How the access to / from the ASA device controlled? 1. What about traffic originating from the ASA? Example Syslog traffic, SNMP trap, TACACS etc. going to devices to the "inside" interface. Do we need any kind of access list or how do we control thi...