{"id":5656,"date":"2025-11-11T12:30:01","date_gmt":"2025-11-11T12:30:01","guid":{"rendered":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/?page_id=5656"},"modified":"2025-11-11T12:34:39","modified_gmt":"2025-11-11T12:34:39","slug":"knx-ip-routing-communications-using-tcp-ip-multicast","status":"publish","type":"page","link":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/?page_id=5656","title":{"rendered":"KNX IP Routing Communications using TCP\/IP Multicast"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>KNX home automation installations use characteristic bright green &#8216;TP1&#8217; cabling to form the KNX &#8216;bus&#8217; that devices connect to. This cabling normally<sup data-fn=\"b08b30db-be50-4d7b-8664-dc77047aa72b\" class=\"fn\"><a href=\"#b08b30db-be50-4d7b-8664-dc77047aa72b\" id=\"b08b30db-be50-4d7b-8664-dc77047aa72b-link\">1<\/a><\/sup> consists of two twisted pairs (red\/white and yellow\/white) plus a ground\/drain wire &#8211; all protected by a foil screen enclosed within a tough outer sheath. On simple installations, all KNX devices connect to the same electrically-continuous &#8216;bus&#8217; cable &#8211; usually in daisy-chain fashion.<\/p>\n\n\n\n<p>There are however limits to the use of a single cable:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>On modern KNX installations there&#8217;s a hard limit of 256 devices per &#8216;line&#8217; (it used to be 64 on older installations)<\/li>\n\n\n\n<li>In KNX installations spanning separate buildings, best practice is to separate the KNX cabling in some manner<\/li>\n\n\n\n<li>In practice, the real-world limit is normally imposed by the size of the KNX bus power supply, with the smaller models only providing enough power for 10 or 20 devices<sup data-fn=\"26d30d4e-090b-41fb-84f3-672a31261cde\" class=\"fn\"><a href=\"#26d30d4e-090b-41fb-84f3-672a31261cde\" id=\"26d30d4e-090b-41fb-84f3-672a31261cde-link\">2<\/a><\/sup><\/li>\n<\/ul>\n\n\n\n<p>KNX has robust mechanisms for addressing these limits, with the possibility to form a hierarchy of multiple cable segments connected in a well-managed fashion. The two main options when a single cable is no longer appropriate are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Directly linking two segments of the same type of Twisted Pair cable via a KNX Line Coupler which applies two &#8216;types&#8217; of isolation\n<ul class=\"wp-block-list\">\n<li>Electrical isolation, using a transformer to &#8216;couple&#8217; the data communications on each side while isolating the DC power (hence each line needs its own power supply)<\/li>\n\n\n\n<li>Address isolation, by controlling which KNX addresses should be replicated across the coupler<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Using a TCP\/IP network as the &#8216;backbone&#8217;, connecting KNX IP Router devices on each bus segment to propagate KNX datagrams between them as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multicast\" target=\"_blank\" rel=\"noreferrer noopener\">Multicast<\/a> traffic over TCP\/IP\n<ul class=\"wp-block-list\">\n<li>Again there is a degree of control over what KNX traffic remains &#8216;local&#8217; versus what is sent to the &#8216;other&#8217; cable &#8211; and of course there is inherent electrical isolation too<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>It makes sense that the KNX system designers chose Multicast as the IP technology for connecting multiple KNX IP Routers together: on a simple IP network, any number of KNX IP Routers will automatically &#8216;see&#8217; each other, with no further IP configuration being required. The default KNX Multicast address (224.0.23.12) and IP port number (3671) have been officially registered with IANA.<\/p>\n\n\n\n<p>The complication is that if multiple KNX IP Routers are <em>not<\/em> all on the same IP Subnet, Multicast traffic does not automatically propagate between them. This is by design: a key principle of Multicast is that packets only get sent to devices that are <em>interested<\/em> in receiving those packets &#8211; and an IP Router does not magically know whether any upstream or downstream routers might have such an interest.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Option 1 &#8211; Single IP Subnet<\/h2>\n\n\n\n<p>One option is to contrive for all of the KNX IP Routers to be on a single IP Subnet &#8211; for example by using Ethernet Bridge devices to connect multiple (logical) Ethernet segments to form a single Subnet which then propagates Multicast (and Broadcast) traffic to all connected devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Option 2 &#8211; Broadcast Relay Software<\/h2>\n\n\n\n<p>On installations which have multiple IP Subnets connected to a single IP Router, an option is to run software on the Router which (selectively) replicates packets between those Subnets. Typically, such software will be referred to as a &#8216;UDP broadcast relay&#8217;. (Multicast traffic is always UDP since TCP mandates a single Source and a single Destination, which is not the case for Multicast traffic.)<\/p>\n\n\n\n<p>Where a site has more than one IP Router, it is also possible to replicate Multicast packets between the Routers by running &#8216;broadcast relay&#8217; software on <em>each<\/em> IP Router &#8211; so that they form a &#8216;chain&#8217; which forwards Multicast packets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Option 3 &#8211; Multicast Routing<\/h2>\n\n\n\n<p>The &#8216;official&#8217; way to do this is to use <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multicast_routing\" target=\"_blank\" rel=\"noreferrer noopener\">Multicast Routing<\/a> protocols to advertise that particular Routers need to propagate particular Multicast addresses. The preferred choice of Multicast Routing protocol seems to be <a href=\"https:\/\/en.wikipedia.org\/wiki\/Protocol-Independent_Multicast\" target=\"_blank\" rel=\"noreferrer noopener\">Protocol-Independent Multicast<\/a> (PIM) which is implemented in several routing software packages:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The standalone <a href=\"https:\/\/github.com\/troglobit\/pimd\" target=\"_blank\" rel=\"noreferrer noopener\">pimd<\/a> application<\/li>\n\n\n\n<li>As a component of the <a href=\"https:\/\/frrouting.org\" target=\"_blank\" rel=\"noreferrer noopener\">FRRouting<\/a> suite\n<ul class=\"wp-block-list\">\n<li>See <a href=\"https:\/\/docs.frrouting.org\/en\/latest\/pim.html\" target=\"_blank\" rel=\"noreferrer noopener\">PIM<\/a> (and <a href=\"https:\/\/docs.frrouting.org\/en\/latest\/pimv6.html\" target=\"_blank\" rel=\"noreferrer noopener\">PIMv6<\/a>) in the FRRouting documentation set<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>The &#8216;Protocol-Independent&#8217; aspect of PIM is that it relies on accurate unicast routing tables being maintained by a router but it doesn&#8217;t care how those are generated &#8211; e.g. whether they were derived using BGP, OSPF or other routing protocols (or even specified as static routes, presumably).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Selected Configuration &#8211; Option 2<\/h2>\n\n\n\n<p>For a relatively simple site with only two buildings and a fixed set of Multicast requirements, it seemed easiest to use a two-router implementation of &#8216;Option 2&#8217; (Broadcast Relay Software).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">UDP Broadcast Relay Software<\/h3>\n\n\n\n<p>The two routers are running the <a href=\"https:\/\/opnsense.org\" target=\"_blank\" rel=\"noreferrer noopener\">OPNsense<\/a> network security software. There is an optional <a href=\"https:\/\/forum.opnsense.org\/index.php?topic=15721.0\" target=\"_blank\" rel=\"noreferrer noopener\">UDP Broadcast Relay plugin<\/a> available for OPNsense which is based on <a href=\"https:\/\/github.com\/udp-redux\/udp-broadcast-relay-redux\">https:\/\/github.com\/udp-redux\/udp-broadcast-relay-redux<\/a> (which is now in an &#8216;archived&#8217; state). The plugin needs to be installed &#8211; and then configured &#8211; on both routers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Network Topology<\/h3>\n\n\n\n<p>The ArchiMate diagram below shows how the key components fit together:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>There are two Buildings, each with their own KNX Router, local TCP\/IP Network subnet and TCP\/IP network Router<\/li>\n\n\n\n<li>The two TCP\/IP network Router devices are connected via a separate &#8216;backbone&#8217; network subnet<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-1024x284.png\" alt=\"\" class=\"wp-image-6186\" srcset=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-1024x284.png 1024w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-300x83.png 300w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-768x213.png 768w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-1536x426.png 1536w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View-500x139.png 500w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/07\/KNX-Multicast-Networking-View.png 2010w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">ArchiMate diagram showing the main components for UDP Broadcast Relays in two Buildings<\/figcaption><\/figure>\n\n\n\n<p>The way this works is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>KNX traffic originating from KNX Router 1 is Multicast to all devices on TCP\/IP Network 1 &#8211; including TCP\/IP Router 1<\/li>\n\n\n\n<li>UDP Broadcast Relay 1 sees the incoming KNX traffic and propagates this as Multicast to its defined set of other TCP\/IP networks &#8211; including the TCP\/IP Backbone Network<\/li>\n\n\n\n<li>UDP Broadcast Relay 2 see the incoming KNX traffic and propagates this as Multicast to its defined set of other TCP\/IP networks &#8211; including TCP\/IP Network 2<\/li>\n\n\n\n<li>KNX Router 2 receives the relayed KNX traffic<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">UDP Broadcast Relay Configuration<\/h3>\n\n\n\n<p>Simply installing the UDP Broadcast Relay plugin has no effect. An <em>instance<\/em> of the Relay has to be configured (on each TCP\/IP Router) with the relevant network properties:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The &#8216;KNX&#8217; UDP port number: 3671<\/li>\n\n\n\n<li>The &#8216;KNX&#8217; Multicast address: 224.0.23.12<\/li>\n\n\n\n<li>The set of network interfaces to relay traffic between<\/li>\n\n\n\n<li>A unique UDP Broadcast Relay &#8216;Instance ID&#8217;\n<ul class=\"wp-block-list\">\n<li>These have to be different for the two relays &#8211; any incoming packets with a matching Instance ID are <strong>not<\/strong> forwarded (since they&#8217;re assumed to be duplicates) so in order for Relay 2 to propagate packets from Relay 1, the IDs need to be different<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Firewall Rule Requirements<\/h2>\n\n\n\n<p>Depending on the strictness of the firewall configuration on the two TCP\/IP Routers, it might be necessary to add firewall rules to allow the traffic to flow. A good way to understand whether firewall settings might be blocking traffic is to run the UDP Broadcast Relay from the command-line, in verbose mode, which will show error messages (or fail to show packets arriving and being forwarded).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Network Switch Configuration<\/h2>\n\n\n\n<p>Where a Multicast (IGMP) aware Layer 2 switch is in play, the first challenge is getting that to propagate Multicast traffic out of the switch and into the router.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Netgear<\/h3>\n\n\n\n<p>Netgear managed switches provide quite a number of configuration options for Multicast, managed via the Web UI under: Switching &gt; Multicast<\/p>\n\n\n\n<p>If &#8220;IGMP Snooping Status&#8221; is set to &#8220;Disable&#8221; then no attempt is made to filter Multicast traffic and it should be propagated without restrictions.<\/p>\n\n\n\n<p>If however &#8220;IGMP Snooping Status&#8221; is set to &#8220;Enable&#8221; then further configuration is required to specify what behaviour is required.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"875\" height=\"852\" src=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-1.png\" alt=\"\" class=\"wp-image-5887\" srcset=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-1.png 875w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-1-300x292.png 300w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-1-768x748.png 768w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-1-308x300.png 308w\" sizes=\"auto, (max-width: 875px) 100vw, 875px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the Web UI for a Netgear GS108T switch, showing the IGMP Snooping Configuration<\/figcaption><\/figure>\n\n\n\n<p>As with many of the Netgear configuration settings, Multicast traffic handling can be specified on an &#8220;Interface&#8221; basis or against other criteria &#8211; a key one being VLAN.<\/p>\n\n\n\n<p>It&#8217;s necessary to specify which VLANs should have IGMP Snooping enabled &#8211; and what other configuration settings apply.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"973\" height=\"852\" src=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-2.png\" alt=\"\" class=\"wp-image-5888\" srcset=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-2.png 973w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-2-300x263.png 300w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-2-768x672.png 768w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-2-343x300.png 343w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the Web UI for a Netgear GS108T switch, showing IGMP Snooping VLAN Configuration (in this case enabling that for VLAN 16)<\/figcaption><\/figure>\n\n\n\n<p>That covers the propagation of Multicast traffic between machines connected to the same switch <em>which all advertise Multicast group membership via IGMP<\/em>. However, an upstream Multicast Router needs to be specified separately.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"973\" height=\"852\" src=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-3.png\" alt=\"\" class=\"wp-image-5889\" srcset=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-3.png 973w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-3-300x263.png 300w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-3-768x672.png 768w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/05\/Netgear_GS108T_Multicast-3-343x300.png 343w\" sizes=\"auto, (max-width: 973px) 100vw, 973px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the Web UI for a Netgear GS108T switch, showing Multicast Router VLAN Configuration (in this case enabling that for VLAN 16 on interface port &#8220;g1&#8221;)<\/figcaption><\/figure>\n\n\n\n<p>Together, these settings get Multicast traffic (on VLAN 16) forwarded to and from the upstream Multicast Router.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ubiquiti UniFi<\/h3>\n\n\n\n<p>With Ubiquiti UniFi network switches, the situation is broadly similar &#8211; except that IGMP Snooping is enabled by default, for all VLANs.<\/p>\n\n\n\n<p>The Multicast configuration is summarised in the Settings &gt; Network page of the management console. The important thing is to ensure the Uplink switch ports &#8211; to the Router (or another Switch) are specified as &#8216;Multicast Router&#8217; ports for the VLANs which are known to be carrying Multicast traffic. This is specified on the configuration page for the relevant Switch Ports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"775\" src=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-1024x775.png\" alt=\"\" class=\"wp-image-6856\" srcset=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-1024x775.png 1024w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-300x227.png 300w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-768x581.png 768w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-1536x1163.png 1536w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2-396x300.png 396w, https:\/\/www.marshflattsfarm.org.uk\/wordpress\/wp-content\/uploads\/2025\/11\/image-2.png 1688w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">UniFi Controller Settings > Network summary section relating to Multicast traffic handling<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Further Reading<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/ivoryegg.co.uk\/essential_guides\/a-guide-to-using-knx-over-ip\" target=\"_blank\" rel=\"noreferrer noopener\">A guide to using KNX over IP <\/a>from Ivory Egg.<\/li>\n\n\n\n<li><a href=\"https:\/\/simonhackett.com\/2020\/09\/14\/knx-tips-and-traps-part-2-knx-ip-routing\/\">https:\/\/simonhackett.com\/2020\/09\/14\/knx-tips-and-traps-part-2-knx-ip-routing\/<\/a><\/li>\n<\/ul>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"b08b30db-be50-4d7b-8664-dc77047aa72b\">A variant containing just one twisted-pair is also available, which tolerates a tighter bend radius but is only recommended where that is especially important &#8211; typically within equipment racks  <a href=\"#b08b30db-be50-4d7b-8664-dc77047aa72b-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><li id=\"26d30d4e-090b-41fb-84f3-672a31261cde\">Though of course this depends on the power consumption of each device. Some of them &#8211; e.g. PIR sensors &#8211; might only have a nominal consumption of 3mA but others &#8211; e.g. IP Router devices &#8211; might want 40mA <a href=\"#26d30d4e-090b-41fb-84f3-672a31261cde-link\" aria-label=\"Jump to footnote reference 2\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Introduction KNX home automation installations use characteristic bright green &#8216;TP1&#8217; cabling to form the KNX &#8216;bus&#8217; that devices connect to. This cabling normally consists of two twisted pairs (red\/white and yellow\/white) plus a ground\/drain wire &#8211; all protected by a &hellip; <a href=\"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/?page_id=5656\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5823,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[{\"content\":\"A variant containing just one twisted-pair is also available, which tolerates a tighter bend radius but is only recommended where that is especially important - typically within equipment racks \",\"id\":\"b08b30db-be50-4d7b-8664-dc77047aa72b\"},{\"content\":\"Though of course this depends on the power consumption of each device. Some of them - e.g. PIR sensors - might only have a nominal consumption of 3mA but others - e.g. IP Router devices - might want 40mA\",\"id\":\"26d30d4e-090b-41fb-84f3-672a31261cde\"}]"},"class_list":["post-5656","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/5656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5656"}],"version-history":[{"count":12,"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/5656\/revisions"}],"predecessor-version":[{"id":6857,"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/5656\/revisions\/6857"}],"up":[{"embeddable":true,"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/5823"}],"wp:attachment":[{"href":"https:\/\/www.marshflattsfarm.org.uk\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}