{"id":1811,"date":"2025-09-28T20:52:21","date_gmt":"2025-09-28T13:52:21","guid":{"rendered":"https:\/\/www.linuxid.net\/istilah\/?p=1811"},"modified":"2025-09-28T20:52:21","modified_gmt":"2025-09-28T13:52:21","slug":"layer-two-tunneling-protocol-l2tp","status":"publish","type":"post","link":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/","title":{"rendered":"Layer Two Tunneling Protocol (L2TP)"},"content":{"rendered":"<h2>Apa itu Layer Two Tunneling Protocol (L2TP)?<\/h2>\n<p>Layer Two Tunneling Protocol (L2TP) adalah ekstensi dari Point-to-Point Tunneling Protocol (PPTP) yang digunakan oleh penyedia layanan internet (<a href=\"https:\/\/www.linuxid.net\/istilah\/ISP\/\">ISP<\/a>) untuk membangun virtual private network (<a href=\"https:\/\/www.linuxid.net\/istilah\/virtual-private-network\/\">VPN<\/a>). Untuk menjamin keamanan dan privasi, L2TP harus bergantung pada protokol <a href=\"https:\/\/www.linuxid.net\/istilah\/encryption\/\">enkripsi<\/a> agar lalu lintas data bisa melewati tunnel dengan aman.<\/p>\n<p>L2TP dapat mentransfer sebagian besar tipe data Layer 2 melalui jaringan <a href=\"https:\/\/www.linuxid.net\/istilah\/Internet-Protocol\/\">IP<\/a> atau jaringan Layer 3 (L3). Proses ini membentuk tunnel antara L2TP access concentrator (LAC) dan L2TP network server (LNS) di internet. Hal ini memungkinkan terbentuknya koneksi Point-to-Point Protocol (<a href=\"https:\/\/www.linuxid.net\/istilah\/PPP\/\">PPP<\/a>) pada lapisan link yang dienkapsulasi dan ditransfer melalui internet.<\/p>\n<p>End user memulai koneksi PPP ke ISP melalui Integrated Services Digital Network (ISDN) atau layanan <a href=\"https:\/\/www.linuxid.net\/istilah\/PSTN\/\">public switched telephone network<\/a> (PSTN).<\/p>\n<p>L2TP menggabungkan fitur terbaik dari dua protokol tunneling lain:<\/p>\n<ol class=\"default-list\/\">\n<li><a href=\"http:\/\/wwwdisc.chimica.unipd.it\/luigino.feltre\/pubblica\/unix\/winnt_doc\/pppt\/understanding_pptp.html\" target=\"_blank\" rel=\"noopener\/\">PPTP dari Microsoft<\/a><\/li>\n<li><a href=\"https:\/\/etutorials.org\/Networking\/Integrated+cisco+and+unix+network+architectures\/Chapter+11.+VPN+Technologies+Tunnel+Interfaces+and+Architectures\/Cisco+L2F+Layer+2+Forwarding\/\" target=\"_blank\" rel=\"noopener\/\">Layer 2 Forwarding dari Cisco Systems<\/a><\/li>\n<\/ol>\n<p>L2TP terdiri dari dua komponen inti:<\/p>\n<ol class=\"default-list\/\">\n<li>LAC &#8212; perangkat yang secara fisik mengakhiri panggilan; dan<\/li>\n<li>LNS &#8212; perangkat yang mengakhiri serta dapat melakukan <a href=\"https:\/\/www.linuxid.net\/istilah\/authentication\/\">autentikasi<\/a> terhadap aliran PPP.<\/li>\n<\/ol>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote.jpg\/\"><img decoding=\"async\" class=\"lazy\" src=\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote.jpg 1280w\" alt=\"how a vpn works\" width=\"520\/\" height=\"172\" \/><figcaption><i class=\"icon pictures\" data-icon=\"z\/\"><\/i>Layer Two Tunneling Protocol memungkinkan ISP menggunakan virtual private network.<\/figcaption><div class=\"main-article-image-enlarge\/\"><\/div>\n<\/figure>\n<p>L2TP awalnya tidak terlalu dikenal. Versi awalnya hanya terbatas untuk membawa PPP. Namun, keterbatasan ini sekarang sudah tidak berlaku lagi. PPP sendiri mendefinisikan cara melakukan <a href=\"https:\/\/www.linuxid.net\/istilah\/encapsulation\/\">enkapsulasi<\/a> untuk mengirimkan <a href=\"https:\/\/www.linuxid.net\/istilah\/packet\/\">paket<\/a> multiprotocol melalui link point-to-point Layer 2.<\/p>\n<p>Pada skenario ini, user terhubung ke network access server (<a href=\"https:\/\/www.linuxid.net\/istilah\/network-access-server\/\">NAS<\/a>) melalui ISDN, <a href=\"https:\/\/www.linuxid.net\/istilah\/ADSL\/\">Asymmetric Digital Subscriber Line<\/a>, <a href=\"https:\/\/www.linuxid.net\/istilah\/plain-old-telephone-service-POTS\/\">Plain Old Telephone Service<\/a>, atau layanan lain, lalu PPP berjalan di atas koneksi tersebut. Dalam konfigurasi ini, session L2 dan PPP memiliki <a href=\"https:\/\/www.linuxid.net\/istilah\/endpoint-device\/\">endpoint<\/a> pada NAS yang sama.<\/p>\n<h2>Untuk apa L2TP digunakan?<\/h2>\n<p>L2TP menggunakan koneksi packet-switched network sehingga endpoint dapat berada di mesin yang berbeda.<\/p>\n<p>User memiliki koneksi L2 ke LAC, yang kemudian men-tunnel frame PPP ke NAS. Dengan demikian, paket dapat diproses terpisah dari lokasi <a href=\"https:\/\/www.linuxid.net\/istilah\/circuit\/\">circuit<\/a> termination.<\/p>\n<p>Jika circuit concentrator berada di lokasi lokal, biaya panggilan jarak jauh dapat dihindari. Manfaat tambahan lainnya mencakup reliabilitas, stabilitas, <a href=\"https:\/\/www.linuxid.net\/istilah\/compatibility\/\">kompatibilitas<\/a>, fleksibilitas konfigurasi, serta perlindungan dari <a href=\"https:\/\/www.linuxid.net\/istilah\/man-in-the-middle-attack-MitM\/\">serangan man-in-the-middle<\/a>.<\/p>\n<p>L2TP juga mendukung berbagai opsi autentikasi yang dibawa oleh PPP. Ini termasuk Password Authentication Protocol, Microsoft Challenge-Handshake Authentication Protocol, dan <a href=\"https:\/\/www.linuxid.net\/istilah\/CHAP-Challenge-Handshake-Authentication-Protocol\/\">CHAP<\/a>. Selain itu, L2TP dapat memperkuat keamanan dengan menggunakan IP Security (<a href=\"https:\/\/www.linuxid.net\/istilah\/IPsec-Internet-Protocol-Security\/\">IPsec<\/a>) untuk mengautentikasi endpoint tunnel.<\/p>\n<p>Meskipun begitu, L2TP juga punya beberapa kelemahan, seperti kegagalan transmisi akibat perbedaan <a href=\"https:\/\/www.linuxid.net\/istilah\/key\/\">key<\/a> keamanan, dukungan <a href=\"https:\/\/www.linuxid.net\/istilah\/port\/\">port<\/a> yang terbatas, dan kecepatan transfer yang lebih lambat.<\/p>\n<h2>Apa perbedaan L2TP dengan PPTP?<\/h2>\n<p>Terdapat beberapa perbedaan antara L2TP dan PPTP.<\/p>\n<p>Misalnya, L2TP bisa menggunakan berbagai media tunnel, sedangkan PPTP hanya dapat men-tunnel melalui jaringan IP.<\/p>\n<p>L2TP juga mendukung beberapa tunnel antara dua endpoint, masing-masing dengan <a href=\"https:\/\/www.linuxid.net\/istilah\/QoS-Quality-of-Service\/\">quality of service<\/a> sendiri. PPTP hanya mendukung satu tunnel antar endpoint.<\/p>\n<p>Header L2TP terkompresi berukuran 4 byte, sedangkan header PPTP terkompresi berukuran 6 byte.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/networking-circuit_switching_vs_packet_switching.png\/\"><img decoding=\"async\" class=\"lazy\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/networking-circuit_switching_vs_packet_switching_mobile.png\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/networking-circuit_switching_vs_packet_switching_mobile.png 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/networking-circuit_switching_vs_packet_switching.png 1280w\" alt=\"circuit vs. packet switching\" width=\"560\/\" height=\"551\" \/><\/p>\n<div class=\"main-article-image-enlarge\/\"><\/div>\n<\/figure>\n<h2>Apa saja protokol Layer 2?<\/h2>\n<p>Ada beberapa protokol komunikasi Layer 2 yang digunakan oleh perangkat L2, seperti multiport bridge dan <a href=\"https:\/\/www.linuxid.net\/istilah\/network-interface-card\/\">network interface card<\/a>, untuk membawa data antar node di local area network (<a href=\"https:\/\/www.linuxid.net\/istilah\/local-area-network-LAN\/\">LAN<\/a>) maupun <a href=\"https:\/\/www.linuxid.net\/istilah\/WAN-wide-area-network\/\">WAN<\/a>.<\/p>\n<p>Protokol data link L2 selain L2TP meliputi:<\/p>\n<ul class=\"default-list\/\">\n<li>Attached Resource Computer Network;<\/li>\n<li>Asynchronous Transfer Mode;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/Ethernet\/\">Ethernet<\/a>;<\/li>\n<li>Ethernet Automatic Protection Switching;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/FDDI\/\">Fiber Distributed Data Interface<\/a>;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/HDLC\/\">High-Level Data Link Control<\/a>;<\/li>\n<li>IEEE 802.2 &#8212; menyediakan logical link control untuk lapisan media access control IEEE 802;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/80211\/\">IEEE 802.11<\/a> wireless LAN;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/Multiprotocol-Label-Switching-MPLS\/\">Multiprotocol Label Switching<\/a>;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/spanning-tree-protocol\/\">Spanning Tree Protocol<\/a>;<\/li>\n<li><a href=\"https:\/\/www.linuxid.net\/istilah\/Token-Ring\/\">Token Ring<\/a>; dan<\/li>\n<li>Unidirectional Link Detection.<\/li>\n<\/ul>\n<h2>Fitur lain dari Layer Two Tunneling Protocol<\/h2>\n<p>Beberapa pertanyaan umum terkait L2TP antara lain:<\/p>\n<h3>Apa itu L2TP passthrough?<\/h3>\n<p>L2TP passthrough adalah protokol tunneling L2 yang digunakan untuk sesi point-to-point melalui internet pada layer 2.<\/p>\n<h3>Apa itu TCP tunneling?<\/h3>\n<p><a href=\"https:\/\/www.linuxid.net\/istilah\/TCP\/\">TCP<\/a> tunneling digunakan untuk menggabungkan dan mengirimkan paket antara satu koneksi TCP dengan host tujuan. TCP tunnel meningkatkan fairness antar aliran data yang digabungkan dan memungkinkan transmisi transparan beberapa protokol melewati <a href=\"https:\/\/www.linuxid.net\/istilah\/firewall\/\">firewall<\/a>.<\/p>\n<h3>Apa itu L2TP over IPsec?<\/h3>\n<p>L2TP over IPsec menggabungkan teknologi protokol transfer L2 dengan IPsec. Cara kerjanya mirip dengan VPN, di mana IPsec membuat channel aman yang membungkus lalu lintas L2TP.<\/p>\n<h3>Apa itu L2TP secret?<\/h3>\n<p>L2TP secret atau VPN secret adalah password unik yang digunakan sebagai pengganti password biasa untuk mengakses VPN. Koneksi PPTP ke VPN harus menggunakan L2TP secret.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apa itu Layer Two Tunneling Protocol (L2TP)? Layer Two Tunneling Protocol (L2TP) adalah ekstensi dari Point-to-Point Tunneling Protocol (PPTP) yang digunakan oleh penyedia layanan internet (ISP) untuk membangun virtual private network (VPN). Untuk menjamin keamanan dan privasi, L2TP harus bergantung pada protokol enkripsi agar lalu lintas data bisa melewati tunnel dengan aman. L2TP dapat mentransfer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[92],"class_list":["post-1811","post","type-post","status-publish","format-standard","hentry","category-computer-science","tag-network-infrastructure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer\" \/>\n<meta property=\"og:description\" content=\"Apa itu Layer Two Tunneling Protocol (L2TP)? Layer Two Tunneling Protocol (L2TP) adalah ekstensi dari Point-to-Point Tunneling Protocol (PPTP) yang digunakan oleh penyedia layanan internet (ISP) untuk membangun virtual private network (VPN). Untuk menjamin keamanan dan privasi, L2TP harus bergantung pada protokol enkripsi agar lalu lintas data bisa melewati tunnel dengan aman. L2TP dapat mentransfer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/\" \/>\n<meta property=\"og:site_name\" content=\"Istilah Komputer\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-28T13:52:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg\" \/>\n<meta name=\"author\" content=\"adhit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"adhit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/\",\"url\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/\",\"name\":\"Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer\",\"isPartOf\":{\"@id\":\"https:\/\/linuxid.net\/istilah\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg\",\"datePublished\":\"2025-09-28T13:52:21+00:00\",\"author\":{\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage\",\"url\":\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg\",\"contentUrl\":\"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/linuxid.net\/istilah\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Layer Two Tunneling Protocol (L2TP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#website\",\"url\":\"https:\/\/linuxid.net\/istilah\/\",\"name\":\"Istilah Komputer\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/linuxid.net\/istilah\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d\",\"name\":\"adhit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1777193465\",\"contentUrl\":\"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1777193465\",\"caption\":\"adhit\"},\"sameAs\":[\"https:\/\/linuxid.net\/istilah\"],\"url\":\"https:\/\/www.linuxid.net\/istilah\/author\/xsandradietsax\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/","og_locale":"id_ID","og_type":"article","og_title":"Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer","og_description":"Apa itu Layer Two Tunneling Protocol (L2TP)? Layer Two Tunneling Protocol (L2TP) adalah ekstensi dari Point-to-Point Tunneling Protocol (PPTP) yang digunakan oleh penyedia layanan internet (ISP) untuk membangun virtual private network (VPN). Untuk menjamin keamanan dan privasi, L2TP harus bergantung pada protokol enkripsi agar lalu lintas data bisa melewati tunnel dengan aman. L2TP dapat mentransfer [&hellip;]","og_url":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/","og_site_name":"Istilah Komputer","article_published_time":"2025-09-28T13:52:21+00:00","og_image":[{"url":"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg","type":"","width":"","height":""}],"author":"adhit","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"adhit","Estimasi waktu membaca":"3 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/","url":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/","name":"Apa itu Layer Two Tunneling Protocol (L2TP)? - Istilah Komputer","isPartOf":{"@id":"https:\/\/linuxid.net\/istilah\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage"},"image":{"@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg","datePublished":"2025-09-28T13:52:21+00:00","author":{"@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d"},"breadcrumb":{"@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#primaryimage","url":"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg","contentUrl":"https:\/\/www.techtarget.com\/rms\/onlineImages\/networking-vpn_remote_mobile.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.linuxid.net\/istilah\/layer-two-tunneling-protocol-l2tp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/linuxid.net\/istilah\/"},{"@type":"ListItem","position":2,"name":"Layer Two Tunneling Protocol (L2TP)"}]},{"@type":"WebSite","@id":"https:\/\/linuxid.net\/istilah\/#website","url":"https:\/\/linuxid.net\/istilah\/","name":"Istilah Komputer","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/linuxid.net\/istilah\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/ec7c6c711087fb70886ff5a4fe68e83d","name":"adhit","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/linuxid.net\/istilah\/#\/schema\/person\/image\/","url":"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1777193465","contentUrl":"https:\/\/www.linuxid.net\/istilah\/wp-content\/litespeed\/avatar\/808829c8eb1b70c161b392916104c2ba.jpg?ver=1777193465","caption":"adhit"},"sameAs":["https:\/\/linuxid.net\/istilah"],"url":"https:\/\/www.linuxid.net\/istilah\/author\/xsandradietsax\/"}]}},"_links":{"self":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts\/1811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/comments?post=1811"}],"version-history":[{"count":1,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts\/1811\/revisions"}],"predecessor-version":[{"id":6358,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/posts\/1811\/revisions\/6358"}],"wp:attachment":[{"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/media?parent=1811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/categories?post=1811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linuxid.net\/istilah\/wp-json\/wp\/v2\/tags?post=1811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}