VPN implementations are categorized into which of the following two general groups?