@BlakeRichardson 
Yes, which is kind of my recommendation thus this post.
 
However, I wanted to keep more of a "primary w/ failover" model.  Otherwise, nothing will prevent a student from gaining access to a staff laptop at some point and doing a quick "whatsmyip" and starting the attack on the 2nd connection.  Won't take long for them to realize their DoS isn't working...
 
However if I leverage a failover connection, according to the comments on this post, it isn't going to fail over.  And that's a bit of a problem!