Whats my ip 145.224.65.89
Ultra WAN IP 100.112.22.183

CGNAT means Carrier Grade NAT

My prompt was: I am happy being hidden” behind CGNAT as I want only our own users connected and then using vpn without open ports

That makes excellent sense — and it’s a secure-by-default approach. Let’s affirm the key points of your CGNAT-based setup:

✅ Why CGNAT Works in Your Favour

  • No exposed ports on your public-facing network = less attack surface
  • Your ISP-provided IP (100.11x.xx.183) is non-routable, so nobody can scan or attack you directly
  • Your real outbound IP (145.xx4.65.89) is shared with many users — this obscures your presence even further

🔐 Your Goal: Private Access Only + VPN = Perfect Match

You’ve said:

I want only our own users connected and then using VPN without open ports”

That means:

  • You do not want port forwarding
  • You are happy if no inbound connections are allowed from the internet
  • You want controlled VPN access for your users to reach internal resources

This is ideal for:

  • Cloudflare Tunnel
  • Tailscale (if not blocked by CGNAT NAT traversal limits)
  • OpenVPN Cloud
  • ZeroTier (though sometimes hampered by CGNAT, depends on your ISP)

Note I am considering self hosted zerotier solution.

💡 Best Practices in Your Scenario

Task Recommendation
External access without open ports ✅ Cloudflare Tunnel or OpenVPN Cloud
LAN-to-LAN or remote admin access ✅ ZeroTier or Tailscale (test first)
VPN for trusted users ✅ Run VPN server behind CGNAT using Cloud VPN with client pull
Restrict traffic ✅ Use firewall to allow only VPN subnet
Remote logging / metrics ✅ Use reverse tunnels (e.g. autossh, Cloudflare Tunnel)

BUT Cloudflare does not do RDP

Zerotier has crippled their free offering

-–

When Starlink is in Bypass Mode, the Starlink router is disabled, and it passes the WAN IP directly to your own router (like your UniFi Ultra). This setup results in:

  • ✅ Your router (e.g. UniFi) gets the Starlink-assigned IP address on its WAN interface
  • ❌ No double NAT — the Starlink router is no longer performing NAT

yes

🧱 But: The Key Limitation Is Still Carrier-Grade NAT (CGNAT)

Even though there’s no double NAT on your own premises, Starlink itself does not give you a public IPv4 address directly. Instead:

  • Your router gets a 100.64.x.x IP (CGNAT space)
  • Outbound internet traffic is NATed by Starlink’s core network to a shared public IP (like 145.224.65.89)
  • Inbound unsolicited connections cannot reach you unless you use port forwarding alternatives like Cloudflare Tunnel

So your setup is:

[LAN devices] ──> [Your Router (e.g. UniFi, NAT)] ──> [Starlink CGNAT] ──> Internet

That’s a single visible NAT layer for you, but the CGNAT is still there in Starlink’s infrastructure.

Yes and I LIKE this.

✅ Summary: Your NAT Situation

Layer NAT? Notes
Your Router (e.g. UniFi) ✅ Yes LAN to WAN NAT (typical home/office router setup)
Starlink Bypass Mode ❌ No Starlink router disabled — no extra NAT on your end
Starlink Network Core ✅ Yes (CGNAT) Hides you behind 100.x and shares public IP

We bypassed (bridged) Starlink this morning. All seems well.

🔐 Takeaway

  • You are only dealing with one NAT layer under your control
  • The Starlink CGNAT is still active, but transparent — you just can’t receive inbound connections unless you use techniques like:
  • Cloudflare Tunnel
  • Tailscale + DERP relay
  • ZeroTier + relay fallback
  • OpenVPN Cloud

-–

all AI-generated and my comments and I concur.

May 31, 2025


Previous post
Unify Feature U7 Outdoor U7 Pro Outdoor Wi-Fi Standard Wi-Fi 7 (802.11be) Wi-Fi 7 (802.11be) Bands Tri-band (2.4 / 5 / 6 GHz) Tri-band (2.4 / 5 / 6
Next post
UPS Feature / Type Standby (Offline) Line-Interactive ✅ Online (Double Conversion) Normal Power Source Wall outlet Wall outlet + AVR Battery via