It depends where you're planning to apply this ACL and what your internal subnets and vlans are if it will have the desired results. It looks like your internal subnets are all the private address spaces, so just for example purposes let's say your network looks like this:
Vlan 10 - 10.0.0.0/8
vlan 20 - 172.16.0.0/12
vlan 30 - 192.168.0.0/16.
ACL's are sequential, once a packet matches a line of the ACL it follows that action and does not check any other lines. If you applied that ACL to, let's say, the switches uplink port (firewall or internet access port) your first 6 lines of the ACL block all traffic for the 3 subnets so your DHCP and DNS traffic gets dropped too. You want to make sure you put the more specific rules on top (before the "deny ip any").
For inter vlan routing, you have to use vlan access-maps and filters. Those can be a little tricky and they don't filter by port or protocol, they only filter by IP address, also they are direction specific, you can't apply one "in" or "out" like you do on a port ACL, you just apply it and if a packet matches the access map and is trying to enter or exit the vlan, it is dropped.
May need a little more info on where you're trying to control and your network layout to build both a PACL and VACL but I hope that gives you a little more insight on both topics
The unwanted IP address space is much larger than the RFC 1918 addresses you have included in your ACL. f you are really fastidious about not letting in undesirable traffic consult such sites as The Bogon Reference - Team Cymru for lists of bogons to be denied. (It is of course not the only site but it is the easiest for me to remember)
Also the easiest way to prevent inter-VLAN routing might be to put each VLAN in its own VRF and leak the global route to the global routing table. Then you have independent control over what each VLAN is able to access.
Community Live- ISR1100X-4G and ISR1100X-6G Platform Overview and Architecture
(Live event - Tuesday, 23 March, 2021 at 10:00 am Pacific/ 1:00 pm Eastern / 7:00 pm Paris)-
This event will have place on Tuesday 23rd, March 2021 at 10:00 hrs PDT&...
Cisco Secure Network Access is helping IT to bridge the gap between what is essential to the business and what the network delivers and to build the next-generation campus network for an unplugged and uninterrupted experience.
Learn more about how these w...
(view in My Videos)
Community Live- New Additions to the Catalyst 8000 Family
(Live event - Tuesday, 23 February, 2021 at 10:00 am Pacific/ 1:00 pm Eastern / 7:00 pm Paris)-
This event had place on Tuesday 23rd, February 2021 at 10:00 hrs PDT...
Community Live-ISR1100X-4G and ISR1100X-6G Platform Overview and Architecture
This event had place on Tuesday 23rd, February 2021 at 10hrs PDT
Designed for an intent-based network, the Cisco Catalyst 8000 Edge Platforms family offers ...
To participate in this event, please use the button to ask your questions
New Additions to the Catalyst 8000 Family
This forum is a chance to clarify all your questions related to the Catalyst 8k Family!
Designed for an intent-based network, the Ci...