Indra, did you observe this on Shared Network - I had same issue with
Shared Network (public IPs) in Advanced Zone.

I think VR for VPC is NOT a problem...

On 15 December 2014 at 13:13, Indra Pramana <in...@sg.or.id> wrote:
>
> Dear all,
>
> We are using CloudStack 4.2.0 with KVM hypervisors.
>
> Is there a way to prevent our virtual routers (VRs) to be targeted by DNS
> amplification attack? It seems that the DNS services on dnsmasq running on
> the VRs are by default recursive, causing it to easily be targeted for DNS
> amplification attack.
>
> Any advice on how to overcome this?
>
> Looking forward to your reply, thank you.
>
> Cheers.
>


-- 

Andrija Panić

Reply via email to