Let's say an attacker somehow gained access to a machine on the LAN (192.168.x.x), i.e. someone browsed a malicious website or something, and was able to set up a stealth server on some port to phone home, send out spams, be a bot for DDoS, etc. Do the default RV0*2 rules prevent outbound traffic from such a beast? If not, how should I go about preventing this (looking on specifics on rules to set up on the RV042, recommended ports to block, etc.)? Keeping in mind that I want to retain access for some common services like HTTP, VNC, RDC, etc. etc. only on the LAN and VPNs (a secondary question/confirmation is, are the VPNs assumed to be on the LAN port, for purposes of firewall rule evaluation as they appear to be)?