Como configurar a VPN de alta disponibilidade do Google Cloud avaliações

90020 avaliações

good

Shashi S. · Revisado há about 2 years

LOUKYANJALI E. · Revisado há about 2 years

I believe that their laboratories would be much more explanatory and better if the complete topology image of the lab were shown, this included ips, interfaces, names of the services they use. To better understand what was being done I had to go back many times while advancing to relate part of the commands with the tags of other services (the tag is perfect), but it would help more if a complete topology was present.

Terry Q. · Revisado há about 2 years

Stella K. · Revisado há about 2 years

Valentina S. · Revisado há about 2 years

Corey F. · Revisado há about 2 years

Divya K. · Revisado há about 2 years

Priyanshu D. · Revisado há about 2 years

Kankatala S. · Revisado há about 2 years

Chirag P. · Revisado há about 2 years

Gireesh M. · Revisado há about 2 years

sunny c. · Revisado há about 2 years

Kamalaksha D. · Revisado há about 2 years

Sushant B. · Revisado há about 2 years

Kunal K. · Revisado há about 2 years

Sarada R. · Revisado há about 2 years

Dinesh N. · Revisado há about 2 years

Ardra M. · Revisado há about 2 years

Ari Y. · Revisado há about 2 years

Chaitanya G. · Revisado há about 2 years

I guess in this lab we need to create some unnecessary firewall rules. I mean if we create a firewall rule to allow (ssh,icmp) traffic from anywhere, the additional rules related to specific subnets are unuseful.

Andrés R. · Revisado há about 2 years

Anushi A. · Revisado há about 2 years

Madhan B. · Revisado há about 2 years

Alok J. · Revisado há about 2 years

NAVADEEP REDDY V. · Revisado há about 2 years

Não garantimos que as avaliações publicadas sejam de consumidores que compraram ou usaram os produtos. As avaliações não são verificadas pelo Google.