VPN Kill switch needed?
is there a need to create a floating rule to kill the internet connection if the vpn drops out?
i used to have one but currently i don't have any rules to my WAN port anymore, only to the vpn gateways
If you don't have any outbound NAT rules on the WAN and your internal subnets are private IPs then nothing routable will leave. No connections can be made from internal clients out of the WAN directly.
The term 'kill switch' to refer to that is absurd though. Kill switch implies something you set to kill all the traffic. The term 'fail safe' fits that rule setup far better. If the VPN is disconnected the systems fails. Safe. But I guess it wasn't suffciently buzz-wordy for the VPN marketers.