Please refer the following ticket, It will help https://issues.apache.org/jira/browse/CLOUDSTACK-5494
Thanks, jayapal On 15-Dec-2014, at 5:52 PM, Andrija Panic <andrija.pa...@gmail.com> wrote: > Indra, did you observe this on Shared Network - I had same issue with > Shared Network (public IPs) in Advanced Zone. > > I think VR for VPC is NOT a problem... > > On 15 December 2014 at 13:13, Indra Pramana <in...@sg.or.id> wrote: >> >> Dear all, >> >> We are using CloudStack 4.2.0 with KVM hypervisors. >> >> Is there a way to prevent our virtual routers (VRs) to be targeted by DNS >> amplification attack? It seems that the DNS services on dnsmasq running on >> the VRs are by default recursive, causing it to easily be targeted for DNS >> amplification attack. >> >> Any advice on how to overcome this? >> >> Looking forward to your reply, thank you. >> >> Cheers. >> > > > -- > > Andrija Panić