Hello Erhan,
your ACL 120 would stop VLAN 10 end systems from using the IP addresses in the two ranges you specified (specific anti-spoofing). I do not think that is what you want.
To allow communication initiated from inside VLAN 10, but deny connection establishment from outside to VLAN 10, in general requires a stateful firewall.
Sometimes a stateless packet filter on a switch is sufficient. For TCP connections you can use the "established" keyword to allow replies. You might need to allow additional traffic in as well, e.g. ICMP Fragmentation required, and DF flag set for path MTU discovery, ICMP echo reply to test connectivity, perhaps DHCP server messages, DNS, and whatever else you may need for the end systems to work.
The starting example would be:
ip access-list extended 120
permit tcp any any establishedinterface vlan 10
ip access-group 120 outNote that this ACL is configured outbound on the VLAN 10 SVI to affect packets entering VLAN 10 from some other routed interface.
Br,
Erik