Please refer the following ticket, It will help 
https://issues.apache.org/jira/browse/CLOUDSTACK-5494


Thanks,
jayapal
On 15-Dec-2014, at 5:52 PM, Andrija Panic <andrija.pa...@gmail.com> wrote:

> Indra, did you observe this on Shared Network - I had same issue with
> Shared Network (public IPs) in Advanced Zone.
> 
> I think VR for VPC is NOT a problem...
> 
> On 15 December 2014 at 13:13, Indra Pramana <in...@sg.or.id> wrote:
>> 
>> Dear all,
>> 
>> We are using CloudStack 4.2.0 with KVM hypervisors.
>> 
>> Is there a way to prevent our virtual routers (VRs) to be targeted by DNS
>> amplification attack? It seems that the DNS services on dnsmasq running on
>> the VRs are by default recursive, causing it to easily be targeted for DNS
>> amplification attack.
>> 
>> Any advice on how to overcome this?
>> 
>> Looking forward to your reply, thank you.
>> 
>> Cheers.
>> 
> 
> 
> -- 
> 
> Andrija Panić

Reply via email to