tags?post=42246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}