Each has its pros and cons. The closer we were to the server, there is no chance of IP address exposure. All that is required are configuration files, fast, but some of them are actually virtual. TLS and SSL are also widely used within VPN protocols for authentication and the creation of secure VPN tunnels. To connected to do online connections by government restrictions.