If i am reading this right, within each vlan you would like users from vlan 1 and vlan 10 to communicate with anyone in remaining vlans (for example 5,7,15... whatever number).
So in your above configuration.. this is what you are allowing within each vlan (in this example vlan 49):
10.64.10.x can do and see anyone
10.64.1.x can do and see anyone
everyone destined to everything else is dropped. Your deny ip any any at the end does nothing.. VACL's are like route-maps and a deny just means that there isn't a match on that particular Access-map statement. When that happens there is no VACL permit 20 with action forward so it denies the traffic. It basically could be removed.
So with that logic, any traffic within that vlan (including internet) will be dropped.
Here is what i would do if you want to use VACL's. If you have Vlan SVI's that might be a better option with L3 access-lists if your looking for alternatives.
List out your current VLAN ip subnets and summarize if possible
Vlan 1 = Subnet 1
Vlan 2 = Subnet 2
ip access-list extended DROP
permit ip any
permit ip any
** exclude vlan/subnet 10 and 1
vlan access-map VACL permit 10
match ip address DROP
vlan access-map VACL permit 20
vlan filter VACL vlan-list 49
Do this for all vlans except for 10 and 1.
For 10 and 1
ip access-list ext VLAN10
permit ip 10.64.10.0 0.0.0.255 any
permit ip any 10.64.10.0 0.0.0.255
ip access=list ext VLAN1
permit ip 10.64.1.0 0.0.0.255 any
permit ip any 10.64.1.0 0.0.0.255 any
vlan access-map VACL10 permit 10
match ip address VLAN1
vlan access-map VACL10 permit 20
vlan access-map VACL1 permit 10
match ip address VLAN10
vlan access-map VACL1 permit 20
vlan filter-list VACL10 vlan-list 10
vlan filter-list VACL1 vlan-list 1
Really might look at some Layer 3 acls as suggested before though
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...