I have an ASA 5500 and need to connect a network to e0/3 that sends ALL outbound traffic directly and ONLY to e0/1. The purpose of this is to restrict access from a switch on the e0/3 interface, for use by visitors and vendors, and prevent access to the internal networks, connected to the same ASA at e0/0. For the purpose of suggested responses, let's call e0/3 "Guest" and e0/1 "DSL." I thought I knew how to do this with an "access-list inside_out extended permit ip interface Guest interface DSL", but I must still be missing something. Thanx!
If your guest interface is higher security level than the outside check your routes to make sure you are going out the outside interface and your Guest Interface ACL. Also if you tests are pings make sure you have icmp inspection enabled.
Now as for restricting the Guest interface to go out only one destination I would suggest using a Guest interface ACL to allow only destinations that reside on the outside interface that you want.
I hope it helps.