Say I have an ASA firewall with a bunch of access lists and I needed to allow uses in and out access to a certain website on port 10101 (example port) do I have to apply an access list outbound on an interface specifying like "access-list extended OUTBOUND permit any any host <websiteIP> eq 10101" then the same coming inbound?
I'm assuming the website server is located on the inside or a dmz. And that those are normally configured with a higher security level than the outside interface.
You just need the inbound access list. This is because traffic by default is allowed to flow from higher to lower security level interfaces. But it's not allowed to flow from a lower to higher security level interfaces. So to allow from lower to higher, you need the access list. Some thing like this:
[code:1]access-list OUTSIDE_ACCESS_IN extended permit tcp any host <websiteIP> eq 10101
access-group OUTSIDE_ACCESS_IN in interface outside[/code:1]
By the way, you typically also need a static NAT or PAT statement to forward traffic to the inside server.
Sorry for the misunderstanding, I thought that you have your own server at inside/dmz and try to allow internet users to access it.
To allow inside users to access outside servers (or any outside IP). You need a nat statement and possibly a matching global statement (if not using nat 0). You don't need an access list on the inside or outside UNLESS you are already using access lists that block such traffic.
It's better if you post your config here so we can help you further. You can mask out any private/passwords info.