You can buy special purpose mini-PCs and install OPSense on them to act as a dedicated, external VPN box that sits between your computer and your existing router/switch or modem/internet service provider. Your computer will not even know it is communicating with the internet through a VPN tunnel. Because you’re setting up your VPN traffic as a NAT rule, OPSense cannot send traffic outside of the VPN tunnel, regardless if the VPN servers are up or down.
Note that OPSense is not meant to be a software switch. If you want more than one device to go through this VPN box/router, you will also need a normal network switch.
You can put this VPN box between your computer and your existing router/switch/modem, and that way you can have only the computer go through VPN (without even knowing) and everything else not go through the VPN.
I place the system on a separate VLAN (configured in my router, you need a good router for this). Then, on that VLAN I block every IP address using the firewall rules except for the IP address of the VPN server. Voila, I have a safety net, only my VPN’s IP address can be reached. It has worked well for me for a few years now.
Mullvad’s VPN app, at least for the Mac, has the features, where you can stipulate what apps must go via VPN and you can also set it to prohibit any traffic from going other than via VPN.