Anyone can give example to explain " proxy acl"

Posted on 2013-05-28
Last Modified: 2013-05-29
hi, I am getting a little confused about proxy acl. Anyone can give example to explain " proxy acl, access control list"  Thanks.
Question by:EESky
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 64

Accepted Solution

btan earned 250 total points
ID: 39203592
Actually to put it simply ACL is just rule telling what is allow and deny based in some parameter or criteria or condition. Proxy ACL simply refers to ACL used and can be deplyed into a proxy device or software.  Like to use squid which is a commonly deployed proxy as example as this link state what is ACL and sometime the confusion is using term like access list which is simply ACL. there is example ACL for squid stating briefly what it does based on certain condition.

Nonetheless it is eventually part of athe overall authorisation policy to access certain destination or resource. Note in the context of OS, acl can be slightly intepret differently as it tags user identity to his rights for resource access level....
LVL 18

Assisted Solution

by:Sanga Collins
Sanga Collins earned 250 total points
ID: 39204776
it is also a term used in VPN creation. Especially when you want to allow only specifc subnets on each side to be allowed to pass traffic via the tunnel while also being a part of the phase 2 security negotiation.

for example. On juniper device Proxy-ID is the equivalent of Cisco ACL.

Featured Post

Get HTML5 Certified

Want to be a web developer? You'll need to know HTML. Prepare for HTML5 certification by enrolling in July's Course of the Month! It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question