Hi Tomas,
you can do this in several ways but the easiest is probably to configure a control-plane acl on the ASA. This limits the traffic to the box (as opposed to the interfce ACLs which only filter traffic through the box).
Can't find a good reference right now but if memory serves me well it would be something like
access-list FOO permit tcp 10.0.0.0 255.0.0.0 interface outside 443
access-group FOO in interface outside control-plane
note that if you want to allow IPsec, ping, ssh, ASDM etc from the outside then you will have to explicitly allow that in this ACL as well
hth
Herbert