Ok so would you suggest completely bypassing the apple router for the xserve, because i can do that if it makes it easier. As far as the fios goes, i think i can call up and have them (if im using the term correctly) "open a socket" in the router specifically for the xserve. then from there i can use dyndns.
(Just repaired an Xserve box, too. Bad video mezzanine card. But I digress.)
If your ISP is blocking ports at your demarcation router, then yes, they'll need to alter that. To get where you want with VPN pass-through, your ISP will either have to "open the ports", or establish "port forwarding" or (and this is the best, if they'll do it, and if you have an external firewall) reconfigure this device or replace this device with a device that supports "bridge mode" or "bridging".
For VPN pass-through, I usually end up opening and forwarding the VPN ports from Apple's [TS1629 well-known IP ports list|http://support.apple.com/kb/ts1629] manually.
PPTP expects GRE (protocol 47) and TCP port 1723.
IPSec expects UDP port 500 and ESP (protocol 50) for site to site non-NAT.
L2TP expects UDP port 500, UDP port 1701 and UDP port 4500 when behind NAT.
GRE and ESP are IP protocols, and not IP ports.
I'd tend to open both L2TP and PPTP ports for forwarding here, just to give you some options.
A bridge is effectively transparent, and cedes all control of and all management of your internet-facing activities to your own external firewall gateway box. You'll definitely want a firewall gateway, if you choose this path. Preferably one with VPN server capabilities, which is a step above the VPN pass-through capabilities that the cheapest boxes offer. Running Xserve as a firewall is tricky, and Mac boxes don't make good firewalls in my experience.
I'd generally prefer a bridge in these configurations, as that means I'm running (my own) gateway firewall box, and not calling the ISP for changes to the gateway router. And that I can VPN to my own gateway, and the gateway (because it has a VPN server) allows me connection to any hosts on the target LAN and not just to one host.
DynDNS is irrelevant to this part of the connection. It's little more than an electronic phone book that can get your remote client callers from a nice name to something your remote clients can actually dial; from a domain name to an address. DynDNS has
nothing to do with port forwarding, routing, or any of the gnarly stuff here.