no, still did not work after reboot. however, I solved it another way! I added a DNS forwarder with the following details:
host: *
domain: blah.com
IP: 1.2.3.4
this basically just routes any traffic not already defined in my list of dns forwarders in my internal domain blah.com to an invalid IP address. this accomplishes the goal I set out which was to avoid having random.blah.com DNS requests from going out to the internet. I read about the potential solution here
http://doc.m0n0.ch/handbook/faq-webfilter.html I couldn't quite figure out the firewall part in order for the packets to timeout immediately (I tried both reject, block, tcp, udp, etc and never was able to get any of the requests (ping, icmp) nor DNS via web browser to time out immediately. each firewall rule combinations I tried still took about 10 seconds for the browser to "sending request" and then eventually time out.
not really a big deal for me since my goal was to simply stop the requests from leaving the WAN but for someone who truly wants to "block" the monowall from serving those particular website domains would want their users to immediately get a time out rather than waiting the 10 seconds.