Como configurar a VPN de alta disponibilidade do Google Cloud avaliações
90020 avaliações
good
Shashi S. · Revisado há about 2 years
LOUKYANJALI E. · Revisado há about 2 years
I believe that their laboratories would be much more explanatory and better if the complete topology image of the lab were shown, this included ips, interfaces, names of the services they use. To better understand what was being done I had to go back many times while advancing to relate part of the commands with the tags of other services (the tag is perfect), but it would help more if a complete topology was present.
Terry Q. · Revisado há about 2 years
Stella K. · Revisado há about 2 years
Valentina S. · Revisado há about 2 years
Corey F. · Revisado há about 2 years
Divya K. · Revisado há about 2 years
Priyanshu D. · Revisado há about 2 years
Kankatala S. · Revisado há about 2 years
Chirag P. · Revisado há about 2 years
Gireesh M. · Revisado há about 2 years
sunny c. · Revisado há about 2 years
Kamalaksha D. · Revisado há about 2 years
Sushant B. · Revisado há about 2 years
Kunal K. · Revisado há about 2 years
Sarada R. · Revisado há about 2 years
Dinesh N. · Revisado há about 2 years
Ardra M. · Revisado há about 2 years
Ari Y. · Revisado há about 2 years
Chaitanya G. · Revisado há about 2 years
I guess in this lab we need to create some unnecessary firewall rules. I mean if we create a firewall rule to allow (ssh,icmp) traffic from anywhere, the additional rules related to specific subnets are unuseful.
Andrés R. · Revisado há about 2 years
Anushi A. · Revisado há about 2 years
Madhan B. · Revisado há about 2 years
Alok J. · Revisado há about 2 years
NAVADEEP REDDY V. · Revisado há about 2 years
Não garantimos que as avaliações publicadas sejam de consumidores que compraram ou usaram os produtos. As avaliações não são verificadas pelo Google.