Try this instead of your current rules: Create an ACL containing all local (RFC1918) address ranges which you do not want addressed from the LAB, assuming it is this one you want isolated (else as applicable). I'll call it no_go for the example.
Create a Pass rule for your LAB interface: direction in, source/invert unchecked, source any, dest/invert checked, dest "no_go", dest port any.This will give access to the WAN and to anything not in your no_go ACL.You can add a Block rule below which is source "LAB net" dest any to catch anything else.I use this for my IoT which is allowed out to WAN and nowhere else, with nothing incoming to it. I can still access IoT devices from LAN of course.Edited to mention Pass and Block