
(Updated 7: Updating the ACLs to allow unrestricted outbound access, as per requested) no access-list ALLOW_WIRED standard permit 192.168.0.0 255.255.255.0 Extended ACLs allow for control of traffic by way of source and destination, rather than just source of the traffic. In addition, I recommend changing the ACLs from standard ACLs to extended ACLs. The ALLOW_WIRED and ALLOW_WIRELESS ACLs are defined but not applied to any interfaces. same-security-traffic permit intra-interface command is required.



By default, ASAs do not allow traffic of the security level to enter another interface of the same security level.
