检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
将虚拟网关加载到云连接实例,可以实现云下IDC与云上多VPC互通,构建混合云。 在云专线服务中,虚拟网关将虚拟接口和VPC关联,即可实现本地数据中心访问VPC。云专线的更多信息,请参见什么是云专线。 图1 云专线原理图 网络实例的使用限制 加载到云连接实例的同区域网络实例默认互通,无需额外配置。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
5sghjlse684b", "name": "project_name", "description": "", "links": { "next": null,
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
更新分支网络的详细信息。 表4 UpdateSiteNetwork 参数 是否必选 参数类型 描述 name 否 String 实例名称。 description 否 String 实例描述。不支持 <>。 tags 否 Array of Tag objects 实例标签。 表5 Tag 参数
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
您也可通过单击“新建企业路由器”创建新的实例。 接入中心网络的附件实例 附件类型 接入附件管理的网络实例类型。 当前仅支持“全域接入网关”。 全域接入网关:实现专线访问中心网络中的企业路由器的逻辑接入网关,一个全域接入网关可以关联多个区域的企业路由器。 区域 选择全域接入网关实例所在区域。 该区域可以与接入中心网络的目标区域不同。
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted
great security risks. It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted