@BlakeRichardson
Yes, which is kind of my recommendation thus this post.
However, I wanted to keep more of a "primary w/ failover" model. Otherwise, nothing will prevent a student from gaining access to a staff laptop at some point and doing a quick "whatsmyip" and starting the attack on the 2nd connection. Won't take long for them to realize their DoS isn't working...
However if I leverage a failover connection, according to the comments on this post, it isn't going to fail over. And that's a bit of a problem!