Types of VPNs

Last Updated on October 26, 2025 by Arnav Sharma

If you’ve ever tried to wrap your head around VPN technologies, you know it can feel like drowning in acronyms. PPTP, L2TP, MPLS, BGP… the list goes on. After spending years working with network implementations across different industries, I’ve learned that the key to understanding VPNs isn’t memorizing every protocol. It’s about grasping the fundamental structure of how these technologies fit together.

Let me walk you through the VPN landscape in a way that actually makes sense.

The Two-Camp Split: Who’s Running the Show?

Before diving into the technical weeds, there’s one crucial distinction that shapes everything else. VPNs fall into two main camps based on a simple question: Who’s managing this thing?

Provider Provisioned VPNs (PPVPNs)

These are the VPNs where your service provider does the heavy lifting. Think of it like hiring a professional chef versus cooking at home. The provider handles the infrastructure, configuration, and maintenance. You just consume the service.

I’ve seen this approach work beautifully for companies that want reliable connectivity without the headache of managing complex networking gear. A manufacturing client I worked with had factories spread across three states. Rather than hiring networking specialists at each location, they went with an MPLS-based PPVPN. The provider handled everything while they focused on making widgets.

Customer Provisioned VPNs

On the flip side, customer provisioned VPNs put you in the driver’s seat. You’re buying the ingredients and doing the cooking yourself. This gives you maximum control but requires the expertise to pull it off.

Startups often go this route initially. I remember one tech company that started with a simple site-to-site IPsec tunnel between their office and AWS. As they grew, they added remote access VPNs for their distributed team. They had the technical chops and wanted the flexibility to customize everything.

The Layer Game: Where VPNs Live in the Network Stack

Here’s where things get interesting. Provider provisioned VPNs operate at different layers of the network stack, and understanding these layers helps explain why certain solutions work better for specific scenarios.

Layer 1 VPNs: The Physical Foundation

Layer 1 VPNs operate at the physical layer using technologies like GMPLS (Generalized Multiprotocol Label Switching). These are relatively rare in typical enterprise deployments. Think of them as dedicated highways built just for your traffic.

Layer 2 VPNs: Bridging the Gap

Layer 2 VPNs create virtual bridges between locations. They make remote sites appear as if they’re on the same local network segment. This is incredibly powerful when you need applications to behave as if everything is local.

  • Point-to-Point connections are the simplest flavor. Imagine you have two offices that need to share a database server. A Layer 2 point-to-point VPN makes that database appear local to both locations. The applications don’t even know there’s a WAN connection in between.
  • Multipoint connections get more sophisticated. VPLS (Virtual Private LAN Service) is like creating a giant virtual switch that spans multiple locations. I’ve deployed this for retail chains where each store needed to access the same resources and appear on the same network.

The technology choices here tell a story about evolution. L2TPv3, AToM, and BGP/MPLS each solve slightly different problems. L2TPv3 works great over IP networks, while BGP/MPLS shines in service provider environments where you need guaranteed service levels.

Layer 3 VPNs: The Routing Layer

Layer 3 VPNs work at the IP routing level. Instead of extending LAN segments, they connect different IP networks together. This is where things like MPLS VPNs live, and honestly, it’s where most enterprise VPN action happens.

The PE-based versus CE-based distinction might sound academic, but it matters in the real world. PE-based solutions put more intelligence in the provider’s equipment, which typically means better performance and easier management. CE-based solutions give you more control but require more expertise on your end.

I’ve seen companies struggle with this choice. A healthcare organization I consulted for initially wanted maximum control and went CE-based. Six months later, they switched to a PE-based solution because managing the routing complexity was eating up too much of their IT team’s time.

Customer Provisioned VPNs: Rolling Your Own

When you’re managing your own VPN infrastructure, you’re typically dealing with two main scenarios.

Remote Access: Connecting the Mobile Workforce

Remote access VPNs have become absolutely critical, especially after recent global shifts toward remote work. The distinction between compulsory and voluntary tunnels might seem technical, but it has real implications.

  • Compulsory tunnels are initiated by network equipment, not the user’s device. Think of a branch office where all traffic automatically gets tunneled back to headquarters. The users don’t even know it’s happening.
  • Voluntary tunnels require the user to actively connect. This is your typical “VPN client” scenario where employees fire up an app to connect from home or a coffee shop.

The protocol choices here each have their sweet spots. PPTP is ancient and insecure, but it’s simple and still shows up in legacy environments. L2TP combined with IPsec provides good security and broad compatibility. Modern deployments often use SSL/TLS-based solutions because they work through almost any firewall and don’t require special client software.

Site-to-Site: Connecting Fixed Locations

Site-to-site VPNs create permanent connections between fixed locations. This is bread-and-butter networking for multi-location businesses.

IPsec remains the gold standard here, especially for security-conscious industries. I worked with a financial services company that used IPsec tunnels to connect their branches. The encryption and authentication capabilities met their regulatory requirements while providing reliable connectivity.

GRE (Generic Routing Encapsulation) is simpler to set up and troubleshoot, but it doesn’t provide encryption by default. It’s great for internal networks where you trust the underlying transport.

IP-in-IP is the simplest option. It literally wraps one IP packet inside another. Not fancy, but sometimes simple is exactly what you need.

Making the Right Choice: Context Matters

The VPN world might seem overwhelming at first glance, but most decisions become clearer when you consider your specific context.

  • Budget and expertise play huge roles. Provider provisioned solutions cost more monthly but require less internal expertise. Customer provisioned solutions have lower ongoing costs but higher complexity.
  • Security requirements heavily influence protocol choices. Financial services and healthcare typically lean toward IPsec-based solutions. Less regulated industries might choose simpler options that are easier to manage.
  • Performance needs affect layer choices. Applications that require low latency or specific network behaviors often work better with Layer 2 solutions. Standard business applications usually work fine with Layer 3 approaches.

Scale considerations become crucial as you grow. A solution that works perfectly for connecting two offices might become unwieldy when you’re dealing with dozens of locations.

The networking world keeps evolving. SD-WAN technologies are reshaping how we think about site-to-site connectivity. Cloud-native approaches are changing remote access patterns. But the fundamental concepts in this VPN taxonomy remain relevant because they address core networking challenges that aren’t going away.

Understanding these foundations helps you cut through vendor marketing and make informed decisions about your network architecture. Whether you’re connecting a small branch office or architecting connectivity for a global enterprise, these concepts provide the framework for thinking through your options systematically.

The key is matching the technology to your actual requirements rather than getting caught up in the latest buzzwords. Sometimes the “boring” solution that everyone understands is exactly the right choice.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.