One employee needs access to company VPN, but he is always in the middle of nowhere without a proper internet connection. He tries to connect his laptop to cellphone hotspot but i can’t connect to VPN.
After some researching i found out that there is something called CGNAT that makes it impossible to do what he wants to do, but he really needs to connect to VPN and he only has cellphone internet, is there some work around ?
You probably want to try a more modern protocol. Old protocols are ironically much “heavier” so it’s harder to stay connected. I would try Bowtie which uses wireguard, and if there’s connectivity problems they still let you choose the end point so it can narrow down if the users internet is truly too weak.
Can’t give you a solution for ur specific case , but I’ve transitioned to wireguard which still stays connected even in areas with unstable cellphone connection
That’s not how CGNAT works. CGNAT does not prevent the establishment of a VPN connection. It’s likely that the hotspot is simply introducing too much latency/jitter into the equation to properly establish a connection
Edit: Holy fuck man. PPTP in 2025? Aside from the fact that that is definitely the worst protocol to try and use remotely, it’s also insanely insecure. IPSec, SSL VPN, OpenVPN, Wireguard. Literally any of those would be infinitely better to implement nowadays.
The right answer here? Setup IPv6. You don’t need it inside your network, which is a lot more work. But an IPv6 tunnel endpoint makes these sorts of problems go poof.
I’ve had bullshit fuckery with CGNAT and both IPSEC and Forti DTLS VPNs. Typically not “hard broken”, but intermittent problems and breaking pure IPSEC (without TCP/UDP underlay) is most definitely a thing depending on implementation.
That said, I’m really sold that remote worker VPN endpoints should be offered in IPv6 now. Way easier than IPv6 for your internal nets (assuming you’re not running BGP uplinks), and solves a lot of dumb shit really easily.
Oh no! Stop everything and just google if pptp is safe to use. This is the only research you need to do right now.
“The PPTP protocol itself is no longer considered secure as cracking the initial MS-CHAPv2 authentication can be reduced to the difficulty of cracking a single DES 56-bit key, which with current computers can be brute-forced in a very short time (making a strong password largely irrelevant to the security of PPTP as the entire 56-bit keyspace can be searched within practical time constraints).”
I’ve been having the same issues with users behind cgnat or 6to4 nat, connecting to IKEv2 AlwaysOn VPN. Fixed it (/workaround) for those users by switching the user tunnel to SSTP. Device tunnel remains broken tho, can’t do SSTP on those