Dear all,

We are using CloudStack 4.2.0 with KVM hypervisors.

Is there a way to prevent our virtual routers (VRs) to be targeted by DNS
amplification attack? It seems that the DNS services on dnsmasq running on
the VRs are by default recursive, causing it to easily be targeted for DNS
amplification attack.

Any advice on how to overcome this?

Looking forward to your reply, thank you.

Cheers.

Reply via email to