Current setup

The CCR is doing the routing and switching and the cisco switches are functioning as level 2.
I have a server that connects thru a VPN to a different country and it connects directly to the CCR ethernet port. VPN is setup at the router level. I keep traffic on this VPN isolated from my home network. The VPN server itself has dual 1GbE NICs. Currently if I have to move data off of the VPN server onto my storage server, I have use teamviewer or trek to the basement with a USB drive. I’m not a fan of teamviewer for this as the files are typically 30 - 50 Gb in size and my understanding is that the data leaves my intranet, goes over the TV servers and then back to my other TV computer. This takes a long time and half the time the file transfer fails. I did have both NICs setup where one was on the home network with intranet access only and the other to the VPN connection.(VPN NIC1 192.168.x.x range with subnet mask 255.255.0.0, and intranet NIC 2 on the 10.0.x.x range with subnet mask 255.255.0.0. and blank default gateway). However I am concerned that “someone” could gain access to my home network thru the VPN connection into the switch or server and learn my true IP location. Teamviewer has a intranet only mode so this was used to transfer files from the server by connecting to NIC 2 from my storage server. It was much faster.
I’m thinking about installing a SFP+ card (single port for the VPN server and dual port for the storage server) which should obviously speed up transfers. I would make a direct connect network between the VPN and storage server and use teamviewer in LAN mode or use the Krusader docker on unraid to mount the VPN server data drive on the storage server (NFS or SMB but that’s a different discussion?). I’m just trying to ascertain the security risk of this. If someone was to gain access to my VPN server computer, would they be able to see the other SFP+ direct connection. If they then got on the storage server then thru the second SFP+ on that computer then the individual could access my whole network., I’m concerned about ransomware. The second SFP+ on the storage server would connect to the cisco SG350XG switch for a 10GbE backbone.
Someone on another forum suggested dual-homed Storage server which would have one port in my home network and one in “vpn” network. I would have to change the current SFP+ connections from the CCR: one to the SG350XG and the other to the storage server and dedicate it to the VPN network (intranet only). The second storage SFP+ would connect to the SG500X sfp+ and the SG500X would also connect to the second SFP+ on the SG350XG. Then connect the same NFS or SMB share to both the home client and VPN server. For extra security, could block internet access from the storage server??. This way you won’t be able to jump from VPN server (if compromised) to storage server. I don’t quite understand the last part I need my storage server to have internet access for plex pass. Maybe he means block internet access on the port going to the VPN and keep it intranet only??
Basically I’m looking for away to move files between two servers over SFP+ along with protecting the anonymity of my home network. Storage server is being upgraded to unraid. I don’t think it makes sense to run the VPN server as a VM in unraid. All the data that is currently downloaded over the VPN server is virus checked and malware scanned before physically moving onto my storage server. If I combined both boxes with a windows 10 VM, I believe I put all the data on the server and my home network at risk of malware/viruses/etc. Plus when trying to access the internet for plex pass seeding there will be two incoming/outgoing internet connections on one box and I don’t know how to tell unraid to use the home network for plex pass data.
Just for fun, I’m thinking about adding a CRS326-24S+2Q+RM between the CCR and SG350X for more SFP+ ports. I would like to bond (not sure which type) the two SFP+ from the CCR to the CRS as well as bond the 2 SFP+ from the SG350X to the CRS. The internet access for the VPN server will not need 10GbE so I will keep it as connected via 1GbE ethernet. If I bond the CCR to the CRS then there is no open SFP+ on the router to connect the Storage server for the dual home as explained above. I wound need to connect the SFP+ from the VPN server to the CRS and both SFP+ from the storage server to the CRS - one for home network access and the other for connection to the VPN server for data transfer. Would I have to set rules or VLAN to isolate the VPN server SFP+ port on the CRS to prevent access to the home network? I still need it to be able to transfer data with one of the SFP+ connections from the storage server.
I’m sure I’m overthinking this and making it much more complicated then it needs to be. Looking forward to your replies.